Citation Impact

Citing Papers

Deepfake detection using deep learning methods: A systematic and comprehensive review
2023 Standout
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems
2016
An intrusion detection and prevention system in cloud computing: A systematic review
2012
A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs
2021
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
Literature review of Industry 4.0 and related technologies
2018 Standout
Fusion of Federated Learning and Industrial Internet of Things: A survey
2022
A survey on FinTech
2017 Standout
6G Internet of Things: A Comprehensive Survey
2021 Standout
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
2023 Standout
PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities
2021
Detection of tool failure in end milling with wavelet transformations and neural networks (WT-NN)
1995
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
2009
Trust, Security and Privacy in Emerging Distributed Systems
2015
Big Data Analytics in Intelligent Transportation Systems: A Survey
2018 Standout
Advanced monitoring of machining operations
2010 Standout
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies
2017
Applications of federated learning in smart cities: recent advances, taxonomy, and open challenges
2021
Survey of intrusion detection systems: techniques, datasets and challenges
2019 Standout
Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities
2020 Standout
Alert correlation in collaborative intelligent intrusion detection systems—A survey
2011
Cyber-physical systems in manufacturing
2016 Standout
A methodology for structured ontology construction applied to intelligent transportation systems
2015
A Survey on Metaverse: Fundamentals, Security, and Privacy
2022 Standout
A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
2013
Sensor signals for tool-wear monitoring in metal cutting operations—a review of methods
2000 Standout
A survey of network anomaly detection techniques
2015 Standout
An overview of approaches to end milling tool monitoring
1999
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
2010
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
Privacy-Preserving Serverless Computing Using Federated Learning for Smart Grids
2021
End Milling Force Algorithms for CAD Systems
1991
The Efficient Use of Deficient Knowledge
1983
Prediction of Milling Force Coefficients From Orthogonal Cutting Data
1996 Standout
Cloud security issues and challenges: A survey
2016
Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions
2022 Standout
Intrusion detection system: A comprehensive review
2012 Standout
Blockchain and Edge Computing for Decentralized EMRs Sharing in Federated Healthcare
2020

Works of Péter Bertök being referenced

Intrusion Detection Based on Data Mining.
2003
The mediator authorization-security model for heterogeneous semantic knowledge bases
2015
Inprocess Monitoring of Tool Breakage Based on Auto-Regressive Model
1982
A System for Monitoring the Machining Operation by Referring to a Predicted Cutting Torque Pattern
1983
Real-time monitoring system of tool breakage using Kalman filtering
1985
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
2009
Authorization Control for a Semantic Data Repository through an Inference Policy Engine
2013
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
2020
Privacy preserving distributed machine learning with federated learning
2021
Similarity-Based SOAP Multicast Protocol to Reduce Bandwith and Latency in Web Services
2008
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges
2015
Rankless by CCL
2026