| Secure vehicular communication systems: design and architecture P Papadimitratos, L Buttyan, T Holczer, E Schoch, J Freudiger, M Raya, ... IEEE Communications magazine 46 (11), 100-109, 2008 | 767 | 2008 |
| On the effectiveness of changing pseudonyms to provide location privacy in VANETs L Buttyán, T Holczer, I Vajda European Workshop on Security in Ad-hoc and Sensor Networks, 129-141, 2007 | 372 | 2007 |
| VeRA-version number and rank authentication in RPL A Dvir, L Buttyan 2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011 | 299 | 2011 |
| Slow: A practical pseudonym changing scheme for location privacy in vanets L Buttyán, T Holczer, A Weimerskirch, W Whyte 2009 IEEE vehicular networking conference (VNC), 1-8, 2009 | 240 | 2009 |
| CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot DI Buza, F Juhász, G Miru, M Félegyházi, T Holczer International Workshop on Smart Grid Security, 181-192, 2014 | 138 | 2014 |
| Secure and reliable clustering in wireless sensor networks: a critical survey P Schaffer, K Farkas, Á Horváth, T Holczer, L Buttyán Computer Networks 56 (11), 2726-2741, 2012 | 77 | 2012 |
| Optimal key-trees for tree-based private authentication L Buttyán, T Holczer, I Vajda International Workshop on Privacy Enhancing Technologies, 332-350, 2006 | 71 | 2006 |
| Group-based private authentication G Avoine, L Buttyant, T Holczer, I Vajda 2007 IEEE International Symposium on a World of Wireless, Mobile and …, 2007 | 61 | 2007 |
| Private cluster head election in wireless sensor networks L Buttyán, T Holczer 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 38 | 2009 |
| Spontaneous cooperation in multi-domain sensor networks L Buttyán, T Holczer, P Schaffer European Workshop on Security in Ad-hoc and Sensor Networks, 42-53, 2005 | 38 | 2005 |
| Message format and field semantics inference for binary protocols using recorded network traffic G Ládi, L Buttyán, T Holczer 2018 26th International Conference on Software, Telecommunications and …, 2018 | 31 | 2018 |
| Traffic analysis attacks and countermeasures in wireless body area sensor networks L Buttyan, T Holczer 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 31 | 2012 |
| Privacy pitfalls of releasing in-vehicle network data A Gazdag, S Lestyán, M Remeli, G Ács, T Holczer, G Biczók Vehicular Communications 39, 100565, 2023 | 22 | 2023 |
| Hide-and-Lie: enhancing application-level privacy in opportunistic networks L Dóra, T Holczer Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010 | 15 | 2010 |
| The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems T Holczer, M Félegyházi, L Buttyán Proceedings of International Conference on Computer Security in a Nuclear …, 2015 | 13 | 2015 |
| Perfectly anonymous data aggregation in wireless sensor networks L Buttyán, T Holczer The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010 | 11 | 2010 |
| Attacking IEC 60870-5-104 protocol P György, T Holczer 1st Conference on information technology and data science (CITDS), 140-150, 2020 | 10 | 2020 |
| Anonymous aggregator election and data aggregation in wireless sensor networks T Holczer, L Buttyán International Journal of Distributed Sensor Networks 7 (1), 828414, 2011 | 10 | 2011 |
| Vehicular can traffic based microtracking for accident reconstruction A Gazdag, T Holczer, L Buttyán, Z Szalay Vehicle and Automotive Engineering, 457-465, 2018 | 7 | 2018 |
| Protocol state machine reverse engineering with a teaching-learning approach G Székely, G Ládi, T Holczer, L Buttyán Acta Cybernetica 25 (2), 517-535, 2021 | 6 | 2021 |