System-aware contextual digital twin for ICS anomaly diagnosis Authors: Eungyu Woo, Yooshin Kim, Wonje Heo, Donghoon Shin | Published: 2026-04-27 2026.04.27 2026.04.29 Literature Database
Transient Turn Injection: Exposing Stateless Multi-Turn Vulnerabilities in Large Language Models Authors: Naheed Rayhan, Sohely Jahan | Published: 2026-04-23 2026.04.23 2026.04.25 Literature Database
Stealthy Backdoor Attacks against LLMs Based on Natural Style Triggers Authors: Jiali Wei, Ming Fan, Guoheng Sun, Xicheng Zhang, Haijun Wang, Ting Liu | Published: 2026-04-23 2026.04.23 2026.04.25 Literature Database
A Sociotechnical, Practitioner-Centered Approach to Technology Adoption in Cybersecurity Operations: An LLM Case Authors: Francis Hahn, Mohd Mamoon, Alexandru G. Bardas, Michael Collins, Daniel Lende, Xinming Ou, S. Raj Rajagopalan | Published: 2026-04-23 2026.04.23 2026.04.25 Literature Database
Differentially Private De-identification of Dutch Clinical Notes: A Comparative Evaluation Authors: Michele Miranda, Xinlan Yan, Nishant Mishra, Rachel Murphy, Ameen Abu-Hanna, Sébastien Bratières, Iacer Calixto | Published: 2026-04-23 2026.04.23 2026.04.25 Literature Database
Provably Secure Steganography Based on List Decoding Authors: Kaiyi Pang, Minhao Bai | Published: 2026-04-23 2026.04.23 2026.04.25 Literature Database
DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of Vehicles Authors: Shahid Alam, Amina Jameel, Zahida Parveen, Ehab Alnfrawy, Adeela Ashraf, Raza Uddin, Jamal Aqib | Published: 2026-04-22 2026.04.22 2026.04.24 Literature Database
Towards Certified Malware Detection: Provable Guarantees Against Evasion Attacks Authors: Nandakrishna Giri, Asmitha K. A., Serena Nicolazzo, Antonino Nocera, Vinod P | Published: 2026-04-22 2026.04.22 2026.04.24 Literature Database
CyberCertBench: Evaluating LLMs in Cybersecurity Certification Knowledge Authors: Gustav Keppler, Ghada Elbez, Veit Hagenmeyer | Published: 2026-04-22 2026.04.22 2026.04.24 Literature Database
Text Steganography with Dynamic Codebook and Multimodal Large Language Model Authors: Jianxin Gao, Ruohan Lei, Wanli Peng | Published: 2026-04-22 2026.04.22 2026.04.24 Literature Database