A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06 CybersecurityAutomated Threat Attribution 2024.09.07 2025.05.12 Literature Database
The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06 Kubernetes Market TrendsCybersecurityData Collection 2024.09.06 2025.05.12 Literature Database
Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography Authors: Pingzhi Li, Tianlong Chen, Junyu Liu | Published: 2024-09-06 PoisoningCommunication EfficiencyQuantum Cryptography Technology 2024.09.06 2025.05.12 Literature Database
Training quantum machine learning models on cloud without uploading the data Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07 AlgorithmWatermarkingQuantum Framework 2024.09.06 2025.05.12 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.12 Literature Database
Exploring User Privacy Awareness on GitHub: An Empirical Study Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10 Privacy ProtectionPrompt InjectionUser Activity Analysis 2024.09.06 2025.05.12 Literature Database
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05 Backdoor AttackPrivacy Protection MethodMembership Inference 2024.09.05 2025.05.12 Literature Database
Robust Q-Learning under Corrupted Rewards Authors: Sreejeet Maity, Aritra Mitra | Published: 2024-09-05 AlgorithmConvergence GuaranteeReinforcement Learning 2024.09.05 2025.05.12 Literature Database
Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection Authors: Li Yang, Abdallah Shami | Published: 2024-09-05 FrameworkModel Performance EvaluationAutomated Intrusion Detection System 2024.09.05 2025.05.12 Literature Database
Well, that escalated quickly: The Single-Turn Crescendo Attack (STCA) Authors: Alan Aqrawi, Arian Abbasi | Published: 2024-09-04 | Updated: 2024-09-10 LLM SecurityContent ModerationAttack Method 2024.09.04 2025.05.12 Literature Database