LLMs in the SOC: An Empirical Study of Human-AI Collaboration in Security Operations Centres Authors: Ronal Singh, Shahroz Tariq, Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris, Martin Lochner | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation Authors: Shaswata Mitra, Azim Bazarov, Martin Duclos, Sudip Mittal, Aritran Piplai, Md Rayhanur Rahman, Edward Zieglar, Shahram Rahimi | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
Membership Inference Attacks on LLM-based Recommender Systems Authors: Jiajie He, Yuechun Gu, Min-Chun Chen, Keke Chen | Published: 2025-08-26 2025.08.26 2025.08.28 Literature Database
$AutoGuardX$: A Comprehensive Cybersecurity Framework for Connected Vehicles Authors: Muhammad Ali Nadeem, Bishwo Prakash Pokharel, Naresh Kshetri, Achyut Shankar, Gokarna Sharma | Published: 2025-08-25 2025.08.25 2025.08.27 Literature Database
Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 2025.08.25 2025.08.27 Literature Database
MalLoc: Toward Fine-grained Android Malicious Payload Localization via LLMs Authors: Tiezhu Sun, Marco Alecci, Aleksandr Pilgun, Yewei Song, Xunzhu Tang, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein | Published: 2025-08-25 2025.08.25 2025.08.27 Literature Database
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20 2025.08.20 2025.08.22 Literature Database
On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19 2025.08.19 2025.08.21 Literature Database
DDoS Attacks in Cloud Computing: Detection and Prevention Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19 2025.08.19 2025.08.21 Literature Database
AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18 2025.08.18 2025.08.20 Literature Database