A Formal Security Framework for MCP-Based AI Agents: Threat Taxonomy, Verification Models, and Defense Mechanisms Authors: Nirajan Acharya, Gaurav Kumar Gupta | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Swiss-Bench 003: Evaluating LLM Reliability and Adversarial Security for Swiss Regulatory Contexts Authors: Fatih Uenal | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
ClawLess: A Security Model of AI Agents Authors: Hongyi Lu, Nian Liu, Shuai Wang, Fengwei Zhang | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Hackers or Hallucinators? A Comprehensive Analysis of LLM-Based Automated Penetration Testing Authors: Jiaren Peng, Zeqin Li, Chang You, Yan Wang, Hanlin Sun, Xuan Tian, Shuqiao Zhang, Junyi Liu, Jianguo Zhao, Renyang Liu, Haoran Ou, Yuqiang Sun, Jiancheng Zhang, Yutong Jiao, Kunshu Song, Chao Zhang, Fan Shi, Hongda Sun, Rui Yan, Cheng Huang | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Foundations for Agentic AI Investigations from the Forensic Analysis of OpenClaw Authors: Jan Gruber, Jan-Niclas Hilgert | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations Authors: Daniil Shafranskyi, Iryna Stopochkina, Mykola Ilin | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
AttnDiff: Attention-based Differential Fingerprinting for Large Language Models Authors: Haobo Zhang, Zhenhua Xu, Junxian Li, Shangfeng Sheng, Dezhang Kong, Meng Han | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
MA-IDS: Multi-Agent RAG Framework for IoT Network Intrusion Detection with an Experience Library Authors: Md Shamimul Islam, Luis G. Jaimes, Ayesha S. Dina | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Your LLM Agent Can Leak Your Data: Data Exfiltration via Backdoored Tool Use Authors: Wuyang Zhang, Shichao Pei | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database
Attribution-Driven Explainable Intrusion Detection with Encoder-Based Large Language Models Authors: Umesh Biswas, Shafqat Hasan, Syed Mohammed Farhan, Nisha Pillai, Charan Gudla | Published: 2026-04-07 2026.04.07 2026.04.09 Literature Database