default search action
Imre Lendak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Sara Ricci, Simon Parker, Jan Jerabek, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Imre Lendak, Vladimir Janout:
Understanding Cybersecurity Education Gaps in Europe. IEEE Trans. Educ. 67(2): 190-201 (2024) - [c23]Petr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão:
Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques. ARES 2024: 107:1-107:10 - [c22]Marko Zivanovic, Imre Lendák, Ranko Popovic:
Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern Europe. ARES 2024: 108:1-108:8 - [c21]Máté Hekfusz, Vrushali Mahajan, Adolf Kamuzora, Imre Lendák:
Data Distribution-Based Change Detection Framework in SWaT Security Monitoring. ICCCI (CCIS Volume 2) 2024: 16-28 - 2023
- [j6]Nemanja Kovacev, Milan Gavric, Imre Lendák:
Algorithm for visualizing substation areas in electric power systems. Expert Syst. Appl. 212: 118733 (2023) - [c20]Yianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak:
DJM-CYBER: A Joint Master in Advanced Cybersecurity. ARES 2023: 65:1-65:10 - [c19]Marko Zivanovic, Imre Lendak, Ranko Popovic:
Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM). ARES 2023: 70:1-70:9 - [c18]Andrea Galloni, Imre Lendák:
Differentially Private Copulas, DAG and Hybrid Methods: A Comprehensive Data Utility Study. ICCCI 2023: 270-281 - 2022
- [j5]Imre Lendák, Balázs Indig, Gábor Palkó:
WARChain: Consensus-based trust in web archives via proof-of-stake blockchain technology. J. Comput. Secur. 30(3): 499-515 (2022) - [c17]Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys:
Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. ARES 2022: 84:1-84:10 - [i2]Ermiyas Birihanu, Jiyan Mahmud, Péter Kiss, Adolf Kamuzora, Wadie Skaf, Tomás Horváth, Tamás Jursonovics, Peter Pogrzeba, Imre Lendák:
Client Error Clustering Approaches in Content Delivery Networks (CDN). CoRR abs/2210.05314 (2022) - [i1]Adolf Kamuzora, Wadie Skaf, Ermiyas Birihanu, Jiyan Mahmud, Péter Kiss, Tamás Jursonovics, Peter Pogrzeba, Imre Lendák, Tomás Horváth:
Matrix Factorization for Cache Optimization in Content Delivery Networks (CDN). CoRR abs/2211.08273 (2022) - 2020
- [c16]Andrea Galloni, Imre Lendák, Tomás Horváth:
A Novel Evaluation Metric for Synthetic Data Generation. IDEAL (2) 2020: 25-34 - [c15]Gábor Szegedi, Diána Bajdikné Veres, Imre Lendák, Tomás Horváth:
Context-based Information Classification on Hungarian Invoices. ITAT 2020: 147-151 - [c14]Imre Lendák, Balázs Indig, Gábor Palkó:
WARChain: Blockchain-Based Validation of Web Archives. STAST 2020: 121-134
2010 – 2019
- 2019
- [c13]Damjan Gogic, Bojan Jelacic, Imre Lendák:
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 86-97 - [c12]Imre Lendák, Tomás Horváth:
Efficient Load Profiling and Forecasting in Large Electric Power Systems. ITAT 2019: 36-43 - [c11]Imre Lendak:
Simulation-based evaluation of a crowdsourced expert peer review system. PerCom Workshops 2019: 77-82 - 2018
- [c10]Ivana Kovacevic, Aleksandar Erdeljan, Miroslav Zaric, Nikola Dalcekovic, Imre Lendak:
Modelling access control for CIM based graph model in Smart Grids. ICSPIS 2018: 1-4 - 2017
- [c9]Bojan Jelacic, Daniela Rosic, Imre Lendak, Marina Stanojevic, Sebastijan Stoja:
STRIDE to a Secure Smart Grid in a Hybrid Cloud. CyberICPS/SECPRE@ESORICS 2017: 77-90 - 2016
- [c8]Kosa Nenadic, Marko Letic, Milan Gavric, Imre Lendak:
Rendering of JSON-LD CIM profile using web components. SISY 2016: 251-256 - [c7]Imre Lendak, Károly Farkas:
How many drivers does it take to spot an OpenSpot? SMC 2016: 401-406 - [c6]Nemanja Kovacev, Imre Lendak:
Algorithms for drawing weakly meshed distribution substation areas. SMC 2016: 1153-1158 - 2015
- [c5]Károly Farkas, Imre Lendak:
Simulation environment for investigating crowd-sensing based urban parking. MT-ITS 2015: 320-327 - 2013
- [c4]Nemanja Kovacev, Imre Lendák, Darko Capko, Aleksandar Erdeljan:
Electric power distribution system visualization with graph partitioning. AFRICON 2013: 1-6 - [c3]R. Szabo, Károly Farkas, Marton Ispany, András A. Benczúr, Norbert Bátfai, Péter Jeszenszky, S. Laki, A. Vagner, Lajos Kollár, Csaba István Sidló, Renátó Besenczi, M. Smajda, G. Kover, T. Szincsak, Tamás Kádek, Mark Kosa, Attila Adamkó, Imre Lendak, Bernát Wiandt, T. Tomas, Adam Zsolt Nagy, Gábor Fehér:
Framework for smart city applications based on participatory sensing. CogInfoCom 2013: 295-300 - 2012
- [j4]Imre Lendak, Nikola Ivancevic, Srdjan Vukmirovic, Ervin D. Varga, Kosa Nenadic, Aleksandar Erdeljan:
Client Side Internet Technologies in Critical Infrastructure Systems. Int. J. Comput. Commun. Control 7(5): 879-891 (2012) - 2011
- [j3]Imre Lendak, Aleksandar Erdeljan, Dragan S. Popovic:
Algorithm for cataloging topologies in the Common Information Model (CIM). Comput. Math. Appl. 61(3): 715-721 (2011) - [j2]Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Darko Capko, Nemanja Nedic:
Optimization of workflow scheduling in Utility Management System with hierarchical neural network. Int. J. Comput. Intell. Syst. 4(4): 672-679 (2011) - [j1]Darko Capko, Aleksandar Erdeljan, Srdjan Vukmirovic, Imre Lendak:
A Hybrid Genetic Algorithm for Partitioning of Data Model in Distribution Management Systems. Inf. Technol. Control. 40(4): 316-322 (2011) - 2010
- [c2]Srdjan Vukmirovic, Aleksandar Erdeljan, Imre Lendak, Nemanja Nedic:
Neural network workflow scheduling for large scale Utility Management Systems. SMC 2010: 2307-2311 - [c1]Imre Lendak, Aleksandar Erdeljan, Darko Capko, Srdjan Vukmirovic:
Algorithms in electric power system one-line diagram creation. SMC 2010: 2867-2873
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint