Solution for the broadcasting in the Kademlia peer-to-peer overlay Z Czirkos, G Hosszú Computer Networks 57 (8), 1853-1862, 2013 | 19 | 2013 |
Enhancing collaborative intrusion detection methods using a Kademlia overlay network Z Czirkos, G Hosszú Information and Communication Technologies: 18th EUNICE/IFIP WG 6.2, 6.6 …, 2012 | 9 | 2012 |
Enhancing the kademlia p2p network Z Czirkos, G Hosszú Periodica Polytechnica Electrical Engineering (Archives) 54 (3-4), 87-92, 2010 | 7 | 2010 |
A quasi-SPICE electro-thermal simulator A Szalai, Z Czirkos, V Székely 18th International Workshop on THERMal INvestigation of ICs and Systems, 1-6, 2012 | 6 | 2012 |
“Why Can’t I Learn Programming?” The Learning and Teaching Environment of Programming Z Szalayné Tahy, Z Czirkos Informatics in Schools: Improvement of Informatics Knowledge and Perception …, 2016 | 5 | 2016 |
Network-based intrusion detection G Hosszú, Z Czirkos Encyclopedia of Internet technologies and applications, 353-359, 2008 | 5 | 2008 |
Improving attack aggregation methods using distributed hash tables Z Czirkos, M Rencz, G Hosszú The Seventh International Conference on Internet Monitoring and Protection …, 2012 | 4 | 2012 |
Peer-to-peer methods for operating system security Z Czirkos, G Hosszú Encyclopedia of Networked and Virtual Organizations, 1185-1191, 2008 | 3 | 2008 |
P2P based intrusion detection Z CZIRKOS, G HOSSZÚ Encyclopedia of Information Communication Technology, 2019 | 2 | 2019 |
A distributed Hash table assisted intrusion prevention system Z Czirkos, M Rencz, G Hosszú International Journal on Advances in Security Volume 5, Number 3 & 4, 2012, 2012 | 2 | 2012 |
Progress Log for Mentoring Programming Education ZS Tahy, Z Czirkos Proceedings of International Conference on Informatics in Schools: Situation …, 2017 | 1 | 2017 |
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P System Z Czirkos, G Bognár, G Hosszú International Journal on Communication 4 (1), 26, 2013 | 1 | 2013 |
Pseudo Reliable Broadcast in the Kademlia P2P System Z Czirkos, G Bognár, G Hosszú Computer Science and Communication Devices: Proceedings of Int. Conf. EDC, 2012 | 1 | 2012 |
On the Stability of Peer-to-Peer Networks in Real-World Environments Z Czirkos, G Hosszú Encyclopedia of Information Communication Technology, 622-630, 2009 | 1 | 2009 |
Analisis Learning Obstacle Menggunakan Pembelajaran Didaktis pada Materi Himpunan KQ Salma, AK Haqiqi | | 2024 |
Usage of Broadcast Messaging in a Distributed Hash Table for Intrusion Detection Z Czirkos, G Hosszú Privacy, Intrusion Detection and Response: Technologies for Protecting …, 2012 | | 2012 |
Biztonsági célú átfedő hálózat Z Czirkos Budapesti Műszaki és Gazdaságtudományi Egyetem, 2011 | | 2011 |
Intrusion Detection Based on P2P Software Z Czirkos, G Hosszú Encyclopedia of Information Science and Technology, Second Edition, 2232-2238, 2009 | | 2009 |
Application of the P2P Model for Adaptive Host Protection Z Czirkos Encyclopedia of Multimedia Technology and Networking, Second Edition, 54-60, 2009 | | 2009 |
A Novel Application of the P2P Technology for Intrusion Detection Z Czirkos, G Hosszú Encyclopedia of Information Communication Technology, 616-621, 2009 | | 2009 |