Nash equilibria of packet forwarding strategies in wireless ad hoc networks M Felegyhazi, JP Hubaux, L Buttyan IEEE Transactions on Mobile computing 5 (5), 463-476, 2006 | 468 | 2006 |
Game theory in wireless networks: A tutorial M Felegyhazi, JP Hubaux | 411 | 2006 |
Click trajectories: End-to-end analysis of the spam value chain K Levchenko, A Pitsillidis, N Chachra, B Enright, C Grier, T Halvorson, ... Security and Privacy (SP), 2011 IEEE Symposium on, 431-446, 2011 | 371 | 2011 |
The cousins of stuxnet: Duqu, flame, and gauss B Bencsáth, G Pék, L Buttyán, M Felegyhazi Future Internet 4 (4), 971-1003, 2012 | 286 | 2012 |
On the Potential of Proactive Domain Blacklisting. M Felegyhazi, C Kreibich, V Paxson LEET 10, 6-6, 2010 | 250 | 2010 |
Non-cooperative multi-radio channel allocation in wireless networks M Felegyhazi, M Cagalj, SS Bidokhti, JP Hubaux IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 224 | 2007 |
The long {“Taile”} of typosquatting domain names J Szurdi, B Kocso, G Cseh, J Spring, M Felegyhazi, C Kanich 23rd USENIX Security Symposium (USENIX Security 14), 191-206, 2014 | 214 | 2014 |
Competitive cyber-insurance and internet security N Shetty, G Schwartz, M Felegyhazi, J Walrand Economics of information security and privacy, 229-247, 2010 | 168 | 2010 |
A survey of interdependent information security games A Laszka, M Felegyhazi, L Buttyan ACM Computing Surveys (CSUR) 47 (2), 1-38, 2014 | 159 | 2014 |
Duqu: Analysis, detection, and lessons learned B Bencsáth, G Pék, L Buttyán, M Félegyházi ACM European Workshop on System Security (EuroSec) 2012, 2012 | 151 | 2012 |
Barter trade improves message delivery in opportunistic networks L Buttyán, L Dóra, M Félegyházi, I Vajda Ad Hoc Networks 8 (1), 1-14, 2010 | 150 | 2010 |
Equilibrium analysis of packet forwarding strategies in wireless ad hoc networks–the static case M Félegyházi, L Buttyán, JP Hubaux Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC …, 2003 | 133 | 2003 |
CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot DI Buza, F Juhász, G Miru, M Félegyházi, T Holczer Smart Grid Security: Second International Workshop, SmartGridSec 2014 …, 2014 | 121 | 2014 |
Duqu: A Stuxnet-like malware found in the wild B Bencsáth, G Pék, L Buttyán, M Félegyházi CrySyS Lab Technical Report 14, 1-60, 2011 | 113 | 2011 |
On wireless social community networks MH Manshaei, J Freudiger, M Félegyházi, P Marbach, JP Hubaux IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1552-1560, 2008 | 103 | 2008 |
FlipThem: Modeling targeted attacks with FlipIt for multiple resources A Laszka, G Horvath, M Felegyhazi, L Buttyán Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 98 | 2014 |
Barter-based cooperation in delay-tolerant personal wireless networks L Buttyan, L Dora, M Felegyhazi, I Vajda 2007 IEEE International Symposium on a World of Wireless, Mobile and …, 2007 | 94 | 2007 |
Revocation games in ephemeral networks M Raya, MH Manshaei, M Félegyházi, JP Hubaux Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 89 | 2008 |
Efficient MAC in cognitive radio systems: A game-theoretic approach M Felegyhazi, M Cagalj, JP Hubaux IEEE Transactions on wireless Communications 8 (4), 1984-1995, 2009 | 88 | 2009 |
On the Effects of Registrar-level Intervention H Liu, K Levchenko, M Felegyhazi, C Kreibich, G Maier, GM Voelker, ... Proc. of 4th USENIX LEET, 2011 | 64 | 2011 |