Follow
László Erdődi
László Erdődi
Researcher in Computer Science, University of Oslo
Verified email at oslomet.no - Homepage
Title
Cited by
Cited by
Year
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents
L Erdődi, ĹĹ Sommervoll, FM Zennaro
Journal of Information Security and Applications 61, 102903, 2021
432021
Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
FM Zennaro, L Erdodi
arXiv preprint arXiv:2005.12632, 2020
432020
Secure information sharing in an industrial Internet of Things
N Ulltveit-Moe, H Nergaard, L Erdödi, T Gjřsćter, E Kolstad, P Berg
arXiv preprint arXiv:1601.04301, 2016
302016
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge
FM Zennaro, L Erdődi
IET Information Security 17 (3), 441-457, 2023
262023
The Agent Web Model: modeling web hacking for reinforcement learning
L Erdődi, FM Zennaro
International Journal of Information Security, 1-17, 2021
182021
Security survey of dedicated iot networks in the unlicensed ism bands
E Kail, A Banati, E Lászlo, M Kozlovszky
2018 IEEE 12th international symposium on applied computational intelligence …, 2018
182018
File compression with LZO algorithm using NVIDIA CUDA architecture
L Erdodi, L Erdődi
2012 4th IEEE International Symposium on Logistics and Industrial …, 2012
132012
Attacking power grid substations: An experiment demonstrating how to attack the scada protocol iec 60870-5-104
L Erdődi, P Kaliyar, SH Houmb, A Akbarzadeh, AJ Waltoft-Olsen
Proceedings of the 17th International Conference on Availability …, 2022
102022
Stack-based buffer overflow detection using recurrent neural networks
WA Dahl, L Erdodi, FM Zennaro
arXiv preprint arXiv:2012.15116, 2020
92020
Finding dispatcher gadgets for jump oriented programming code reuse attacks
L Erdődi
2013 IEEE 8th International Symposium on Applied Computational Intelligence …, 2013
82013
Overview of phishing landscape and homographs in Arabic domain names
H Ahmad, L Erdodi
Security and Privacy 4 (4), e159, 2021
72021
Sql injections and reinforcement learning: An empirical evaluation of the role of action structure
M Del Verme, ĹĹ Sommervoll, L Erdődi, S Totaro, FM Zennaro
Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event …, 2021
72021
Attacking x86 windows binaries by jump oriented programming
L Erdődi
2013 IEEE 17th International Conference on Intelligent Engineering Systems …, 2013
52013
Experimental and numerical analysis of timber joints
L Erdodi, I Bodi
High Performance Structures and Materials. The 2nd Intern. Conf. Heraklion …, 2004
52004
Exploitation vs. prevention: the ongoing saga of software vulnerabilities
L Erdődi, A Jřsang
Acta Polytechnica Hungarica 17 (7), 199-218, 2020
42020
When every byte counts—Writing minimal length shellcodes
ZL Németh, L Erdődi
2015 IEEE 13th International Symposium on Intelligent Systems and …, 2015
42015
Numerical determination of the slip modulus of dowel-type timber joints
L Erdődi, I Bódi
Pollack Periodica 2 (3), 35-44, 2007
42007
Comparison of The Strength Characteristics of Wood According to Combined Stress Theories and EC5
I Bódi, L Erdödi
IABSE Symposium Report 85 (9), 1-6, 2001
42001
Security threats based on critical database system privileges
R Fleiner, R Hubert, A Bánáti, L Erdôdi
2022 IEEE 10th Jubilee International Conference on Computational Cybernetics …, 2022
32022
D3. 2–Overall System Requirements and Functional Specifications
D Gabioud, E László, G Basso
Scalable Energy Management Infrastructure for Aggregation of Households …, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20