default search action
Béla Genge
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Roland Bolboaca, Piroska Haller, Béla Genge:
Evaluation Techniques for Long Short-Term Memory Models: Overfitting Analysis and Handling Missing Values. IEA/AIE 2024: 228-240 - 2023
- [j25]Teri Lenard, Anastasija Collen, Meriem Benyahya, Niels Alexander Nijdam, Béla Genge:
Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review. IEEE Access 11: 106803-106832 (2023) - [c44]Teri Lenard, Anastasija Collen, Niels A. Nijdam, Béla Genge:
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module. EuroS&P Workshops 2023: 329-335 - [c43]Teri Lenard, Béla Genge, Anastasija Collen, Niels A. Nijdam:
LOKI-2: An Improved Lightweight Cryptographic Key Distribution Protocol for Automotive Systems. ICCP 2023: 187-194 - [c42]Adrian-Silviu Roman, Béla Genge:
A Differential Privacy-Based Approach for Protecting Crowdsourced WiFi RSS Data. ICCP 2023: 255-262 - 2022
- [j24]Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
VetaDetect: Vehicle tampering detection with closed-loop model ensemble. Int. J. Crit. Infrastructure Prot. 37: 100525 (2022) - [j23]Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. Int. J. Crit. Infrastructure Prot. 38: 100543 (2022) - [j22]Anastasija Collen, Ioan-Cosmin Szanto, Meriem Benyahya, Béla Genge, Niels Alexander Nijdam:
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment. Inf. 13(7): 340 (2022) - [j21]Simon Vrhovec, Béla Genge, Martin Gilje Jaatun:
Guest Editorial: Special Issue on Interdisciplinary Cybersecurity. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 1-3 (2022) - 2020
- [c41]Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller:
Locality sensitive hashing for tampering detection in automotive systems. ARES 2020: 57:1-57:7 - [c40]Teri Lenard, Roland Bolboaca, Béla Genge:
LOKI: A Lightweight Cryptographic Key Distribution Protocol for Controller Area Networks. ICCP 2020: 513-519 - [c39]Teri Lenard, Roland Bolboaca, Béla Genge, Piroska Haller:
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks. Networking 2020: 395-403 - [c38]Peter Szabó, Béla Genge:
Efficient Conversion Prediction in E-Commerce Applications with Unsupervised Learning. SoftCOM 2020: 1-6 - [c37]Peter Szabó, Béla Genge:
Hybrid Hyper-parameter Optimization for Collaborative Filtering. SYNASC 2020: 210-217
2010 – 2019
- 2019
- [j20]Béla Genge, Piroska Haller, Calin Enachescu:
Anomaly Detection in Aging Industrial Internet of Things. IEEE Access 7: 74217-74230 (2019) - [j19]Béla Genge, Piroska Haller, Adrian-Vasile Duka, Hunor Sándor:
A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems. Autom. 67(5): 417-428 (2019) - [j18]Béla Genge, Piroska Haller, Adrian-Vasile Duka:
Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems. Future Gener. Comput. Syst. 91: 206-222 (2019) - [j17]Piroska Haller, Béla Genge, Adrian-Vasile Duka:
On the practical integration of anomaly detection techniques in industrial control applications. Int. J. Crit. Infrastructure Prot. 24: 48-68 (2019) - [j16]Hunor Sándor, Béla Genge, Zoltán Szántó, Lorinc Márton, Piroska Haller:
Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems. Int. J. Crit. Infrastructure Prot. 25: 152-168 (2019) - [j15]Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. J. Univers. Comput. Sci. 25(11): 1394-1395 (2019) - [c36]Javier Augusto-Gonzalez, Anastasija Collen, Spyridon C. Evangelatos, Marios Anagnostopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Béla Genge, Erol Gelenbe, Niels A. Nijdam:
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. CAMAD 2019: 1-6 - [c35]Roland Bolboaca, Béla Genge, Piroska Haller:
Using Side-Channels to Detect Abnormal Behavior in Industrial Control Systems. ICCP 2019: 435-441 - [c34]Hunor Sándor, Béla Genge, Piroska Haller, Andrei Bica:
A Security-Enhanced Interoperability Middleware for the Internet of Things. ISDFS 2019: 1-6 - [c33]Peter Szabó, Béla Genge:
Circle Map for Internet of Things Networks. ISDFS 2019: 1-5 - [c32]Calin Enachescu, Hunor Sándor, Béla Genge:
A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things. SoftCOM 2019: 1-6 - 2018
- [c31]Zoltán Szántó, Hunor Sándor, Béla Genge:
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems. CECC 2018: 6:1-6:6 - 2017
- [j14]Piroska Haller, Béla Genge:
Using Sensitivity Analysis and Cross-Association for the Design of Intrusion Detection Systems in Industrial Cyber-Physical Systems. IEEE Access 5: 9336-9347 (2017) - [j13]Béla Genge, Piroska Haller, István Kiss:
Cyber-Security-Aware Network Design of Industrial Control Systems. IEEE Syst. J. 11(3): 1373-1384 (2017) - [j12]Béla Genge, Piroska Haller, Cristian-Dragos Dumitru, Calin Enachescu:
Designing Optimal and Resilient Intrusion Detection Architectures for Smart Grids. IEEE Trans. Smart Grid 8(5): 2440-2451 (2017) - [c30]Adrian-Vasile Duka, Béla Genge, Piroska Haller, Bogdan Crainicu:
Enforcing End-to-End Security in Scada Systems via Application-Level Cryptography. Critical Infrastructure Protection 2017: 139-155 - [c29]Hunor Sándor, Béla Genge, Piroska Haller, Flavius Graur:
Software Defined Response and Network Reconfiguration for Industrial Control Systems. Critical Infrastructure Protection 2017: 157-173 - [c28]Béla Genge, Adrian-Vasile Duka, Piroska Haller, Bogdan Crainicu, Hunor Sándor, Flavius Graur:
Design, verification and implementation of a lightweight remote attestation protocol for process control systems. INDIN 2017: 75-82 - [c27]Hunor Sándor, Piroska Haller, Béla Genge, Zoltán Kátai:
Optimally scheduled interventions in the presence of vulnerabilities for modern cyber-physical systems. INDIN 2017: 115-120 - [c26]Hunor Sándor, Béla Genge, Zoltán Szántó:
Sensor data validation and abnormal behavior detection in the Internet of Things. RoEduNet 2017: 1-5 - [c25]Hunor Sándor, Béla Genge, Piroska Haller, Adrian-Vasile Duka, Bogdan Crainicu:
Cross-layer anomaly detection in industrial cyber-physical systems. SoftCOM 2017: 1-5 - 2016
- [j11]Béla Genge, Piroska Haller, István Kiss:
A framework for designing resilient distributed intrusion detection systems for critical infrastructures. Int. J. Crit. Infrastructure Prot. 15: 3-11 (2016) - [j10]Béla Genge, Calin Enachescu:
ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. Secur. Commun. Networks 9(15): 2696-2714 (2016) - [c24]István Kiss, Béla Genge:
A Methodology for Monitoring and Control Network Design. CRITIS 2016: 111-122 - [c23]Béla Genge, Piroska Haller:
A hierarchical control plane for software-defined networks-based industrial control systems. Networking 2016: 73-81 - [c22]Béla Genge, Piroska Haller, István Kiss:
Big Data Processing to Detect Abnormal Behavior in Smart Grids. SmartGIFT 2016: 214-221 - 2015
- [j9]Béla Genge, István Kiss, Piroska Haller:
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastructure Prot. 10: 3-17 (2015) - [j8]Béla Genge, Flavius Graur, Piroska Haller:
Experimental assessment of network design approaches for protecting industrial control systems. Int. J. Crit. Infrastructure Prot. 11: 24-38 (2015) - [c21]Béla Genge, Piroska Haller, István Kiss:
A Linear Programming Approach for K-Resilient and Reliability-Aware Design of Large-Scale Industrial Networks. ADHOC-NOW 2015: 288-302 - [c20]Zoltán Gál, Hunor Sándor, Béla Genge:
Information flow and complex event processing of the sensor network communication. CogInfoCom 2015: 467-471 - [c19]Hunor Sándor, Béla Genge, Gheorghe Sebestyen-Pal:
Resilience in the Internet of Things: The Software Defined Networking approach. ICCP 2015: 545-552 - [c18]István Kiss, Béla Genge, Piroska Haller, Gheorghe Sebestyen:
A framework for testing stealthy attacks in energy grids. ICCP 2015: 553-560 - [c17]István Kiss, Béla Genge, Piroska Haller:
A clustering-based approach to detect cyber attacks in process control systems. INDIN 2015: 142-148 - [c16]Béla Genge, Calin Enachescu:
Non-Intrusive Historical Assessment of Internet-Facing Services in the Internet of Things. MACRo 2015: 25-36 - 2014
- [j7]Christos Siaterlis, Béla Genge:
Cyber-physical testbeds. Commun. ACM 57(6): 64-73 (2014) - [j6]Béla Genge, Christos Siaterlis:
Physical process resilience-aware network design for SCADA systems. Comput. Electr. Eng. 40(1): 142-157 (2014) - [c15]Béla Genge, Dorin Adrian Rusu, Piroska Haller:
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures. EUROSEC 2014: 1:1-1:6 - 2013
- [j5]Christos Siaterlis, Andres Perez-Garcia, Béla Genge:
On the Use of Emulab Testbeds for Scientifically Rigorous Experiments. IEEE Commun. Surv. Tutorials 15(2): 929-942 (2013) - [j4]Béla Genge, Christos Siaterlis:
Analysis of the effects of distributed denial-of-service attacks on MPLS networks. Int. J. Crit. Infrastructure Prot. 6(2): 87-95 (2013) - [j3]Christos Siaterlis, Béla Genge, Marc Hohenadel:
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation. IEEE Trans. Emerg. Top. Comput. 1(2): 319-330 (2013) - [c14]Béla Genge, Christos Siaterlis, Georgios Karopoulos:
Data fusion-base anomay detection in networked critical infrastructures. DSN Workshops 2013: 1-8 - 2012
- [j2]Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera:
A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Comput. Electr. Eng. 38(5): 1146-1161 (2012) - [j1]Béla Genge, Christos Siaterlis, Marc Hohenadel:
Impact of Network Infrastructure Parameters to the Effectiveness of Cyber Attacks Against Industrial Control Systems. Int. J. Comput. Commun. Control 7(4): 674-687 (2012) - [c13]Béla Genge, Christos Siaterlis, Marc Hohenadel:
AMICI: An Assessment Platform for Multi-domain Security Experimentation on Critical Infrastructures. CRITIS 2012: 228-239 - [c12]Iñaki Garitano, Christos Siaterlis, Béla Genge, Roberto Uribeetxeberria, Urko Zurutuza:
A method to construct network traffic models for process control systems. ETFA 2012: 1-8 - [c11]Christos Siaterlis, Béla Genge, Marc Hohenadel, Marco Del Pra:
Enabling the Exploration of Operating Procedures in Critical Infrastructures. Critical Infrastructure Protection 2012: 217-233 - [c10]Béla Genge, Christos Siaterlis:
An Experimental Study on the Impact of Network Segmentation to the Resilience of Physical Processes. Networking (1) 2012: 121-134 - 2011
- [c9]Béla Genge, Christos Siaterlis:
Investigating the Effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant. CRITIS 2011: 140-151 - [c8]Béla Genge, Igor Nai Fovino, Christos Siaterlis, Marcelo Masera:
Analyzing Cyber-Physical Attacks on Networked Industrial Control Systems. Critical Infrastructure Protection 2011: 167-183 - [c7]Béla Genge, Christos Siaterlis:
Developing cyber-physical experimental capabilities for the security analysis of the future Smart Grid. ISGT Europe 2011: 1-7 - [c6]Béla Genge, Christos Siaterlis:
Using Soft Real-Time Simulation in a Hybrid Environment for Cyber-Physical Security Experiments. WETICE 2011: 285-290 - [i11]Béla Genge, Piroska Haller:
Using Planetlab to Implement Multicast at the Application Level. CoRR abs/1101.5791 (2011) - 2010
- [i10]Gyula Farkas, Béla Genge, Piroska Haller:
A Platform for Implementing Secure Wireless Ad Hoc Networks. CoRR abs/1007.0917 (2010) - [i9]Béla Genge, Piroska Haller:
End-Host Distribution in Application-Layer Multicast: Main Issues and Solutions. CoRR abs/1007.0920 (2010)
2000 – 2009
- 2009
- [c5]Béla Genge, Piroska Haller:
Middleware for Automated Implementation of Security Protocols. ESWC 2009: 476-490 - [c4]Béla Genge, Piroska Haller:
A syntactic approach for identifying multi-protocol attacks. ICUMT 2009: 1-5 - [c3]Béla Genge, Piroska Haller:
Towards Automated Secure Web Service Execution. Networking 2009: 943-954 - [i8]Béla Genge, Piroska Haller, Iosif Ignat, Ovidiu Ratoi:
Informal specification-based performance evaluation of security protocols. CoRR abs/0908.2871 (2009) - [i7]Ovidiu Ratoi, Piroska Haller, Ioan Salomie, Béla Genge:
Component based platform for multimedia applications. CoRR abs/0908.3082 (2009) - [i6]Béla Genge, Piroska Haller, Ovidiu Ratoi, Iosif Ignat:
Term-based composition of security protocols. CoRR abs/0908.3083 (2009) - [i5]Béla Genge, Piroska Haller:
A Modeling Framework for Generating Security Protocol Specifications. CoRR abs/0908.3090 (2009) - [i4]Béla Genge, Iosif Ignat, Piroska Haller:
Automated Composition of Security Protocols. CoRR abs/0908.4325 (2009) - [i3]Béla Genge, Piroska Haller:
Extending WS-Security to Implement Security Protocols for Web Services. CoRR abs/0909.1639 (2009) - [i2]Attila Magyari, Béla Genge, Piroska Haller:
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems. CoRR abs/0909.1640 (2009) - [i1]Béla Genge, Piroska Haller:
Performance Evaluation of Security Protocols. CoRR abs/0910.3765 (2009) - 2008
- [c2]Béla Genge, Piroska Haller, Ovidiu Ratoi:
Constructing Security Protocol Specifications for Web Services. IDC 2008: 245-250 - [c1]Béla Genge, Piroska Haller:
A Modeling Framework for Generating Security Protocol Specifications. SYNASC 2008: 362-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint