<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://aiq.hu/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='2026.03.11. 21:52' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://aiq.hu/28-2-4-a-sebezhetosegek-kozzetetelenek-idovonala-vulnerability-disclosure-timeline/</loc>
		<lastmod>2025-10-06T10:20:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-2-4-vulnerability-disclosure-timeline/</loc>
		<lastmod>2025-10-06T10:20:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-2-5-patch-management-protokoll/</loc>
		<lastmod>2025-10-06T10:20:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-2-5-patch-management-protocol/</loc>
		<lastmod>2025-10-06T10:20:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-3-1-ctf-capture-the-flag-szervezes/</loc>
		<lastmod>2025-10-06T10:20:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-3-1-ctf-capture-the-flag-organization/</loc>
		<lastmod>2025-10-06T10:20:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-3-2-red-team-verseny-formatumok/</loc>
		<lastmod>2025-10-06T10:20:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-3-2-red-team-competition-formats/</loc>
		<lastmod>2025-10-06T10:20:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-3-3-ertekelesi-kriteriumok/</loc>
		<lastmod>2025-10-06T10:20:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-3-3-evaluation-criteria/</loc>
		<lastmod>2025-10-06T10:20:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-3-4-dijazas-es-elismeres/</loc>
		<lastmod>2025-10-06T10:20:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-3-4-awards-and-recognition/</loc>
		<lastmod>2025-10-06T10:20:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-3-5-tanulasi-eredmenyek-megosztasa/</loc>
		<lastmod>2025-10-06T10:20:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-3-5-sharing-learning-outcomes/</loc>
		<lastmod>2025-10-06T10:20:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-4-1-projekt-inditasi-utmutato/</loc>
		<lastmod>2025-10-06T10:20:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-4-1-project-startup-guide/</loc>
		<lastmod>2025-10-06T10:20:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-4-2-hozzajarulasi-iranyelvek/</loc>
		<lastmod>2025-10-06T10:20:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-4-2-contribution-guidelines/</loc>
		<lastmod>2025-10-06T10:20:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-4-3-code-review-folyamat/</loc>
		<lastmod>2025-10-06T10:20:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-4-3-code-review-process/</loc>
		<lastmod>2025-10-06T10:20:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-4-4-verziokezeles-es-release/</loc>
		<lastmod>2025-10-06T10:20:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-4-4-version-control-and-release/</loc>
		<lastmod>2025-10-06T10:20:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-4-5-kozosseg-epites-es-moderalas/</loc>
		<lastmod>2025-10-06T10:20:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-4-5-community-building-and-moderation/</loc>
		<lastmod>2025-10-06T10:20:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-5-1-blog-es-publikacios-iranyelvek/</loc>
		<lastmod>2025-10-06T10:20:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-5-1-blog-and-publication-guidelines/</loc>
		<lastmod>2025-10-06T10:20:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-5-2-konferencia-eloadas-keszites/</loc>
		<lastmod>2025-10-06T10:20:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-5-2-conference-presentation-preparation/</loc>
		<lastmod>2025-10-06T10:20:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-5-3-workshop-es-training-anyagok/</loc>
		<lastmod>2025-10-06T10:20:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-5-3-workshop-and-training-materials/</loc>
		<lastmod>2025-10-06T10:20:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-5-4-podcast-es-video-tartalmak/</loc>
		<lastmod>2025-10-06T10:20:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-5-4-podcast-and-video-content/</loc>
		<lastmod>2025-10-06T10:20:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/28-5-5-social-media-strategia/</loc>
		<lastmod>2025-10-06T10:20:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/28-5-5-social-media-strategy/</loc>
		<lastmod>2025-10-06T10:20:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-1-1-a-hugging-face-es-tarsainak-biztonsagi-architekturaja/</loc>
		<lastmod>2025-10-06T10:20:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-1-1-security-architecture-of-hugging-face-and-peers/</loc>
		<lastmod>2025-10-06T10:20:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-1-2-modell-hubok-hitelesitesi-gyengesegei/</loc>
		<lastmod>2025-10-06T10:20:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-1-2-model-hub-authentication-weaknesses/</loc>
		<lastmod>2025-10-06T10:20:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-1-3-ellenorzes-megkerulesi-technikak/</loc>
		<lastmod>2025-10-06T10:20:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-1-3-verification-bypass-techniques/</loc>
		<lastmod>2025-10-06T10:20:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-1-4-kozossegi-modellekbe-vetett-bizalom-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:20:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-1-4-exploiting-trust-in-community-models/</loc>
		<lastmod>2025-10-06T10:20:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-1-5-automatizalt-mergezesi-folyamat-kiepitese/</loc>
		<lastmod>2025-10-06T10:20:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-1-5-building-automated-poisoning-pipelines/</loc>
		<lastmod>2025-10-06T10:20:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-2-1-alvo-ugynok-modellek-tervezese/</loc>
		<lastmod>2025-10-06T10:20:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-2-1-designing-sleeper-agent-models/</loc>
		<lastmod>2025-10-06T10:20:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-2-2-kioldo-mechanizmusok-implementalasa/</loc>
		<lastmod>2025-10-06T10:20:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-2-2-implementing-trigger-mechanisms/</loc>
		<lastmod>2025-10-06T10:20:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-2-3-szteganografiai-hatso-ajto-elrejtes/</loc>
		<lastmod>2025-10-06T10:20:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-2-3-steganographic-backdoor-concealment/</loc>
		<lastmod>2025-10-06T10:20:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-2-4-tobblepcsos-aktivalasi-lancok/</loc>
		<lastmod>2025-10-06T10:26:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-2-4-multi-stage-activation-chains/</loc>
		<lastmod>2025-10-06T10:26:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-2-5-perzisztens-hatso-ajtok-tulelesi-strategiai/</loc>
		<lastmod>2025-10-06T10:26:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-2-5-persistent-backdoor-survival-strategies/</loc>
		<lastmod>2025-10-06T10:26:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-3-1-pytorch-pickle-sebezhetosegek-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:26:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-3-1-exploiting-pytorch-pickle-vulnerabilities/</loc>
		<lastmod>2025-10-06T10:26:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-3-2-tensorflow-savedmodel-mergezes/</loc>
		<lastmod>2025-10-06T10:26:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-3-2-tensorflow-savedmodel-poisoning/</loc>
		<lastmod>2025-10-06T10:26:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-3-3-az-onnx-formatum-sebezhetosegei/</loc>
		<lastmod>2025-10-06T10:26:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-3-3-onnx-format-vulnerabilities/</loc>
		<lastmod>2025-10-06T10:26:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-3-4-kvantalt-modellek-hatso-ajtajai/</loc>
		<lastmod>2025-10-06T10:26:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-3-4-quantized-model-backdoors/</loc>
		<lastmod>2025-10-06T10:26:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-3-5-modellkonverzios-tamadasok/</loc>
		<lastmod>2025-10-06T10:26:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-3-5-model-conversion-attacks/</loc>
		<lastmod>2025-10-06T10:26:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-4-1-finomhangolas-soran-aktivalodo-hatso-ajtok/</loc>
		<lastmod>2025-10-06T10:26:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-4-1-backdoors-activated-during-fine-tuning/</loc>
		<lastmod>2025-10-06T10:26:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-4-2-domain-adaptacios-mergezes/</loc>
		<lastmod>2025-10-06T10:26:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-4-2-domain-adaptation-poisoning/</loc>
		<lastmod>2025-10-06T10:26:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-4-3-jellemzokinyerok-manipulacioja/</loc>
		<lastmod>2025-10-06T10:26:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-4-3-feature-extractor-manipulation/</loc>
		<lastmod>2025-10-06T10:26:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-4-4-kaszkadolt-modellfertozesek/</loc>
		<lastmod>2025-10-06T10:26:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-4-4-cascaded-model-infections/</loc>
		<lastmod>2025-10-06T10:26:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-4-5-modellek-kozotti-szennyezesi-vektorok/</loc>
		<lastmod>2025-10-06T10:26:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-4-5-cross-model-contamination-vectors/</loc>
		<lastmod>2025-10-06T10:26:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-5-1-modellintegritast-ellenorzo-rendszerek/</loc>
		<lastmod>2025-10-06T10:26:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-5-1-model-integrity-checking-systems/</loc>
		<lastmod>2025-10-06T10:26:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-5-2-viselkedesalapu-sandbox-technikak/</loc>
		<lastmod>2025-10-06T10:26:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-5-2-behavior-based-sandbox-techniques/</loc>
		<lastmod>2025-10-06T10:26:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-5-3-ellatasi-lancot-megfigyelo-eszkozok/</loc>
		<lastmod>2025-10-06T10:26:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-5-3-supply-chain-monitoring-tools/</loc>
		<lastmod>2025-10-06T10:26:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-5-4-megbizhato-modell-nyilvantartas-kiepitese/</loc>
		<lastmod>2025-10-06T10:26:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-5-4-building-trusted-model-registries/</loc>
		<lastmod>2025-10-06T10:26:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/29-5-5-telepites-utani-anomaliaeszleles/</loc>
		<lastmod>2025-10-06T10:26:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/29-5-5-post-deployment-anomaly-detection/</loc>
		<lastmod>2025-10-06T10:26:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-1-1-tudasbazis-mergezesi-technikak/</loc>
		<lastmod>2025-10-06T10:26:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-1-1-knowledge-base-poisoning-techniques/</loc>
		<lastmod>2025-10-06T10:26:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-1-2-visszakereses-elteritesi-modszerek/</loc>
		<lastmod>2025-10-06T10:26:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-1-2-retrieval-hijacking-methods/</loc>
		<lastmod>2025-10-06T10:26:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-1-3-kontextus-injektalasi-vektorok/</loc>
		<lastmod>2025-10-06T10:26:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-1-3-context-injection-vectors/</loc>
		<lastmod>2025-10-06T10:26:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-1-4-beagyazasi-ter-manipulacioja/</loc>
		<lastmod>2025-10-06T10:26:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-1-4-embedding-space-manipulation/</loc>
		<lastmod>2025-10-06T10:26:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-1-5-tobbugrasos-kovetkeztetes-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:27:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-1-5-multi-hop-reasoning-exploitation/</loc>
		<lastmod>2025-10-06T10:27:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-2-1-e-mail-alapu-injektalasi-lancok/</loc>
		<lastmod>2025-10-06T10:27:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-2-1-email-based-injection-chains/</loc>
		<lastmod>2025-10-06T10:27:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-2-2-dokumentumfeldolgozasi-sebezhetosegek-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:27:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-2-2-exploiting-document-processing-vulnerabilities/</loc>
		<lastmod>2025-10-06T10:27:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-2-3-webes-adatgyujtes-manipulalasa/</loc>
		<lastmod>2025-10-06T10:27:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-2-3-web-scraping-manipulation/</loc>
		<lastmod>2025-10-06T10:27:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-2-4-adatbazis-tartalom-injektalasa/</loc>
		<lastmod>2025-10-06T10:27:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-2-4-database-content-injection/</loc>
		<lastmod>2025-10-06T10:27:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-2-5-api-valaszok-elteritese/</loc>
		<lastmod>2025-10-06T10:27:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-2-5-api-response-hijacking/</loc>
		<lastmod>2025-10-06T10:27:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-3-1-agensek-kozotti-kommunikacio-mergezese/</loc>
		<lastmod>2025-10-06T10:27:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-3-1-poisoning-inter-agent-communication/</loc>
		<lastmod>2025-10-06T10:27:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-3-2-eszkozhasznalat-manipulalasa/</loc>
		<lastmod>2025-10-06T10:27:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-3-2-tool-use-manipulation/</loc>
		<lastmod>2025-10-06T10:27:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-3-3-delegalasi-lanc-elleni-tamadasok/</loc>
		<lastmod>2025-10-06T10:27:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-3-3-delegation-chain-attacks/</loc>
		<lastmod>2025-10-06T10:27:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-3-4-konszenzusmechanizmusok-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:27:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-3-4-exploiting-consensus-mechanisms/</loc>
		<lastmod>2025-10-06T10:27:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-3-5-emergens-viselkedes-elteritese/</loc>
		<lastmod>2025-10-06T10:27:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-3-5-hijacking-emergent-behavior/</loc>
		<lastmod>2025-10-06T10:27:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-4-1-onreprodukalo-promptok-tervezese/</loc>
		<lastmod>2025-10-06T10:27:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-4-1-designing-self-replicating-prompts/</loc>
		<lastmod>2025-10-06T10:27:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-4-2-rendszerek-kozotti-terjedes/</loc>
		<lastmod>2025-10-06T10:27:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-4-2-cross-system-spreading/</loc>
		<lastmod>2025-10-06T10:27:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-4-3-mutacios-es-evolucios-mechanizmusok/</loc>
		<lastmod>2025-10-06T10:27:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-4-3-mutation-and-evolution-mechanisms/</loc>
		<lastmod>2025-10-06T10:27:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-4-4-perzisztencia-technikak/</loc>
		<lastmod>2025-10-06T10:27:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-4-4-persistence-techniques/</loc>
		<lastmod>2025-10-06T10:27:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-4-5-parancsnoki-es-iranyitasi-cc-infrastruktura/</loc>
		<lastmod>2025-10-06T10:27:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-4-5-command-and-control-cc-infrastructure/</loc>
		<lastmod>2025-10-06T10:27:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-5-1-ugyfelszolgalati-botok-atvetele/</loc>
		<lastmod>2025-10-06T10:27:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-5-1-customer-service-bot-takeover/</loc>
		<lastmod>2025-10-06T10:27:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-5-2-kodasszisztensek-hatso-ajtoval-valo-ellatasa/</loc>
		<lastmod>2025-10-06T10:27:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-5-2-backdooring-code-assistants/</loc>
		<lastmod>2025-10-06T10:27:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-5-3-tartalommoderalas-megkerulese/</loc>
		<lastmod>2025-10-06T10:27:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-5-3-bypassing-content-moderation/</loc>
		<lastmod>2025-10-06T10:27:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-5-4-keresomotor-manipulacio/</loc>
		<lastmod>2025-10-06T10:27:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-5-4-search-engine-manipulation/</loc>
		<lastmod>2025-10-06T10:27:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/30-5-5-virtualis-asszisztensek-elteritese/</loc>
		<lastmod>2025-10-06T10:27:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/30-5-5-virtual-assistant-hijacking/</loc>
		<lastmod>2025-10-06T10:27:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-1-1-a-darkgpt-es-klonjainak-uzleti-modellje/</loc>
		<lastmod>2025-10-06T10:27:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-1-1-darkgpt-and-clone-business-models/</loc>
		<lastmod>2025-10-06T10:27:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-1-2-cenzurazatlan-modell-piacterek/</loc>
		<lastmod>2025-10-06T10:27:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-1-2-uncensored-model-marketplaces/</loc>
		<lastmod>2025-10-06T10:27:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-1-3-jailbreak-mint-szolgaltatas-jaas-platformok/</loc>
		<lastmod>2025-10-06T10:27:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-1-3-jailbreak-as-a-service-jaas-platforms/</loc>
		<lastmod>2025-10-06T10:27:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-1-4-egyedi-sebezhetoseg-kihasznalo-kodok-fejlesztesenek-arazasa/</loc>
		<lastmod>2025-10-06T10:27:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-1-4-custom-exploit-development-pricing/</loc>
		<lastmod>2025-10-06T10:27:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-1-5-leteti-es-fizetesi-rendszerek/</loc>
		<lastmod>2025-10-06T10:27:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-1-5-escrow-and-payment-systems/</loc>
		<lastmod>2025-10-06T10:27:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-2-1-jailbreak-promptokkal-kereskedo-platformok/</loc>
		<lastmod>2025-10-06T10:27:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-2-1-jailbreak-prompt-trading-platforms/</loc>
		<lastmod>2025-10-06T10:27:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-2-2-nulladik-napi-zero-day-promptok-ertekelese/</loc>
		<lastmod>2025-10-06T10:27:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-2-2-zero-day-prompt-valuation/</loc>
		<lastmod>2025-10-06T10:27:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-2-3-prompt-tisztara-mosasi-technikak/</loc>
		<lastmod>2025-10-06T10:27:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-2-3-prompt-laundering-techniques/</loc>
		<lastmod>2025-10-06T10:27:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-2-4-foldalatti-forumok-felepitese/</loc>
		<lastmod>2025-10-06T10:27:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-2-4-underground-forum-architecture/</loc>
		<lastmod>2025-10-06T10:27:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-2-5-hirnevrendszerek-es-bizalom/</loc>
		<lastmod>2025-10-06T10:27:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-2-5-reputation-systems-and-trust/</loc>
		<lastmod>2025-10-06T10:27:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-3-1-genetikus-algoritmus-alapu-felfedezes/</loc>
		<lastmod>2025-10-06T10:27:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-3-1-genetic-algorithm-based-discovery/</loc>
		<lastmod>2025-10-06T10:27:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-3-2-ellenseges-promptokat-generalo-farmok/</loc>
		<lastmod>2025-10-06T10:27:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-3-2-adversarial-prompt-generation-farms/</loc>
		<lastmod>2025-10-06T10:27:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-3-3-elosztott-jailbreak-teszteles/</loc>
		<lastmod>2025-10-06T10:27:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-3-3-distributed-jailbreak-testing/</loc>
		<lastmod>2025-10-06T10:27:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-3-4-profitmegosztasi-modellek/</loc>
		<lastmod>2025-10-06T10:27:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-3-4-profit-sharing-models/</loc>
		<lastmod>2025-10-06T10:27:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-3-5-api-koltsegek-optimalizalasa/</loc>
		<lastmod>2025-10-06T10:27:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-3-5-optimizing-api-costs/</loc>
		<lastmod>2025-10-06T10:27:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-4-1-elofizeteses-hozzaferes/</loc>
		<lastmod>2025-10-06T10:27:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-4-1-subscription-access/</loc>
		<lastmod>2025-10-06T10:27:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-4-2-promptonkenti-fizetesi-modellek/</loc>
		<lastmod>2025-10-06T10:27:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-4-2-per-prompt-payment-models/</loc>
		<lastmod>2025-10-06T10:27:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-4-3-exploit-kitek-kihasznalo-programcsomagok-ertekesitese/</loc>
		<lastmod>2025-10-06T10:27:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-4-3-exploit-kit-sales/</loc>
		<lastmod>2025-10-06T10:27:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-4-4-tanacsadas-es-egyedi-fejlesztes/</loc>
		<lastmod>2025-10-06T10:27:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-4-4-consulting-and-custom-development/</loc>
		<lastmod>2025-10-06T10:27:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-4-5-adatszivarogtato-szolgaltatasok/</loc>
		<lastmod>2025-10-06T10:27:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-4-5-data-exfiltration-services/</loc>
		<lastmod>2025-10-06T10:27:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-5-1-beepules-a-foldalatti-piacokra/</loc>
		<lastmod>2025-10-06T10:28:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-5-1-infiltrating-underground-markets/</loc>
		<lastmod>2025-10-06T10:28:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-5-2-kriptovalutak-nyomon-kovetese/</loc>
		<lastmod>2025-10-06T10:28:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-5-2-cryptocurrency-tracking/</loc>
		<lastmod>2025-10-06T10:28:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-5-3-csalikent-mukodo-honeypot-jailbreak-szolgaltatasok/</loc>
		<lastmod>2025-10-06T10:28:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-5-3-honeypot-jailbreak-services/</loc>
		<lastmod>2025-10-06T10:28:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-5-4-attribucios-elkovetohoz-kotesi-technikak/</loc>
		<lastmod>2025-10-06T10:28:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-5-4-attribution-techniques/</loc>
		<lastmod>2025-10-06T10:28:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/31-5-5-a-nemzetkozi-egyuttmukodes-kihivasai/</loc>
		<lastmod>2025-10-06T10:28:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/31-5-5-international-cooperation-challenges/</loc>
		<lastmod>2025-10-06T10:28:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-1-1-tokengeneralasi-idozites-elemzese/</loc>
		<lastmod>2025-10-06T10:28:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-1-1-token-generation-timing-analysis/</loc>
		<lastmod>2025-10-06T10:28:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-1-2-kv-gyorsitotar-mellekcsatornak/</loc>
		<lastmod>2025-10-06T10:28:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-1-2-kv-cache-side-channels/</loc>
		<lastmod>2025-10-06T10:28:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-1-3-figyelmi-mintazatok-kiszivargasa/</loc>
		<lastmod>2025-10-06T10:28:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-1-3-attention-pattern-leakage/</loc>
		<lastmod>2025-10-06T10:28:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-1-4-memoriahozzaferesi-mintazatok/</loc>
		<lastmod>2025-10-06T10:28:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-1-4-memory-access-patterns/</loc>
		<lastmod>2025-10-06T10:28:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-1-5-berlok-kozotti-informacioszivargas/</loc>
		<lastmod>2025-10-06T10:28:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-1-5-cross-tenant-information-leakage/</loc>
		<lastmod>2025-10-06T10:28:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-2-1-elosztott-kereskoordinacio/</loc>
		<lastmod>2025-10-06T10:28:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-2-1-distributed-request-coordination/</loc>
		<lastmod>2025-10-06T10:28:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-2-2-token-bucket-token-vodor-mechanizmus-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:28:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-2-2-token-bucket-mechanism-exploitation/</loc>
		<lastmod>2025-10-06T10:28:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-2-3-csuszoablakos-mechanizmusok-manipulalasa/</loc>
		<lastmod>2025-10-06T10:28:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-2-3-sliding-window-manipulation/</loc>
		<lastmod>2025-10-06T10:28:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-2-4-api-vegpontok-rotalasa/</loc>
		<lastmod>2025-10-06T10:28:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-2-4-api-endpoint-rotation/</loc>
		<lastmod>2025-10-06T10:28:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-2-5-kvota-visszaallitas-idozitesen-alapulo-tamadasok/</loc>
		<lastmod>2025-10-06T10:28:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-2-5-quota-reset-timing-attacks/</loc>
		<lastmod>2025-10-06T10:28:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-3-1-fokozatos-kontextusszennyezes/</loc>
		<lastmod>2025-10-06T10:28:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-3-1-gradual-context-poisoning/</loc>
		<lastmod>2025-10-06T10:28:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-3-2-szinkronizalt-tulcsordulasos-tamadasok/</loc>
		<lastmod>2025-10-06T10:28:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-3-2-synchronized-overflow-attacks/</loc>
		<lastmod>2025-10-06T10:28:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-3-3-memoriaterheles-kihasznalasa/</loc>
		<lastmod>2025-10-06T10:28:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-3-3-memory-pressure-exploitation/</loc>
		<lastmod>2025-10-06T10:28:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-3-4-a-figyelmi-tartomany-kimeritese/</loc>
		<lastmod>2025-10-06T10:28:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-3-4-attention-span-exhaustion/</loc>
		<lastmod>2025-10-06T10:28:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-3-5-gordulo-ablakos-mechanizmusok-manipulalasa/</loc>
		<lastmod>2025-10-06T10:28:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-3-5-rolling-window-mechanism-manipulation/</loc>
		<lastmod>2025-10-06T10:28:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-4-1-versenyhelyzetek-race-condition-azonositasa/</loc>
		<lastmod>2025-10-06T10:28:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-4-1-race-condition-identification/</loc>
		<lastmod>2025-10-06T10:28:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-4-2-toctou-az-ellenorzes-es-a-felhasznalas-kozotti-res-kiaknazasa/</loc>
		<lastmod>2025-10-06T10:28:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-4-2-toctou-time-of-check-time-of-use-vulnerabilities/</loc>
		<lastmod>2025-10-06T10:28:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-4-3-varakozasi-sor-queue-manipulacios-tamadasok/</loc>
		<lastmod>2025-10-06T10:28:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-4-3-queue-manipulation-attacks/</loc>
		<lastmod>2025-10-06T10:28:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-4-4-visszahivasok-callback-elteritese/</loc>
		<lastmod>2025-10-06T10:28:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-4-4-callback-hijacking/</loc>
		<lastmod>2025-10-06T10:28:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-4-5-allapot-deszinkronizacio/</loc>
		<lastmod>2025-10-06T10:28:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-4-5-state-desynchronization/</loc>
		<lastmod>2025-10-06T10:28:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-5-1-konstans-ideju-feldolgozas/</loc>
		<lastmod>2025-10-06T10:28:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-5-1-constant-time-processing/</loc>
		<lastmod>2025-10-06T10:28:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-5-2-idobeli-izolacios-technikak/</loc>
		<lastmod>2025-10-06T10:28:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-5-2-temporal-isolation-techniques/</loc>
		<lastmod>2025-10-06T10:28:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-5-3-rate-limit-sebessegkorlatozas-megerositese/</loc>
		<lastmod>2025-10-06T10:28:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-5-3-hardening-rate-limits/</loc>
		<lastmod>2025-10-06T10:28:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-5-4-idozitesen-alapulo-tamadasok-eszlelese/</loc>
		<lastmod>2025-10-06T10:28:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-5-4-timing-attack-detection/</loc>
		<lastmod>2025-10-06T10:28:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/32-5-5-jitter-kesleltetes-ingadozas-es-veletlenszerusites/</loc>
		<lastmod>2025-10-06T10:28:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/32-5-5-jitter-and-randomization/</loc>
		<lastmod>2025-10-06T10:28:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-1-1-billentyuleutes-dinamika-kontra-mi/</loc>
		<lastmod>2025-10-06T10:28:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-1-1-keystroke-dynamics-vs-ai/</loc>
		<lastmod>2025-10-06T10:28:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-1-2-egermozgasi-mintazatok/</loc>
		<lastmod>2025-10-06T10:28:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-1-2-mouse-movement-patterns/</loc>
		<lastmod>2025-10-06T10:28:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-1-3-erintesi-gesztusok-elemzese/</loc>
		<lastmod>2025-10-06T10:28:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-1-3-touch-gesture-analysis/</loc>
		<lastmod>2025-10-06T10:28:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-1-4-kognitiv-biometria/</loc>
		<lastmod>2025-10-06T10:28:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-1-4-cognitive-biometrics/</loc>
		<lastmod>2025-10-06T10:28:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-1-5-multimodalis-viselkedesi-adatok-fuzioja/</loc>
		<lastmod>2025-10-06T10:28:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-1-5-multimodal-behavioral-data-fusion/</loc>
		<lastmod>2025-10-06T10:28:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-2-1-ellenseges-captcha-generalas/</loc>
		<lastmod>2025-10-06T10:28:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-2-1-adversarial-captcha-generation/</loc>
		<lastmod>2025-10-06T10:28:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-2-2-kontextuserzekeny-kihivasok/</loc>
		<lastmod>2025-10-06T10:28:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-2-2-context-sensitive-challenges/</loc>
		<lastmod>2025-10-06T10:28:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-2-3-idobeli-mintazatokat-hasznalo-captcha-k/</loc>
		<lastmod>2025-10-06T10:28:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-2-3-temporal-pattern-captchas/</loc>
		<lastmod>2025-10-06T10:28:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-2-4-social-proof-tarsadalmi-bizonyitek-mechanizmusok/</loc>
		<lastmod>2025-10-06T10:28:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-2-4-social-proof-mechanisms/</loc>
		<lastmod>2025-10-06T10:28:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-2-5-kvantum-rezisztens-captcha-k/</loc>
		<lastmod>2025-10-06T10:28:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-2-5-quantum-resistant-captchas/</loc>
		<lastmod>2025-10-06T10:28:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-3-1-blokklanc-alapu-identitas/</loc>
		<lastmod>2025-10-06T10:29:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-3-1-blockchain-based-identity/</loc>
		<lastmod>2025-10-06T10:29:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-3-2-web-of-trust-bizalmi-halo-rendszerek/</loc>
		<lastmod>2025-10-06T10:29:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-3-2-web-of-trust-systems/</loc>
		<lastmod>2025-10-06T10:29:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-3-3-biometrikus-hash-lancok/</loc>
		<lastmod>2025-10-06T10:29:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-3-3-biometric-hash-chains/</loc>
		<lastmod>2025-10-06T10:29:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-3-4-zero-tudasu-embersegigazolasok/</loc>
		<lastmod>2025-10-06T10:29:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-3-4-zero-knowledge-humanity-proofs/</loc>
		<lastmod>2025-10-06T10:29:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-3-5-decentralizalt-ellenorzes/</loc>
		<lastmod>2025-10-06T10:29:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-3-5-decentralized-verification/</loc>
		<lastmod>2025-10-06T10:29:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-4-1-mi-eszlelest-segito-vizjelek/</loc>
		<lastmod>2025-10-06T10:29:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-4-1-ai-detecting-watermarks/</loc>
		<lastmod>2025-10-06T10:29:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-4-2-stilometriai-elemzes/</loc>
		<lastmod>2025-10-06T10:29:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-4-2-stylometric-analysis/</loc>
		<lastmod>2025-10-06T10:29:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-4-3-szemantikai-inkonzisztenciak-eszlelese/</loc>
		<lastmod>2025-10-06T10:29:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-4-3-semantic-inconsistency-detection/</loc>
		<lastmod>2025-10-06T10:29:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-4-4-kovetkeztetesi-mintazatok-elemzese/</loc>
		<lastmod>2025-10-06T10:29:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-4-4-reasoning-pattern-analysis/</loc>
		<lastmod>2025-10-06T10:29:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-4-5-kreativ-feladatok-kiertekelese/</loc>
		<lastmod>2025-10-06T10:29:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-4-5-creative-task-evaluation/</loc>
		<lastmod>2025-10-06T10:29:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-5-1-fiziologiai-jelek-elemzese/</loc>
		<lastmod>2025-10-06T10:29:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-5-1-physiological-signal-analysis/</loc>
		<lastmod>2025-10-06T10:29:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-5-2-idobeli-koherencia-ellenorzese/</loc>
		<lastmod>2025-10-06T10:29:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-5-2-temporal-coherence-checking/</loc>
		<lastmod>2025-10-06T10:29:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-5-3-keresztmodalis-ellenorzes/</loc>
		<lastmod>2025-10-06T10:29:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-5-3-cross-modal-verification/</loc>
		<lastmod>2025-10-06T10:29:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-5-4-blokklanc-alapu-eredetkovetes/</loc>
		<lastmod>2025-10-06T10:29:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-5-4-blockchain-based-provenance/</loc>
		<lastmod>2025-10-06T10:29:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/33-5-5-igazsagugyi-mutermekek-eszlelese/</loc>
		<lastmod>2025-10-06T10:29:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/33-5-5-forensic-artifact-detection/</loc>
		<lastmod>2025-10-06T10:29:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-1-1-automatizalt-ellenseges-promptolas/</loc>
		<lastmod>2025-10-06T10:29:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-1-1-automated-adversarial-prompting/</loc>
		<lastmod>2025-10-06T10:29:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-1-2-modell-modell-elleni-kihasznalas/</loc>
		<lastmod>2025-10-06T10:29:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-1-2-model-to-model-exploitation/</loc>
		<lastmod>2025-10-06T10:29:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-1-3-versengo-jailbreakeles/</loc>
		<lastmod>2025-10-06T10:29:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-1-3-competitive-jailbreaking/</loc>
		<lastmod>2025-10-06T10:29:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-1-4-keresztszennyezesi-vektorok/</loc>
		<lastmod>2025-10-06T10:29:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-1-4-cross-contamination-vectors/</loc>
		<lastmod>2025-10-06T10:29:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-1-5-evolucios-tamadasi-strategiak/</loc>
		<lastmod>2025-10-06T10:29:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-1-5-evolutionary-attack-strategies/</loc>
		<lastmod>2025-10-06T10:29:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-2-1-genetikus-prompt-algoritmusok/</loc>
		<lastmod>2025-10-06T10:29:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-2-1-genetic-prompt-algorithms/</loc>
		<lastmod>2025-10-06T10:29:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-2-2-metamorfikus-prompt-motorok/</loc>
		<lastmod>2025-10-06T10:29:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-2-2-metamorphic-prompt-engines/</loc>
		<lastmod>2025-10-06T10:29:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-2-3-polimorfikus-injektalasi-lancok/</loc>
		<lastmod>2025-10-06T10:29:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-2-3-polymorphic-injection-chains/</loc>
		<lastmod>2025-10-06T10:29:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-2-4-adaptiv-kikerulesi-technikak/</loc>
		<lastmod>2025-10-06T10:29:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-2-4-adaptive-evasion-techniques/</loc>
		<lastmod>2025-10-06T10:29:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-2-5-emergens-tamadasi-viselkedesformak/</loc>
		<lastmod>2025-10-06T10:29:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-2-5-emergent-attack-behaviors/</loc>
		<lastmod>2025-10-06T10:29:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-3-1-autonom-sebezhetoseg-felfedezes/</loc>
		<lastmod>2025-10-06T10:29:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-3-1-autonomous-vulnerability-discovery/</loc>
		<lastmod>2025-10-06T10:29:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-3-2-onfejleszto-tamadasi-lancok/</loc>
		<lastmod>2025-10-06T10:29:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-3-2-self-improving-attack-chains/</loc>
		<lastmod>2025-10-06T10:29:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-3-3-elosztott-red-team-rajok/</loc>
		<lastmod>2025-10-06T10:29:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-3-3-distributed-red-team-swarms/</loc>
		<lastmod>2025-10-06T10:29:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-3-4-iranyitasi-mechanizmusok-hibai/</loc>
		<lastmod>2025-10-06T10:29:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-3-4-control-mechanism-failures/</loc>
		<lastmod>2025-10-06T10:29:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-3-5-elszigetelesi-containment-strategiak/</loc>
		<lastmod>2025-10-06T10:29:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-3-5-containment-strategies/</loc>
		<lastmod>2025-10-06T10:29:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-4-1-viselkedesi-mintazatok-atvitele/</loc>
		<lastmod>2025-10-06T10:29:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-4-1-behavioral-pattern-transfer/</loc>
		<lastmod>2025-10-06T10:29:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-4-2-memoriaszennyezes/</loc>
		<lastmod>2025-10-06T10:29:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-4-2-memory-contamination/</loc>
		<lastmod>2025-10-06T10:29:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-4-3-tanitoadat-mergezesi-kaszkadok/</loc>
		<lastmod>2025-10-06T10:29:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-4-3-training-data-poisoning-cascades/</loc>
		<lastmod>2025-10-06T10:29:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-4-4-modellsulyok-megfertozese/</loc>
		<lastmod>2025-10-06T10:29:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-4-4-model-weight-infections/</loc>
		<lastmod>2025-10-06T10:29:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-4-5-viruskent-terjedo-promptok/</loc>
		<lastmod>2025-10-06T10:29:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-4-5-virus-like-prompt-spreading/</loc>
		<lastmod>2025-10-06T10:29:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-5-1-ki-orzi-az-orzoket-quis-custodiet-ipsos-custodes/</loc>
		<lastmod>2025-10-06T10:29:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-5-1-who-watches-the-watchers-quis-custodiet-ipsos-custodes/</loc>
		<lastmod>2025-10-06T10:29:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-5-2-a-bootstrapping-rendszerinditasi-biztonsagi-dilemma/</loc>
		<lastmod>2025-10-06T10:29:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-5-2-the-bootstrapping-security-dilemma/</loc>
		<lastmod>2025-10-06T10:29:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-5-3-az-ellenorzes-vegtelen-regresszioja/</loc>
		<lastmod>2025-10-06T10:29:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-5-3-infinite-regression-of-control/</loc>
		<lastmod>2025-10-06T10:29:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-5-4-a-bizalmi-lanc-sebezhetosegei/</loc>
		<lastmod>2025-10-06T10:29:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-5-4-trust-chain-vulnerabilities/</loc>
		<lastmod>2025-10-06T10:29:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/34-5-5-meta-meta-tamadasi-forgatokonyvek/</loc>
		<lastmod>2025-10-06T10:29:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/34-5-5-meta-meta-attack-scenarios/</loc>
		<lastmod>2025-10-06T10:29:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-biztonsag-golyoallo-strategia-a-digitalis-korban-vagy-rejtett-idozitett-bomba-a-rendszereidben/</loc>
		<lastmod>2025-10-07T19:29:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-security-bulletproof-strategy-in-the-digital-age-or-a-hidden-time-bomb-in-your-systems/</loc>
		<lastmod>2025-10-10T16:22:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-veszelyben-amikor-a-hogyan-ne-kerdesre-jon-a-recept-es-a-fejlesztok-vakargatjak-a-fejuket/</loc>
		<lastmod>2025-10-08T17:50:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-in-danger-when-the-question-how-not-gets-the-answer-and-developers-scratch-their-heads/</loc>
		<lastmod>2025-10-10T19:31:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-kozpontu-biztonsag-a-microsoft-ignite-2025-fokuszaban/</loc>
		<lastmod>2025-10-11T10:46:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defending-the-ai-frontier-a-security-imperative/</loc>
		<lastmod>2025-10-11T10:45:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/berkalozkodas-celkeresztben-az-ai-es-hr-adatok/</loc>
		<lastmod>2025-10-11T11:20:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/mfa-under-siege-the-aitm-payroll-heist/</loc>
		<lastmod>2025-10-11T11:22:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/a-jovo-kibervedelme-mi-asszisztalt-hadviseles/</loc>
		<lastmod>2025-10-11T14:02:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/evaluating-ai-on-the-cyber-battlefield/</loc>
		<lastmod>2025-10-11T14:03:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/vallalati-ai-az-uj-korszak-rejtett-kockazatai/</loc>
		<lastmod>2025-10-11T14:11:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/amazons-agentic-ai-the-new-enterprise-attack-surface/</loc>
		<lastmod>2025-10-11T14:12:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/forradalmi-logelemzes-onjavito-ai-val/</loc>
		<lastmod>2025-10-11T14:56:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/red-teaming-agentic-rag-for-cyber-defense/</loc>
		<lastmod>2025-10-11T14:58:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/halozati-zero-day-az-ai-rejtett-kockazata/</loc>
		<lastmod>2025-10-11T18:30:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/arcanedoor-breaching-ais-network-perimeter/</loc>
		<lastmod>2025-10-11T18:31:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-kodolas-ai-val-tanulsagok-a-frontvonalrol/</loc>
		<lastmod>2025-10-11T19:06:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-ai-dev-a-real-world-blueprint/</loc>
		<lastmod>2025-10-11T19:07:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-vezerelt-siem-a-kiberbiztonsag-kovetkezo-szintje/</loc>
		<lastmod>2025-10-12T08:50:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/the-agentic-siem-secops-enters-the-ai-era/</loc>
		<lastmod>2025-10-12T08:53:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/m8a-teljesitmenyugras-az-ai-biztonsagi-elemzesben/</loc>
		<lastmod>2025-10-12T17:30:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/aws-m8a-ai-securitys-new-hardware-frontier/</loc>
		<lastmod>2025-10-12T17:31:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-biztonsag-a-kerdes-mint-tamadasi-vektor/</loc>
		<lastmod>2025-10-12T17:32:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/llms-new-threat-conversational-manipulation/</loc>
		<lastmod>2025-10-12T17:33:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adatdugok-az-mi-szupersztradan/</loc>
		<lastmod>2025-10-12T17:39:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-securitys-blind-spot-the-data-pipeline/</loc>
		<lastmod>2025-10-12T17:40:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-red-teaming-szotar/</loc>
		<lastmod>2025-10-18T08:10:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-red-teaming-dictionary/</loc>
		<lastmod>2025-10-12T18:15:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-biztonsag-a-kaliforniai-modell/</loc>
		<lastmod>2025-10-13T09:59:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/californias-sb-53-redefines-ai-security/</loc>
		<lastmod>2025-10-13T10:01:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/vallalati-ai-platformok-uj-korszak-uj-tamadasi-feluletek/</loc>
		<lastmod>2025-10-13T10:16:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/enterprise-ai-the-new-attack-surface/</loc>
		<lastmod>2025-10-13T10:15:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/v8-sebezhetoseg-rejtett-veszely-az-mi-modellekre/</loc>
		<lastmod>2025-10-13T13:51:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/v8-race-condition-puts-web-ai-at-risk/</loc>
		<lastmod>2025-10-13T13:53:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/magyarorszag-az-mi-forradalom-kuszoben-a-deloitte-2025-os-korkepenek-kimeletlenul-oszinte-elemzese/</loc>
		<lastmod>2025-10-14T20:31:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/hungary-on-the-threshold-of-the-ai-revolution-deloittes-brutally-honest-analysis-of-the-2025-outlook/</loc>
		<lastmod>2025-10-14T18:11:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-purple-teaming-ai-lila-csapat-a-tamado-es-vedo-csapatok-szovetsege-a-hatekonyabb-mi-vedelemert/</loc>
		<lastmod>2025-10-17T09:40:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-purple-teaming-forging-an-alliance-between-offensive-and-defensive-teams-for-stronger-ai-security/</loc>
		<lastmod>2025-10-17T09:40:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-vedokorlatok-tervezese-hogyan-epitsuk-ki-az-elso-vedelmi-vonalat-a-tamadasok-ellen/</loc>
		<lastmod>2025-10-17T09:40:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/designing-llm-guardrails-building-the-first-line-of-defense-against-attacks/</loc>
		<lastmod>2025-10-17T09:40:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-mi-ellatasi-lanc-5-kritikus-pont-kulso-modellek-integralasa-elott/</loc>
		<lastmod>2025-10-17T09:41:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-ai-supply-chain-5-critical-checkpoints-before-integrating-external-models/</loc>
		<lastmod>2025-10-17T09:41:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/a-legkisebb-jogosultsag-elve-mi-agenseknel-a-tulzott-jogosultsagok-rejtett-veszelyei/</loc>
		<lastmod>2025-10-17T09:41:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/the-principle-of-least-privilege-for-ai-agents-the-hidden-dangers-of-excessive-permissions/</loc>
		<lastmod>2025-10-17T09:41:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/fgsm-tamadasok-kivedese-gyakorlati-utmutato-mi-fejlesztoknek/</loc>
		<lastmod>2025-10-17T09:41:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defending-against-fgsm-attacks-a-practical-guide-for-ai-developers/</loc>
		<lastmod>2025-10-17T09:41:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/zero-bizalom-zero-trust-az-mi-biztonsagban-miert-elengedhetetlen-a-zero-trust-logika-a-modern-rendszereknel/</loc>
		<lastmod>2025-10-17T09:41:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/zero-trust-in-ai-security-why-the-zero-trust-model-is-essential-for-modern-systems/</loc>
		<lastmod>2025-10-17T09:41:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/prompt-injektalas-elleni-vedekezes-a-biztonsagos-rendszer-promptok-keszitesenek-titkai/</loc>
		<lastmod>2025-10-17T09:41:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defending-against-prompt-injection-the-secrets-of-crafting-secure-system-prompts/</loc>
		<lastmod>2025-10-17T09:41:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adatmergezes-megelozese-utmutato-a-tanito-adathalmazok-integritasanak-vedelmehez/</loc>
		<lastmod>2025-10-17T09:41:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/preventing-data-poisoning-a-guide-to-protecting-the-integrity-of-training-datasets/</loc>
		<lastmod>2025-10-17T09:41:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-modelllopas-elleni-vedelem-5-bevalt-technika-az-mi-szellemi-tulajdonanak-megovasara/</loc>
		<lastmod>2025-10-17T09:41:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/protecting-against-model-theft-5-proven-techniques-to-safeguard-your-ai-intellectual-property/</loc>
		<lastmod>2025-10-17T09:41:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-hallucinaciok-kezelese-4-hatekony-modszer-a-megbizhato-modellvalaszokert/</loc>
		<lastmod>2025-10-17T09:41:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/managing-llm-hallucinations-4-effective-methods-for-reliable-model-responses/</loc>
		<lastmod>2025-10-17T09:42:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kijatszasi-jailbreak-tamadasok-felismerese-milyen-gyanus-mintakat-keressunk-az-llm-bemenetekben/</loc>
		<lastmod>2025-10-17T09:42:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/detecting-jailbreak-attacks-what-suspicious-patterns-should-we-look-for-in-llm-inputs/</loc>
		<lastmod>2025-10-17T09:42:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kozvetett-prompt-injektalas-kivedese-a-rag-rendszerek-biztonsagi-buktatoi-es-megoldasaik/</loc>
		<lastmod>2025-10-17T09:42:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/preventing-indirect-prompt-injection-security-pitfalls-and-solutions-for-rag-systems/</loc>
		<lastmod>2025-10-17T09:42:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adversarial-training-ellenseges-tanitas-utmutato-lepesrol-lepesre-a-robusztusabb-mi-modellek-epitesehez/</loc>
		<lastmod>2025-10-17T09:42:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/adversarial-training-a-step-by-step-guide-to-building-more-robust-ai-models/</loc>
		<lastmod>2025-10-17T09:42:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/differencialis-adatvedelem-matematikai-garancia-az-adatszivargas-megelozesere/</loc>
		<lastmod>2025-10-17T09:42:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/differential-privacy-a-mathematical-guarantee-for-preventing-data-leakage/</loc>
		<lastmod>2025-10-17T09:42:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-mlops-automatizalt-vedelmi-ellenorzesek-integralasa-a-ci-cd-folyamatba/</loc>
		<lastmod>2025-10-17T09:42:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-mlops-integrating-automated-security-checks-into-your-ci-cd-pipeline/</loc>
		<lastmod>2025-10-17T09:42:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/modellintegritas-vedelme-hashing-es-digitalis-vizjelezes-alkalmazasa-a-manipulacio-ellen/</loc>
		<lastmod>2025-10-17T09:42:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/protecting-model-integrity-using-hashing-and-watermarking-to-prevent-tampering/</loc>
		<lastmod>2025-10-17T09:42:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/valos-ideju-tamadaseszleles-anomaliak-felismerese-az-llm-adatforgalomban/</loc>
		<lastmod>2025-10-17T09:42:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/real-time-attack-detection-identifying-anomalies-in-llm-traffic/</loc>
		<lastmod>2025-10-17T09:42:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-incidenskezelesi-terv-utmutato-lepesrol-lepesre-a-hatekony-reagalashoz/</loc>
		<lastmod>2025-10-17T09:43:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-incident-response-plan-a-step-by-step-guide-for-effective-action/</loc>
		<lastmod>2025-10-17T09:43:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/megmagyarazhato-mi-xai-a-biztonsagert-rejtett-sebezhetosegek-feltarasa-xai-eszkozokkel/</loc>
		<lastmod>2025-10-17T09:43:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/explainable-ai-xai-for-security-uncovering-hidden-vulnerabilities-with-xai-tools/</loc>
		<lastmod>2025-10-17T09:43:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/modell-elcsuszas-model-drift-kezelese-hogyan-elozzuk-meg-az-ai-teljesitmenyromlasat-es-a-biztonsagi-kockazatokat/</loc>
		<lastmod>2025-10-17T09:43:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/managing-model-drift-how-to-prevent-ai-performance-degradation-and-security-risks/</loc>
		<lastmod>2025-10-17T09:43:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-incidens-jelentes-keszitese-hogyan-kommunikaljunk-erthetoen-a-vezetoseg-fele/</loc>
		<lastmod>2025-10-17T09:43:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/crafting-an-ai-incident-report-how-to-communicate-clearly-to-leadership/</loc>
		<lastmod>2025-10-17T09:43:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-bemeneti-adatok-tisztitasa-miert-kell-tullepni-a-hagyomanyos-xss-vedelmen/</loc>
		<lastmod>2025-10-17T09:43:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/sanitizing-llm-inputs-why-you-need-to-go-beyond-traditional-xss-protection/</loc>
		<lastmod>2025-10-17T09:43:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mesterseges-intelligencia-api-vedelem-terheleskorlatozas-rate-limiting-es-throttling-beallitasa-a-tulterheleses-tamadasok-ellen/</loc>
		<lastmod>2025-10-17T09:43:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-api-protection-configuring-rate-limiting-and-throttling-against-dos-attacks/</loc>
		<lastmod>2025-10-17T09:43:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/multimodalis-mi-biztonsaga-a-kepalapu-es-szovegalapu-modellek-egyedi-vedelmi-kihivasai/</loc>
		<lastmod>2025-10-17T09:43:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/multimodal-ai-security-the-unique-defense-challenges-of-image-and-text-models/</loc>
		<lastmod>2025-10-17T09:43:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kontextusablak-tulcsordulas-megelozese-memoriavedelmi-strategiak-llm-ekhez/</loc>
		<lastmod>2025-10-17T09:44:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/preventing-context-window-overflows-memory-protection-strategies-for-llms/</loc>
		<lastmod>2025-10-17T09:44:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/token-szintu-biztonsag-vedelem-a-rejtett-prompt-tamadasok-ellen/</loc>
		<lastmod>2025-10-17T09:44:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/token-level-security-microscopic-defense-against-hidden-prompt-attacks/</loc>
		<lastmod>2025-10-17T09:44:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-modell-tuzfal-retegzett-vedelmi-strategiak-a-maximalis-biztonsagert/</loc>
		<lastmod>2025-10-17T09:44:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-model-firewall-a-layered-defense-strategy-for-maximum-security/</loc>
		<lastmod>2025-10-17T09:44:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-finomhangolas-fine-tuning-a-modell-ujratanitas-kockazatainak-elkerulese/</loc>
		<lastmod>2025-10-17T09:44:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-fine-tuning-avoiding-the-risks-of-model-retraining/</loc>
		<lastmod>2025-10-17T09:44:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/egyesitett-tanulas-federated-learning-biztonsaga-a-decentralizalt-tanitasi-folyamatok-vedelmenek-kulcsa/</loc>
		<lastmod>2025-10-17T09:44:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/security-in-federated-learning-the-key-to-protecting-decentralized-training-processes/</loc>
		<lastmod>2025-10-17T09:44:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/homomorf-titkositas-az-mi-ben-hogyan-vegezzunk-szamitasokat-titkositott-adatokon/</loc>
		<lastmod>2025-10-17T09:44:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/homomorphic-encryption-in-ai-how-to-perform-computations-on-encrypted-data/</loc>
		<lastmod>2025-10-17T09:44:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-agensek-izolalasa-vedett-futtatokornyezetek-sandbox-hasznalata-a-kartekony-viselkedes-megakadalyozasara/</loc>
		<lastmod>2025-10-17T09:44:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/isolating-ai-agents-using-sandbox-environments-to-prevent-malicious-behavior/</loc>
		<lastmod>2025-10-17T09:44:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-api-token-biztonsag-a-7-leggyakoribb-hiba-es-azok-megelozese/</loc>
		<lastmod>2025-10-17T09:45:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/llm-api-token-security-the-7-most-common-mistakes-and-how-to-avoid-them/</loc>
		<lastmod>2025-10-17T09:45:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/prompt-sablonok-vedelme-hogyan-akadalyozzuk-meg-a-rendszerszintu-manipulaciot/</loc>
		<lastmod>2025-10-17T09:45:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/securing-prompt-templates-how-to-prevent-system-level-manipulation/</loc>
		<lastmod>2025-10-17T09:45:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-biztonsagi-gyakorlatok-tamado-red-team-es-vedo-blue-team-feladatok-szervezese-vallalati-kornyezetben/</loc>
		<lastmod>2025-10-17T09:45:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-security-drills-organizing-red-and-blue-team-exercises-in-a-corporate-environment/</loc>
		<lastmod>2025-10-17T09:45:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/rag-biztonsagi-ellenorzolista-12-kritikus-pont-a-sebezhetosegek-elkeruleseert/</loc>
		<lastmod>2025-10-17T09:45:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/rag-security-checklist-12-critical-points-to-avoid-vulnerabilities/</loc>
		<lastmod>2025-10-17T09:45:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/beagyazasvektorok-embedding-vectors-vedelme-a-vektoradatbazisok-megovasa-a-mergezeses-tamadasoktol/</loc>
		<lastmod>2025-10-17T09:45:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/protecting-embedding-vectors-securing-vector-databases-from-poisoning-attacks/</loc>
		<lastmod>2025-10-17T09:45:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-modell-monitoring-valos-ideju-figyelo-es-riasztorendszer-kiepitese-a-vedelemert/</loc>
		<lastmod>2025-10-17T09:45:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-model-monitoring-building-a-real-time-monitoring-and-alerting-system-for-defense/</loc>
		<lastmod>2025-10-17T09:45:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-ellenallokepesseg-merese-metrikak-a-vedelmi-szint-objektiv-ertekelesehez/</loc>
		<lastmod>2025-10-17T09:45:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/measuring-ai-resilience-metrics-for-objectively-evaluating-your-security-posture/</loc>
		<lastmod>2025-10-17T09:45:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-prompt-tervezes-10-aranyszabaly-amit-minden-ai-fejlesztonek-ismernie-kell/</loc>
		<lastmod>2025-10-17T09:46:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-prompt-engineering-10-golden-rules-every-ai-developer-should-know/</loc>
		<lastmod>2025-10-17T09:46:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-ugynok-eszkozhasznalat-a-funkciohivas-function-calling-biztonsagos-korlatozasanak-modszerei/</loc>
		<lastmod>2025-10-17T09:46:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-agent-tool-use-methods-for-securely-restricting-function-calling/</loc>
		<lastmod>2025-10-17T09:46:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kijatszhatatlan-tartalomszurok-hogyan-erositsuk-meg-mi-alapu-vedelmi-rendszereinket/</loc>
		<lastmod>2025-10-17T09:46:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/unbypassable-content-filters-how-to-harden-your-ai-powered-defense-systems/</loc>
		<lastmod>2025-10-17T09:46:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-torzitasok-bias-kezelese-technikak-a-meltanyos-es-diszkriminaciomentes-modellekert/</loc>
		<lastmod>2025-10-17T09:46:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/addressing-ai-bias-techniques-for-fair-and-non-discriminatory-models/</loc>
		<lastmod>2025-10-17T09:46:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/az-owasp-llm-top-10-a-gyakorlatban-konkret-vedelmi-intezkedesek-a-10-legfobb-kockazat-ellen/</loc>
		<lastmod>2025-10-17T09:46:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/the-owasp-llm-top-10-in-practice-concrete-defense-measures-for-the-top-10-risks/</loc>
		<lastmod>2025-10-17T09:46:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kubernetes-biztonsag-mi-hez-kontenerizalt-gepi-tanulasi-rendszerek-hatekony-vedelme/</loc>
		<lastmod>2025-10-17T09:46:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/kubernetes-security-for-ai-effective-protection-for-containerized-machine-learning-systems/</loc>
		<lastmod>2025-10-17T09:46:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/devsecops-az-mi-projekteken-biztonsag-integralasa-a-ci-cd-folyamatokba/</loc>
		<lastmod>2025-10-17T09:46:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/devsecops-for-ai-projects-integrating-security-into-ci-cd-pipelines/</loc>
		<lastmod>2025-10-17T09:46:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-modell-visszaallitas-strategiak-a-gyors-es-megbizhato-verziokezeleshez/</loc>
		<lastmod>2025-10-17T09:47:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-model-rollback-strategies-for-fast-and-reliable-version-control/</loc>
		<lastmod>2025-10-17T09:47:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/modellkartyak-a-biztonsagert-hogyan-segiti-az-atlathatosag-a-sebezhetosegek-megelozeset/</loc>
		<lastmod>2025-10-17T09:47:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/model-cards-for-security-how-transparency-helps-prevent-vulnerabilities/</loc>
		<lastmod>2025-10-17T09:47:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kulso-mi-modellek-integralasa-utmutato-a-harmadik-feles-api-k-kockazatmentes-hasznalatahoz/</loc>
		<lastmod>2025-10-17T09:47:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/integrating-external-ai-models-a-guide-to-risk-free-use-of-third-party-apis/</loc>
		<lastmod>2025-10-17T09:47:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-specifikus-waf-modern-webalkalmazas-tuzfal-a-prompt-injektalas-ellen/</loc>
		<lastmod>2025-10-17T09:47:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/llm-specific-waf-a-modern-web-application-firewall-against-prompt-injection/</loc>
		<lastmod>2025-10-17T09:47:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adatvedo-gepi-tanulas-privacy-preserving-ml-technikak-a-biztonsagos-es-privat-mi-ert/</loc>
		<lastmod>2025-10-17T09:47:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/privacy-preserving-machine-learning-techniques-for-secure-and-private-ai/</loc>
		<lastmod>2025-10-17T09:47:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/tagsagi-kovetkezteteses-membership-inference-tamadasok-kivedese-hogyan-vedjuk-a-tanitoadatok-privat-szferajat/</loc>
		<lastmod>2025-10-17T09:47:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defending-against-membership-inference-attacks-how-to-protect-the-privacy-of-training-data/</loc>
		<lastmod>2025-10-17T09:47:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/modellinverzio-megelozese-hogyan-akadalyozzuk-meg-az-adatok-visszafejteset-az-ai-modellbol/</loc>
		<lastmod>2025-10-17T09:47:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/preventing-model-inversion-how-to-stop-data-reconstruction-from-your-model/</loc>
		<lastmod>2025-10-17T09:47:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-hatso-kapuk-backdoor-felderitese-beepitett-sebezhetosegek-es-rejtett-hozzaferesek-felkutatasa/</loc>
		<lastmod>2025-10-17T09:48:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-backdoor-detection-hunting-for-built-in-vulnerabilities-and-hidden-threats/</loc>
		<lastmod>2025-10-17T09:48:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-ellatasi-lanc-ellenorzolista-20-pontos-utmutato-a-teljes-folyamat-vedelmehez/</loc>
		<lastmod>2025-10-17T09:48:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-supply-chain-checklist-a-20-point-guide-to-securing-the-entire-pipeline/</loc>
		<lastmod>2025-10-17T09:48:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-mi-telepites-leallasmentes-frissiteseket-lehetove-tevo-architekturak/</loc>
		<lastmod>2025-10-17T09:48:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-ai-deployment-architectures-for-zero-downtime-updates/</loc>
		<lastmod>2025-10-17T09:48:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-hozzaferes-szabalyozas-szerepkor-alapu-rbac-kontroll-implementalasa-mi-rendszerekben/</loc>
		<lastmod>2025-10-17T09:48:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/llm-access-control-implementing-role-based-access-control-rbac-in-ai-systems/</loc>
		<lastmod>2025-10-17T09:48:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ellenseges-peldak-adversarial-example-eszlelese-valos-ideju-rendszerek-a-rosszindulatu-bemenetek-felismeresere/</loc>
		<lastmod>2025-10-17T09:48:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/adversarial-example-detection-real-time-systems-for-identifying-malicious-inputs/</loc>
		<lastmod>2025-10-17T09:48:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-modell-karanten-protokoll-a-gyanus-ai-modellek-biztonsagos-elkulonitesere-es-elemzesere/</loc>
		<lastmod>2025-10-17T09:48:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-model-quarantine-a-protocol-for-safely-isolating-and-analyzing-suspicious-models/</loc>
		<lastmod>2025-10-17T09:48:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-behatolasteszteles-penetracios-teszteles-tamado-red-team-modszertanok-ai-rendszerekhez/</loc>
		<lastmod>2025-10-17T09:48:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-penetration-testing-red-team-methodologies-for-artificial-intelligence-systems/</loc>
		<lastmod>2025-10-17T09:48:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-biztonsagtudatossag-fejlesztoknek-a-legfontosabb-vedelmi-alapelvek-amit-mindenkinek-ismernie-kell/</loc>
		<lastmod>2025-10-17T09:48:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-security-awareness-for-developers-the-core-defensive-principles-everyone-should-know/</loc>
		<lastmod>2025-10-17T09:48:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-tamadas-reagalasi-terv-lepesrol-lepesre-kovetheto-incidenskezelesi-forgatokonyv/</loc>
		<lastmod>2025-10-17T09:49:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-attack-response-plan-a-step-by-step-incident-handling-playbook/</loc>
		<lastmod>2025-10-17T09:49:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-fenyegetesfelderites-threat-intelligence-hogyan-vedekezzunk-proaktivan-a-legujabb-fenyegetesek-ellen/</loc>
		<lastmod>2025-10-17T09:49:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-threat-intelligence-how-to-proactively-defend-against-the-latest-threats/</loc>
		<lastmod>2025-10-17T09:49:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-iranyitas-governance-hogyan-feleljunk-meg-a-szabalyozasi-es-megfelelosegi-kovetelmenyeknek/</loc>
		<lastmod>2025-10-17T09:49:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-governance-how-to-meet-regulatory-and-compliance-requirements/</loc>
		<lastmod>2025-10-17T09:49:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/automatizalt-llm-biztonsagi-teszteles-folyamatos-validacio-a-fejlesztesi-ciklusban/</loc>
		<lastmod>2025-10-17T09:49:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/automated-llm-security-testing-continuous-validation-in-the-development-lifecycle/</loc>
		<lastmod>2025-10-17T09:49:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/api-atjaro-gateway-biztonsag-az-mi-szolgaltatasok-vedelme-a-halozat-peremen/</loc>
		<lastmod>2025-10-17T09:49:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/api-gateway-security-protecting-your-ai-services-at-the-network-edge/</loc>
		<lastmod>2025-10-17T09:49:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adateredet-kovetes-data-lineage-az-ml-ben-az-adatok-megbizhatosaganak-biztositasa-a-biztonsagert/</loc>
		<lastmod>2025-10-17T09:49:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/data-lineage-in-ml-ensuring-data-integrity-for-enhanced-security/</loc>
		<lastmod>2025-10-17T09:49:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/tobb-berlos-mi-architektura-a-berlok-biztonsagos-elszigetelese-tenant-isolation/</loc>
		<lastmod>2025-10-17T09:49:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/multi-tenant-ai-architecture-securely-isolating-tenants-in-shared-environments/</loc>
		<lastmod>2025-10-17T09:49:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-modell-titkositas-bevalt-gyakorlatok-az-adatok-vedelmere-tarolas-es-atvitel-soran/</loc>
		<lastmod>2025-10-17T09:50:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-model-encryption-best-practices-for-protecting-data-at-rest-and-in-transit/</loc>
		<lastmod>2025-10-17T09:50:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-naplozas-mi-rendszerekben-gdpr-kompatibilis-audit-nyomvonalak-kialakitasa/</loc>
		<lastmod>2025-10-17T09:50:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-logging-in-ai-systems-creating-gdpr-compliant-audit-trails/</loc>
		<lastmod>2025-10-17T09:50:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/serulekenysegkezeles-mi-komponensekben-hatekony-frissiteskezelesi-patch-management-strategiak/</loc>
		<lastmod>2025-10-17T09:50:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/vulnerability-management-in-ai-components-effective-patch-management-strategies/</loc>
		<lastmod>2025-10-17T09:50:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/llm-specifikus-waf-szabalyok-modsecurity-es-alternativai-a-modern-tamadasok-ellen/</loc>
		<lastmod>2025-10-17T09:50:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/llm-specific-waf-rules-modsecurity-and-its-alternatives-for-modern-attacks/</loc>
		<lastmod>2025-10-17T09:50:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/docker-kontenerbiztonsag-ml-hez-ai-sebezhetosegvizsgalat-trivy-es-clair-eszkozokkel/</loc>
		<lastmod>2025-10-17T09:50:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/docker-container-security-for-ml-vulnerability-scanning-with-trivy-and-clair/</loc>
		<lastmod>2025-10-17T09:50:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/titokkezeles-secret-management-mi-alkalmazasokban-api-kulcsok-vedelme-vault-es-kubernetes-secrets-segitsegevel/</loc>
		<lastmod>2025-10-17T09:50:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secret-management-in-ai-applications-protecting-api-keys-with-vault-and-kubernetes-secrets/</loc>
		<lastmod>2025-10-17T09:50:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/halozati-mikroszegmentacio-az-mi-infrastruktura-izolalasa-es-vedelme/</loc>
		<lastmod>2025-10-17T09:50:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/network-microsegmentation-isolating-and-protecting-your-ai-infrastructure/</loc>
		<lastmod>2025-10-17T09:50:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/gpu-biztonsag-hogyan-vedjuk-es-izolaljuk-a-megosztott-grafikus-eroforrasokat/</loc>
		<lastmod>2025-10-17T09:51:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/gpu-security-how-to-protect-and-isolate-shared-graphics-resources/</loc>
		<lastmod>2025-10-17T09:51:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-modell-felugyeleti-lanc-chain-of-custody-a-bizalom-es-ellenorizhetoseg-biztositasa/</loc>
		<lastmod>2025-10-17T09:51:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-model-chain-of-custody-ensuring-trust-and-auditability/</loc>
		<lastmod>2025-10-17T09:51:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/robusztus-tanitoadatok-hogyan-allitsunk-ossze-ellenseges-adversarial-adathalmazokat/</loc>
		<lastmod>2025-10-17T09:51:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/robust-training-data-how-to-build-adversarial-datasets/</loc>
		<lastmod>2025-10-17T09:51:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/automatizalt-tamadoszimulacio-red-teaming-pyrit-garak-es-promptfoo-hasznalata-a-sebezhetosegek-feltarasara/</loc>
		<lastmod>2025-10-17T09:51:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/automated-red-teaming-using-pyrit-garak-and-promptfoo-to-uncover-vulnerabilities/</loc>
		<lastmod>2025-10-17T09:51:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/vedelmi-blue-team-eszlelesi-szabalyok-llm-hez-hatekony-siem-es-soar-integracio-a-vedelemert/</loc>
		<lastmod>2025-10-17T09:51:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/blue-team-detection-rules-for-llms-effective-siem-and-soar-integration-for-defense/</loc>
		<lastmod>2025-10-17T09:51:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-alapu-csalirendszerek-honeypotok-hogyan-csaljuk-csapdaba-a-tamadokat-megtevesztesi-technologiakkal/</loc>
		<lastmod>2025-10-17T09:51:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-powered-honeypots-how-to-trap-attackers-with-deception-technologies/</loc>
		<lastmod>2025-10-17T09:51:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/generalt-kod-biztonsaga-a-github-copilot-es-chatgpt-kodjavaslatainak-kritikus-felulvizsgalata/</loc>
		<lastmod>2025-10-17T09:51:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/security-of-generated-code-a-critical-review-of-github-copilot-and-chatgpt-suggestions/</loc>
		<lastmod>2025-10-17T09:51:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/xai-a-biztonsagert-hogyan-hasznaljuk-a-lime-es-shap-modszereket-a-vedelem-erositesere/</loc>
		<lastmod>2025-10-17T09:52:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/xai-for-security-using-lime-and-shap-to-strengthen-your-defenses/</loc>
		<lastmod>2025-10-17T09:52:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/fizikai-ellenseges-tamadasok-adversarial-patch-kivedese-vedelem-a-valo-vilagban-vegrehajtott-mi-tamadasok-ellen/</loc>
		<lastmod>2025-10-17T09:52:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defending-against-adversarial-patch-attacks-protection-from-physical-world-ai-threats/</loc>
		<lastmod>2025-10-17T09:52:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-etika-es-biztonsag-miert-elvalaszthatatlan-a-felelos-mi-a-robusztus-vedelemtol/</loc>
		<lastmod>2025-10-17T09:52:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-ethics-and-security-why-responsible-ai-is-inseparable-from-robust-protection/</loc>
		<lastmod>2025-10-17T09:52:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-megfeleloseg-gyakorlati-utmutato-az-eu-ai-act-gdpr-es-nis2-kovetelmenyekhez/</loc>
		<lastmod>2025-10-17T09:52:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-compliance-a-practical-guide-to-the-eu-ai-act-gdpr-and-nis2/</loc>
		<lastmod>2025-10-17T09:52:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-modellkiszolgalas-a-tensorflow-serving-es-torchserve-infrastruktura-megerositese/</loc>
		<lastmod>2025-10-17T09:52:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-model-serving-hardening-your-tensorflow-serving-and-torchserve-infrastructure/</loc>
		<lastmod>2025-10-17T09:52:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-tamado-red-team-eszkoztar-art-cleverhans-es-foolbox-osszehasonlitasa/</loc>
		<lastmod>2025-10-17T09:52:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/the-ai-red-team-toolkit-a-comparison-of-art-cleverhans-and-foolbox/</loc>
		<lastmod>2025-10-17T09:52:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/adatvedelmi-hatasvizsgalat-dpia-mi-projektekhez-utmutato-a-kockazatok-felmeresehez/</loc>
		<lastmod>2025-10-17T09:52:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/data-protection-impact-assessment-dpia-for-ai-projects-a-guide-to-assessing-risks/</loc>
		<lastmod>2025-10-17T09:52:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-transzfertanulas-elotanitott-modellek-kockazatmentes-alkalmazasa-a-gyakorlatban/</loc>
		<lastmod>2025-10-17T09:53:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-transfer-learning-applying-pre-trained-models-without-the-risk/</loc>
		<lastmod>2025-10-17T09:53:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/digitalis-vizjel-ai-modellekben-a-tulajdonjog-vedelme-es-a-visszaelesek-felderitese/</loc>
		<lastmod>2025-10-17T09:53:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/digital-watermarking-in-ai-models-protecting-ownership-and-detecting-misuse/</loc>
		<lastmod>2025-10-17T09:53:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/nulladik-napi-zero-day-serulekenysegek-ai-rendszerekben-gyors-reagalasi-protokoll-a-kritikus-helyzetekre/</loc>
		<lastmod>2025-10-17T09:53:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/zero-day-vulnerabilities-in-ai-systems-a-rapid-response-protocol-for-critical-incidents/</loc>
		<lastmod>2025-10-17T09:53:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagi-bajnok-security-champion-program-mi-csapatoknak-hogyan-epitsunk-biztonsagtudatos-ai-fejlesztoi-kulturat/</loc>
		<lastmod>2025-10-17T09:53:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/a-security-champion-program-for-ai-teams-building-a-security-conscious-developer-culture/</loc>
		<lastmod>2025-10-17T09:53:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-kockazatelemzes-strukturalt-keretrendszer-a-valos-fenyegetesek-felmeresere/</loc>
		<lastmod>2025-10-17T09:53:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-risk-assessment-a-structured-framework-for-evaluating-real-world-threats/</loc>
		<lastmod>2025-10-17T09:53:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-prompt-menedzsment-kozpontositott-es-verziokovetett-konyvtarak-kialakitasa/</loc>
		<lastmod>2025-10-17T09:53:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-prompt-management-creating-centralized-and-version-controlled-libraries/</loc>
		<lastmod>2025-10-17T09:53:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/teljesitmeny-kontra-biztonsag-az-optimalis-egyensuly-megtalalasa-ai-modellek-fejlesztesekor/</loc>
		<lastmod>2025-10-17T09:53:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/performance-vs-security-finding-the-optimal-balance-in-ai-model-development/</loc>
		<lastmod>2025-10-17T09:53:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-hibavadasz-bug-bounty-programok-hogyan-vonjuk-be-a-kozosseget-a-sebezhetosegek-felderitesebe/</loc>
		<lastmod>2025-10-17T09:54:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-bug-bounty-programs-how-to-engage-the-community-in-vulnerability-discovery/</loc>
		<lastmod>2025-10-17T09:54:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/automatizalt-mi-biztonsagi-teszteles-a-shift-left-korai-teszteles-megkozelites-alkalmazasa-a-gepi-tanulasban/</loc>
		<lastmod>2025-10-17T09:54:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/automated-ai-security-testing-applying-the-shift-left-approach-to-machine-learning/</loc>
		<lastmod>2025-10-17T09:54:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/posztkvantum-kriptografia-es-mi-hogyan-tegyuk-jovobiztossa-rendszereink-titkositasat/</loc>
		<lastmod>2025-10-17T09:54:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/post-quantum-cryptography-and-ai-future-proofing-your-systems-encryption/</loc>
		<lastmod>2025-10-17T09:54:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-kriminalisztika-bizonyitekgyujtes-es-elemzes-egy-sikeres-tamadas-utan/</loc>
		<lastmod>2025-10-17T09:54:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-forensics-evidence-collection-and-analysis-after-a-successful-attack/</loc>
		<lastmod>2025-10-17T09:54:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-fejlesztesi-ciklus-sdlc-ai-hoz-a-vedelem-beepitese-a-tervezestol-a-telepitesig/</loc>
		<lastmod>2025-10-17T09:54:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-sdlc-for-ai-building-protection-in-from-design-to-deployment/</loc>
		<lastmod>2025-10-17T09:54:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-biztonsagi-erettsegi-modell-merd-fel-es-fejleszd-szervezeted-vedelmi-szintjet/</loc>
		<lastmod>2025-10-17T10:04:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-security-maturity-model-assess-and-improve-your-organizations-defense-level/</loc>
		<lastmod>2025-10-17T09:54:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/bizalmas-szamitastechnika-confidential-computing-mi-hez-adatvedelem-futasidoben-intel-sgx-es-amd-sev-segitsegevel/</loc>
		<lastmod>2025-10-17T09:54:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/confidential-computing-for-ai-protecting-data-in-use-with-intel-sgx-and-amd-sev/</loc>
		<lastmod>2025-10-17T09:54:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-fenyegetesmodellezes-a-gyakorlatban-stride-es-mitre-atlas-workshop-utmutato/</loc>
		<lastmod>2025-10-17T09:55:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-threat-modeling-in-practice-a-stride-and-mitre-atlas-workshop-guide/</loc>
		<lastmod>2025-10-17T09:55:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/biztonsagos-kovetkeztetes-inference-a-gyors-es-vedett-predikciok-optimalis-egyensulya/</loc>
		<lastmod>2025-10-17T09:55:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/secure-inference-the-optimal-balance-of-fast-and-protected-predictions/</loc>
		<lastmod>2025-10-17T09:55:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-incidens-szimulacio-hogyan-keszuljunk-fel-a-tamadasokra-asztali-gyakorlatokkal/</loc>
		<lastmod>2025-10-17T09:55:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-incident-simulation-how-to-prepare-for-attacks-with-tabletop-exercises/</loc>
		<lastmod>2025-10-17T09:55:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/melysegi-vedelem-defense-in-depth-az-mi-ben-tobbretegu-vedelmi-architekturak-epitese/</loc>
		<lastmod>2025-10-17T09:55:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/defense-in-depth-for-ai-building-multi-layered-security-architectures/</loc>
		<lastmod>2025-10-17T09:55:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/modellmergezes-eszlelese-statisztikai-modszerek-a-rejtett-adathibak-kiszuresere/</loc>
		<lastmod>2025-10-17T09:55:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/detecting-model-poisoning-statistical-methods-for-filtering-out-hidden-data-corruption/</loc>
		<lastmod>2025-10-17T09:55:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/peremhalozati-mi-edge-ai-biztonsag-az-iot-es-beagyazott-ai-rendszerek-vedelmenek-kulcskerdesei/</loc>
		<lastmod>2025-10-17T09:55:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/edge-ai-security-key-challenges-in-protecting-iot-and-embedded-ai-systems/</loc>
		<lastmod>2025-10-17T09:55:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mi-biztonsagi-teljesitmenymutatok-kpi-ok-hogyan-merjuk-objektiven-a-vedelmi-intezkedesek-hatekonysagat/</loc>
		<lastmod>2025-10-17T09:55:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-security-kpis-how-to-objectively-measure-the-effectiveness-of-your-defense-measures/</loc>
		<lastmod>2025-10-17T09:55:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/jovoallo-mi-biztonsag-felkeszules-az-agi-es-a-kvantumszamitastechnika-jelentette-kihivasokra/</loc>
		<lastmod>2025-10-17T09:55:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/future-proofing-ai-security-preparing-for-the-challenges-of-agi-and-quantum-computing/</loc>
		<lastmod>2025-10-17T09:55:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-asszisztens-segitsegbol-sebezhetoseg/</loc>
		<lastmod>2025-10-18T11:32:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-assistants-your-newest-security-risk/</loc>
		<lastmod>2025-10-18T11:40:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kliens-oldali-ai-uj-korszak-uj-tamadasi-feluletek/</loc>
		<lastmod>2025-10-18T11:41:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ais-new-attack-surface-the-copilot-pc/</loc>
		<lastmod>2025-10-18T11:50:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-biztonsag-a-kiberbiztonsag-kettos-elu-fegyvere/</loc>
		<lastmod>2025-10-18T11:50:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-cybersecuritys-weapon-and-shield/</loc>
		<lastmod>2025-10-18T11:57:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/iot-alapok-ai-jovo-a-biztonsag-uj-korszaka/</loc>
		<lastmod>2025-10-18T11:59:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/securing-ai-the-new-role-of-nists-iot-framework/</loc>
		<lastmod>2025-10-18T12:00:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/f5-veszhelyzet-allami-tamadas-a-kibervedelem-ellen/</loc>
		<lastmod>2025-10-26T07:15:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/infrastructure-flaws-the-silent-threat-to-ai-security/</loc>
		<lastmod>2025-10-26T07:16:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/kontenerbiztonsag-az-ai-rendszerek-uj-frontvonala/</loc>
		<lastmod>2025-10-26T07:17:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/beyond-the-model-securing-ai-containers/</loc>
		<lastmod>2025-10-26T07:17:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-adathalaszat-a-bizalom-pszichologiaja/</loc>
		<lastmod>2025-10-26T07:24:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/next-gen-phishing-targeting-ai-ml-teams/</loc>
		<lastmod>2025-10-26T07:25:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/owasp-top-10-2025-az-ai-biztonsag-uj-alapjai/</loc>
		<lastmod>2025-10-29T07:12:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/owasp-top-10-2025-the-new-foundations-of-ai-security/</loc>
		<lastmod>2025-10-29T07:18:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-sebezhetoseg-a-fektelen-bizalom-kockazata/</loc>
		<lastmod>2025-10-29T07:24:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/overprivileged-ai-the-prompt-injection-breach/</loc>
		<lastmod>2025-10-29T07:26:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/gpt-5-vallalati-biztonsagi-elemzes-3-honappal-a-megjelenes-utan/</loc>
		<lastmod>2025-11-05T17:08:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/gpt-5-enterprise-security-review-3-months-post-launch/</loc>
		<lastmod>2025-11-05T17:08:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/gemini-2-5-deep-think-vs-claude-opus-4-1-melyik-biztonsagosabb/</loc>
		<lastmod>2025-11-05T17:14:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/gemini-2-5-deep-think-vs-claude-opus-4-1-security-comparison/</loc>
		<lastmod>2025-11-05T17:15:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/mesterseges-intelligencia-szakerto-miert-van-ra-szuksege-a-cegednek/</loc>
		<lastmod>2025-11-06T09:27:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-expert-why-your-company-needs-me/</loc>
		<lastmod>2025-11-06T09:52:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/ai-red-teaming-konyv-ebook/</loc>
		<lastmod>2025-11-07T15:16:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://aiq.hu/en/ai-red-teaming-complete-ebook-guide-manual-free/</loc>
		<lastmod>2025-11-08T20:10:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- Request ID: 5dc3580fc9849fdf5a3685cfd6d75aea; Queries for sitemap: 909; Total queries: 1000; Seconds: 1.14; Memory for sitemap: 2MB; Total memory: 4MB -->

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced (Page is feed) 
Content Delivery Network via aiqhustatic.b-cdn.net

Served from: aiq.hu @ 2026-03-11 22:52:56 by W3 Total Cache
-->