IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques S Balogh, O Gallo, R Ploszek, P ©paček, P Zajac Electronics 10 (21), 2021 | 50 | 2021 |
Capturing encryption keys for digital analysis © Balogh, M Pondelik Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011 | 29 | 2011 |
Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection. P Svec, S Balogh, M Homola ICISSP, 792-799, 2021 | 8 | 2021 |
New possibilities for memory acquisition by enabling DMA using network card © Balogh, M Mydlo 2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013 | 8 | 2013 |
Memory acquisition by using network card S Balogh Journal of Cyber Security and Mobility, 65-76, 2014 | 6 | 2014 |
Knowledge-based dataset for training PE malware detection models P ©vec, © Balogh, M Homola, J Kµuka arXiv preprint arXiv:2301.00153, 2022 | 5 | 2022 |
Knowledge and Datasets as a Resource for Improving Artificial Intelligence © Balogh Silhavy R., Silhavy P., Prokopova Z. (eds) Data Science and Intelligent …, 2021 | 5 | 2021 |
Innovative telemedicine solutions for diabetic patients F Lehocki, © Balogh, E ®ákovičová, M Kováč, B de Witte 2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, 203-208, 2012 | 4 | 2012 |
New direction for malware detection using system features © Balogh, J Mojľią 2019 10th IEEE International Conference on Intelligent Data Acquisition and …, 2019 | 3 | 2019 |
Data processing from mhealth patient data acquisition related to extracting structured data from eh records S Balogh, F Lehocki, D Ivanią, E Kučera, M Lajtman, I Miňo Wireless Mobile Communication and Healthcare: Third International Conference …, 2013 | 3 | 2013 |
Breaking microsoft azure information protection viewer using memory dump J Mojľią, © Balogh Software Engineering Perspectives in Intelligent Systems: Proceedings of 4th …, 2020 | 2 | 2020 |
Towards explainable malware detection with structured machine learning P ©vec, T Bisták, M Homola, © Balogh, J Kµuka, A ©imko The Fourth Workshop on Explainable Logic-Based Knowledge Representation …, 2023 | 1 | 2023 |
Improving DL-Learner on a Malware Detection Use Case T Bisták, P ©vec, J Kµuka, A ©imko, © Balogh, M Homola | 1 | 2023 |
Evaluation of System Features Used for Malware Detection © Balogh, J Mojľią, P Krammer Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3, 46-59, 2022 | 1 | 2022 |
Collaborative Learning Supported with Mediawiki Platform in Technical University Environment J Mojľią, © Balogh, M Ásványi, I Budinská Teaching and Learning in a Digital World: Proceedings of the 20th …, 2018 | 1 | 2018 |
Semantic Data Representation for Explainable Windows Malware Detection Models P ©vec, © Balogh, M Homola, J Kµuka, T Bisták arXiv preprint arXiv:2403.11669, 2024 | | 2024 |
Integration of Results from Static and Dynamic Code Analysis into an Ontological Model © Balogh, T Galko 2023 IEEE 12th International Conference on Intelligent Data Acquisition and …, 2023 | | 2023 |
Integration of outputs from tools for static and dynamic code analysis into an ontological model © Balogh, P ©vec Application of Knowledge Methods in Information Security, 7, 2022 | | 2022 |
Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory © Balogh Multidisciplinary Perspectives in Cryptology and Information Security, 381-396, 2014 | | 2014 |
ANALÝZA OPERAČNEJ PAMÄTE S CIEĄOM ODHALENIA NEZNÁMEHO KÓDU © Balogh | | |