Imre Lendak

Imre Lendak
University of Novi Sad · Department of Power, Electronics and Telecommunications Engineering

PhD

About

56
Publications
21,230
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
328
Citations
Citations since 2017
22 Research Items
188 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
Introduction
Imre Lendak currently works at the Faculty of technical sciences, University of Novi Sad where he teaches information security and distributed architectures. Imre does research in critical infrastructure protection, information security education and data engineering. He coordinates the Information Security Services Education in Serbia Erasmus+ Capacity Building in the field of Higher Education (CBHE) project founded by the European Union and developing novel MSc programs in information security at four higher education institutions in Serbia. The training provider partners are the CrySys Lab of the Budapest University of Technology and Economics, Stefano Zanero's team at the Politecnico di Milano and prof. Miroslav Baca's team at the University of Zagreb, Croatia.
Additional affiliations
September 2013 - present
University of Novi Sad
Position
  • Professor (Assistant)
November 2012 - June 2014
Budapest University of Technology and Economics
Position
  • Senior Researcher
Description
  • I was involved in 2 research projects dealing with applied crowdsourcing in urban transport systems. The specific themes were: parking spot monitoring and real-time monitoring of (urban transport) vehicles.

Publications

Publications (56)
Preprint
Full-text available
Content delivery networks (CDNs) are the backbone of the Internet and are key in delivering high quality video on demand (VoD), web content and file services to billions of users. CDNs usually consist of hierarchically organized content servers positioned as close to the customers as possible. CDN operators face a significant challenge when analyzi...
Preprint
Full-text available
Content delivery networks (CDNs) are key components of high throughput, low latency services on the internet. CDN cache servers have limited storage and bandwidth and implement state-of-the-art cache admission and eviction algorithms to select the most popular and relevant content for the customers served. The aim of this study was to utilize state...
Article
Electric power distribution systems can be represented with mathematical graphs in which the hub nodes are substations receiving electric power from the transmission system and delivering it to the consumers via feeders consisting of transformers, junctions, cables and power lines. High-quality diagrams depicting these systems are key elements of e...
Conference Paper
This article presents a new free web-based application, the Cybersecurity Job Ads Analyzer, which has been created to collect and analyse job adverts using a machine learning algorithm. This algorithm enables the detection of the skills required in advertised cybersecurity work positions. The application is both interactive and dynamic allowing for...
Conference Paper
Full-text available
—Industrial Control Systems (ICSs) utilize different sensors and various embedded systems to operate. Devices often communicate using protocols like Siemens Step 7 and Modbus, which were designed for use in closed networks many years ago and are vulnerable to attacks. The goal of this study is to detect anomalies in industrial control systems using...
Conference Paper
Full-text available
Content delivery networks (CDNs) are the backbone of the Internet and are key in delivering high quality video on demand (VoD), web content and file services to billions of users. CDNs usually consist of hierarchically organized content servers positioned as close to the customers as possible. CDN operators face a significant challenge when analyzi...
Conference Paper
Full-text available
Content delivery networks (CDNs) are key components of high throughput, low latency services on the internet. CDN cache servers have limited storage and bandwidth and implement state-of-the-art cache admission and eviction algorithms to select the most popular and relevant content for the customers served. The aim of this study was to utilize state...
Article
Full-text available
Web archives store born-digital documents, which are usually collected from the Internet by crawlers and stored in the Web Archive (WARC) format. The trustworthiness and integrity of web archives is still an open challenge, especially in the news portal domain, which face additional challenges of censorship even in democratic societies. The aim of...
Chapter
Full-text available
Background. Web archives store born-digital documents, which are usually collected from the Internet by crawlers and stored in the Web Archive (WARC) format. The trustworthiness and integrity of web archives is still an open challenge, especially in the news portal domain, which face additional challenges of censorship even in democratic societies.
Chapter
Differentially private algorithmic synthetic data generation (SDG) solutions take input datasets \(D_p\) consisting of sensitive, private data and generate synthetic data \(D_s\) with similar qualities. The importance of such solutions is increasing both because more and more people realize how much data is collected about them and used in machine...
Article
Full-text available
Intersections.EEJSP 6(2): 130-153. Abstract The goal of this paper is to present an analysis of the status and career choices of Hungarian, Slovak, and Romanian ethnic minority high school graduates in the Autonomous Province of Vojvodina, the northern province of Serbia. We implemented a purpose-built, paper-based-questionnaire process of data col...
Chapter
The goal of this paper is to simulate the effects of different Distributed Denial of Service (DDoS) attack scenarios which might be launched against smart grid Supervisory Control and Data Acquisition systems, i.e. SCADAs. We will analyze attacks which are launched from compromised Remote Terminal Units (RTUs) located in the process environment. We...
Article
The primary goal of this paper is to present a security risk assessment-based methodology for migrating sensitive Smart grid operational technology (OT) services to the computing cloud, either on or off-premise. We created a baseline system architecture diagram for smart grid Industrial Control Systems (ICS) aligned with the IEC-62443 model of secu...
Conference Paper
Full-text available
Invoices are issued by companies, banks and different organizations in different forms including handwritten and machine-printed ones; sometimes, receipts are included as a separated form of invoices. In current practice, normally, classifying these types is done manually, since each needs a special kind of processing such as making them suitable f...
Article
Today, with the increasing popularity of JSON-LD on the Web, there is a need for transformation and extraction of such structured data. In this paper, the authors propose extensions of the JSON-LD Framing specification which are able to create a tree layout based on recursive application of prioritized inverse relationships defined in a frame. The...
Presentation
Full-text available
Critical infrastructures are man-made complex, distributed systems used for delivering essential resources and services (e.g. electricity, gas, networking) to businesses and end users. As modern society and businesses cannot correctly function during disruptions in these critical services, it is of utmost importance to properly protect these system...
Conference Paper
Full-text available
The goal of this paper is to present a simulation environment capable to investigate various peer review scenarios involving non-financial reviewer motivation techniques in peer review systems involving thousands of reviewers. In this context, the reviewers form a crowd which solves reviewing tasks, thereby creating a crowdsourced system. The autho...
Conference Paper
A folyóiratok szerkesztői, illetve a konferenciák szervező bizottságainak tagjai sűrűn szembesülnek azzal, hogy nincs kinek kiadniuk a beérkezett tudományos dolgozatok elbírálását. Emiatt a benyújtott dolgozatok szerzőinek sokat kelll várniuk a recenzió folyamatának befejezésére, illetve sokszor csak egy recenziót kapnak, rosszabbik esetben felület...
Conference Paper
This paper presents an algorithm for one-line diagram generation of multiple interconnected, i.e. weakly meshed, feeders supplied by one distribution substation. The substation area is modeled with a mathematical graph, which is then prepared and drawn in multiple steps. A vertex propagation algorithm is applied starting at the substation vertex to...
Conference Paper
Full-text available
The primary goal of this paper is to investigate what could have made successful Google’s OpenSpot, a crowdsensing based parking assistance application cancelled in 2012. For this analysis we have developed UPark, a simulation environment capable of simulating large numbers of vehicles, which look for optimal parking spots in busy urban environment...
Chapter
Full-text available
The Smart City connects citizens in novel ways by leveraging the latest advances in information and communication technologies (ICT). Smart citizens have various ICT solutions at their disposal, which allow them to optimize their day-to-day activities in the urban environment they live and/or work. The integration of rich sensing capabilities (e.g....
Conference Paper
In this paper existing means of realization of Common Information Model (CIM) profiles are analyzed with the focus on human readability. The IEC 61970-501 standard describes the process of mapping CIM into XML using the RDF Schema. In practice, CIM profiles may be defined using standardized CIM RDF Schema, or using OWL having both of them expressed...
Conference Paper
Full-text available
The goal of this paper is to analyze existing simulation engines and assess how well-suited they are for simulating the formation, existence and dissolution of dynamic social networks, with a special emphasis on networks formed around crowdsensing efforts. The crowd in this context is a loosely-coupled social network of people, who use their mobile...
Article
Full-text available
This paper presents a one line diagram generation algorithm capable of drawing multiple feeders supplied by a single (electric power) distribution substation. First the substation area is represented with a mathematical graph. A combination of iterative and recursive methods are applied to draw that graph. There are two iterative steps: the whole g...
Conference Paper
This paper presents a one line diagram generation algorithm capable of drawing multiple feeders supplied by a single (electric power) distribution substation. First the substation area is represented with a mathematical graph. A combination of iterative and recursive methods are applied to draw that graph. There are two iterative steps: the whole g...
Conference Paper
Full-text available
Smart cities offer services to their inhabitants which make everyday life easier beyond providing a feedback channel to the city administration. For instance, a live timetable service for public transportation or real-time traffic jam notification can increase the efficiency of travel planning substantially. Traditionally, the implementation of the...
Conference Paper
This paper presents an electric power distribution system (EPDS) visualization algorithm which performs graph partitioning before generating the visual representations, i.e. one line diagrams. The proposed algorithm is different from similar algorithms as it performs graph partitioning to reduce the solution space. The partitioning step is necessar...
Conference Paper
Full-text available
This paper describes an algorithm which automatically generates adaptive one-line diagrams of large electric power distribution systems. The proposed algorithm is different from similar algorithms as it performs adaptive one-line diagram generation, which differ for various zoom levels, showing only the most important objects (e.g. substations, pol...
Article
In this paper, the data envelopment analysis method is used to examine the competitiveness of higher education in selected countries / regions in Europe. The competitiveness of higher education is analyzed on the basis of available information on the chosen indicators, interacting with a model of investment which is applied in the field of higher e...
Article
Full-text available
This paper assesses the applicability of client side Internet technologies in software solutions for critical infrastructure systems (CIS). It contains an in-depth analysis of four significant and well known development platforms, namely JavaScript with jQuery, the Google Web Tookit, Microsoft’s Silverlight and Adobe’s Flash/Flex. They were compare...
Conference Paper
This paper presents an algorithm for automatic one-line diagram generation for power distribution systems. These systems are large and their mathematical graph representations consist of (up to) thousands of vertices (substations, junctions, pole switches) and edges (i.e. power lines). Their succinct visualization is essential in SCADA applications...
Article
The Common Information Model (CIM) is an IEC standard which defines an object model for Energy and Distribution Management Systems (EMS/DMS). The OPC Unified Architecture (UA) is an emerging specification from the OPC Foundation that utilizes service oriented architecture (SOA) and various other new technologies. This paper proposes to unify these...
Article
Full-text available
Critical infrastructure systems (CISs), such as power grids, transportation systems, communication networks and water systems are the backbone of a country's national security and industrial prosperity. These CISs execute large numbers of workflows with very high resource requirements that can span through different systems and last for a long time...
Article
Full-text available
In this paper, we propose a Hybrid Genetic Algorithm for data model partitioning of power distribution network. Analytical functions are the core of Distribution Management Systems (DMSs). Efficient calculation of the functions is of the utmost importance for the DMS users; the necessary preconditions for the efficient calculation are optimal load...
Article
Full-text available
Grid computing could be the future computing paradigm for enterprise applications, one of its benefits being that it can be used for executing large scale applications. Utility Management Systems execute very large numbers of workflows with very high resource requirements. This paper proposes architecture for a new scheduling mechanism that dynamic...
Article
This paper shows the result of an analysis pertaining to the applicability of RESTful web services (RESTful WS) in solving various software and data integration scenarios in control centers for the electric power system domain. There are many possible ways to enhance power system software/data integration by combining RESTful WS and the IEC 61970 s...
Article
This paper presents a novel algorithm for finding the catalog of topologies in a power system’s model in the Common Information Model (CIM) format. The algorithm prepares the models of complex, large-scale power systems (e.g., Smart Grids with renewable energy sources) and allows analytic Distribution Management System (DMS) functions to achieve hi...
Conference Paper
This paper shows one possible way to enhance power system software integration by combining RESTful Web services (RESTful WS) and the IEC 61970 set of standards. We also discuss the differences between SOAP and RESTful Web services in the context of this research. We propose a Web service, which wraps the resource oriented power system data model d...
Article
Full-text available
This paper presents an extension of the CIM (Common Information Model) with a definition for Virtual Meter. Virtual Meter is a logical group of Meters that can be used for preprocessing the data for the performance purposes. This extension has been implemented by defining an additional set of classes for Virtual Meters. The extended CIM was tested...
Article
Full-text available
For smart metering systems (SMSs), this study presents a novel architecture, which allows simple, secure and fast integration of SMSs with other software products. Proposed architecture that combines better features of two models [Common Information Model (CIM) and OPC's Unified Architecture (UA)] has proven in practice as a good basis for a commer...
Conference Paper
This paper analyzes various algorithms for the automatic generation of electric power system one-line diagrams. Historically these one-line diagrams were created manually. As these diagrams can be large, their manual creation takes a lot of time and resources, and it is also prone to errors. One possible solution to this problem is the automatic ge...
Conference Paper
Grid computing is the future computing paradigm for enterprise applications. It can be used for executing large scale workflow applications. This paper focuses on the workflow scheduling mechanism. Although there is much work on static scheduling approaches for workflow applications in parallel environments, little work has been done on a Grid envi...
Article
Full-text available
This paper focuses on grid performance optimization in large scale workflow applications with an intelligent workflow scheduling mechanism. Utility Management Systems (UMS) are managing very large numbers of workflows with very high resource requirements. This paper proposes a UMS scheduling architecture which dynamically executes a scheduling algo...
Article
In this paper a new method is shown for reconstructing binary contours from its two orthogonal projections. The paper focuses on the reconstruction of contours whose inner territory is hv-convex. Since the inner territory of the contour is hv-convex, the first and the last row and column of ones are comprised from one part, while all other rows and...
Article
This paper discusses an algorithm for automatic one-line diagram generation based on the genetic algorithm (GA). One-line diagrams are used in electric power system visualization which is very important in modern control centers for both online and offline operations as the graphical representations convey information to dispatchers and engineers a...
Conference Paper
Full-text available
The emerging computational grid infrastructure consists of heterogeneous resources in widely distributed autonomous domains, which makes job scheduling very challenging. Although there is much work on static scheduling approaches for workflow applications in parallel environments, little work has been done on a real-world Grid environment for indus...
Conference Paper
This paper shows one possible way to enhance power system software integration by leveraging RESTful web services in the process of publishing power system state variables, i.e. the results of simulation functions used in power system analysis.<sup>1</sup> Different simulation functions are executed in power system control centers with various goal...
Article
Full-text available
In this paper, we present a scheduler for distributing workflows in Utility Management System (UMS). The system executes a large number of workflows, which have very high resource requirements. The workflows have different computational requirements and thus the optimization of resource utilization must be performed in a way that is different from...
Article
The deregulation of the electrical utility industry has made it necessary to develop certain standards which would allow various participants in the industry to exchange electronic information efficiently. A standard which addresses this need is the Common Information Model (CIM) developed by the IEC. This paper will propose a solution which would...

Network

Cited By

Projects

Projects (4)
Project
We propose to work on the preparation of a European Joint Master Program in cybersecurity which promotes synergies between the different partners based on their actual experiences and expertise, with one of its objectives to provide a unique educational and training approach that aims to offer students a holistic perspective of cybersecurity, while at the same time preparing them for employment.