Follow
Tamas Bisztray
Tamas Bisztray
Postdoctoral Researcher at University of Oslo
Verified email at ifi.uio.no - Homepage
Title
Cited by
Cited by
Year
The formai dataset: Generative ai in software security through the lens of formal verification
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
Proceedings of the 19th International Conference on Predictive Models and …, 2023
572023
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge
N Tihanyi, MA Ferrag, R Jain, T Bisztray, M Debbah
2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024
33*2024
Privacy impact assessment: comparing methodologies with a focus on practicality
T Bisztray, N Gruschka
Nordic Conference on Secure IT Systems, 3-19, 2019
282019
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations
R Tóth, T Bisztray, L Erdődi
Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops: DECSoS …, 2024
112024
How secure is AI-generated code: a large-scale comparison of large language models
N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro
Empirical Software Engineering 30 (2), 1-42, 2025
10*2025
The evolution of free-space quantum key distribution
T Bisztray, L Bacsardi
Infocommunications Journal 10 (1), 22-30, 2018
92018
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks
T Bisztray, N Gruschka, T Bourlai, L Fritsch
2021 International Conference of the Biometrics Special Interest Group …, 2021
72021
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics
T Bisztray, N Gruschka, V Mavroeidis, L Fritsch
Open Identity Summit 2020, 185-192, 2020
42020
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence
N Tihanyi, T Bisztray, RA Dubniczky, R Toth, B Borsos, B Cherif, ...
2024 IEEE International Conference on Big Data, 2024
32024
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
N Tihanyi, T Bisztray, B Borsos, S Raveau
IEEE Transactions on Information Forensics and Security, 2024
32024
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications
N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis
IEEE Dataport, 2023
32023
The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade
P Ezer, K Szűcs, R Lukács, T Bisztray, G Vilmányi, I Szokodi, A Komócsi, ...
Journal of Clinical Medicine 13 (19), 5742, 2024
12024
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities
MA Ferrag, F Alwahedi, A Battah, B Cherif, A Mechri, N Tihanyi, T Bisztray, ...
Internet of Things and Cyber-Physical Systems, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–13