Follow
Stefan Balogh
Stefan Balogh
Verified email at stuba.sk - Homepage
Title
Cited by
Cited by
Year
IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
S Balogh, O Gallo, R Ploszek, P ©paček, P Zajac
Electronics 10 (21), 2021
502021
Capturing encryption keys for digital analysis
© Balogh, M Pondelik
Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011
292011
Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection.
P Svec, S Balogh, M Homola
ICISSP, 792-799, 2021
82021
New possibilities for memory acquisition by enabling DMA using network card
© Balogh, M Mydlo
2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013
82013
Memory acquisition by using network card
S Balogh
Journal of Cyber Security and Mobility, 65-76, 2014
62014
Knowledge-based dataset for training PE malware detection models
P ©vec, © Balogh, M Homola, J Kµuka
arXiv preprint arXiv:2301.00153, 2022
52022
Knowledge and Datasets as a Resource for Improving Artificial Intelligence
© Balogh
Silhavy R., Silhavy P., Prokopova Z. (eds) Data Science and Intelligent …, 2021
52021
Innovative telemedicine solutions for diabetic patients
F Lehocki, © Balogh, E ®ákovičová, M Kováč, B de Witte
2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences, 203-208, 2012
42012
New direction for malware detection using system features
© Balogh, J Mojľią
2019 10th IEEE International Conference on Intelligent Data Acquisition and …, 2019
32019
Data processing from mhealth patient data acquisition related to extracting structured data from eh records
S Balogh, F Lehocki, D Ivanią, E Kučera, M Lajtman, I Miňo
Wireless Mobile Communication and Healthcare: Third International Conference …, 2013
32013
Breaking microsoft azure information protection viewer using memory dump
J Mojľią, © Balogh
Software Engineering Perspectives in Intelligent Systems: Proceedings of 4th …, 2020
22020
Towards explainable malware detection with structured machine learning
P ©vec, T Bisták, M Homola, © Balogh, J Kµuka, A ©imko
The Fourth Workshop on Explainable Logic-Based Knowledge Representation …, 2023
12023
Improving DL-Learner on a Malware Detection Use Case
T Bisták, P ©vec, J Kµuka, A ©imko, © Balogh, M Homola
12023
Evaluation of System Features Used for Malware Detection
© Balogh, J Mojľią, P Krammer
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3, 46-59, 2022
12022
Collaborative Learning Supported with Mediawiki Platform in Technical University Environment
J Mojľią, © Balogh, M Ásványi, I Budinská
Teaching and Learning in a Digital World: Proceedings of the 20th …, 2018
12018
Semantic Data Representation for Explainable Windows Malware Detection Models
P ©vec, © Balogh, M Homola, J Kµuka, T Bisták
arXiv preprint arXiv:2403.11669, 2024
2024
Integration of Results from Static and Dynamic Code Analysis into an Ontological Model
© Balogh, T Galko
2023 IEEE 12th International Conference on Intelligent Data Acquisition and …, 2023
2023
Integration of outputs from tools for static and dynamic code analysis into an ontological model
© Balogh, P ©vec
Application of Knowledge Methods in Information Security, 7, 2022
2022
Forensic Analysis, Cryptosystem Implementation, and Cryptology: Methods and Techniques for Extracting Encryption Keys from Volatile Memory
© Balogh
Multidisciplinary Perspectives in Cryptology and Information Security, 381-396, 2014
2014
ANALÝZA OPERAČNEJ PAMÄTE S CIEĄOM ODHALENIA NEZNÁMEHO KÓDU
© Balogh
The system can't perform the operation now. Try again later.
Articles 1–20