Follow
Anton Balaz
Anton Balaz
Assistent, FEI, TUKE
Verified email at tuke.sk
Title
Cited by
Cited by
Year
Intrusion detection system using self organizing map
L Vokorokos, A Balaz, M Chovanec
Acta Electrotechnica et Informatica 6 (1), 1-6, 2006
862006
Host-based intrusion detection system
L Vokorokos, A Baláž
2010 IEEE 14th International Conference on Intelligent Engineering Systems …, 2010
562010
Application security through sandbox virtualization
L Vokorokos, A Baláž, B Madoš
Acta Polytechnica Hungarica 12 (1), 83-101, 2015
362015
Data acquisition in non-invasive brain-computer interface using emotiv epoc neuroheadset
L Vokorokos, B Mados, N Ádám, A Baláz
Acta Electrotechnica et Informatica 12 (1), 5, 2012
282012
Securing Distributed Computer Systems Using an Advanced Sophisticated Hybrid Honeypot Technology.
E Chovancová, N Adám, A Baláž, E PIETROKOVÁ, P Feciľak, S Šimoňák, ...
Computing & Informatics 36 (1), 2017
262017
Secure web server system resources utilization
L Vokorokos, A Baláž, N Ádám
Acta Polytechnica Hungarica 12 (2), 5-19, 2015
252015
Distributed detection system of security intrusions based on partially ordered events and patterns
L Vokorokos, A Baláž, M Chovanec
Towards Intelligent Engineering and Information Technology, 389-403, 2009
242009
Innovative operating memory architecture for computers using the data driven computation model
L Vokorokos, B Madoš, N Ádám, A Baláž
Acta Polytechnica Hungarica 10 (5), 63-79, 2013
232013
Artificial neural network based IDS
N Ádám, B Madoš, A Baláž, T Pavlik
2017 IEEE 15th International Symposium on Applied Machine Intelligence and …, 2017
192017
Security sandbox based on RBAC model
J Hurtuk, A Baláž, N Ádám
2016 IEEE 11th International Symposium on Applied Computational Intelligence …, 2016
172016
The impact of data representationson hardware based mlp network implementation
N Ádám, A Baláž, E Pietrikova, E Chovancová, P Feciľak
Acta Polytechnica Hungarica 15 (2), 69-88, 2018
162018
Peer to peer system deployment
B Anton, A Norbert
Acta Electrotech. Inform 16, 11-14, 2016
162016
Forensic analysis of compromised systems
A Baláž, R Hlinka
2012 IEEE 10th International Conference on Emerging eLearning Technologies …, 2012
152012
ModSecurity IDMEF module
A Baláž, N Ádám, E Pietriková, B Madoš
2018 IEEE 16th World Symposium on Applied Machine Intelligence and …, 2018
132018
Potential of low cost motion sensors compared to programming environments
J Mihaľov, E Pietriková, A Baláž, B Madoš, N Ádám
Acta Polytechnica Hungarica 15 (6), 155-177, 2018
132018
MongoDB scheme analysis
L Vokorokos, M Uchnár, A Baláž
2017 IEEE 21st International Conference on Intelligent Engineering Systems …, 2017
132017
Architecture of multi-core computer with data driven computation model
L Vokorokos, B MADOŠ, A BALÁŽ, N ÁDÁM
Acta Electrotechnica et Informatica 10 (4), 20-23, 2010
132010
Intrusion detection architecture utilizing graphics processors
L Vokorokos, A Baláž, B Madoš
Acta Informatica Pragensia 1 (1), 50-59, 2013
122013
Intrusion detection with early recognition of encrypted application
M Augustin, A Balaz
Intelligent Engineering Systems (INES), 2011 15th IEEE International …, 2011
112011
High-Performance Intrusion Detection System for Security Threats Identification in Computer Networks
L Vokorokos, N Ádám, A Baláž, J Perháč
Computer Science and Technology Research Survey 4 (4), 54-61, 2009
112009
The system can't perform the operation now. Try again later.
Articles 1–20