Literature Database

SecureCAI: Injection-Resilient LLM Assistants for Cybersecurity Operations

Authors: Mohammed Himayath Ali, Mohammed Aqib Abdullah, Mohammed Mudassir Uddin, Shahnawaz Alam | Published: 2026-01-12
Indirect Prompt Injection
Prompt Injection
Adversarial Attack Analysis

Towards Automating Blockchain Consensus Verification with IsabeLLM

Authors: Elliot Jones, William Knottenbelt | Published: 2026-01-12
LLM活用
Integration of Blockchain and FL
Formal Verification

A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems

Authors: Bui Ngoc Thanh Binh, Pham Hoai Luan, Le Vu Trung Duong, Vu Tuan Hai, Yasuhiko Nakashima | Published: 2026-01-12
Intrusion Detection System
Performance Evaluation
Anomaly Detection Method

Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models

Authors: Valentin Leroy, Shuvalaxmi Dass, Sharif Ullah | Published: 2026-01-12
Data Selection Strategy
Performance Evaluation
機械学習応用

When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent

Authors: Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu | Published: 2026-01-12
Indirect Prompt Injection
Prompt Injection
User Behavior Analysis

Defenses Against Prompt Attacks Learn Surface Heuristics

Authors: Shawn Li, Chenxiao Yu, Zhiyu Ni, Hao Li, Charith Peris, Chaowei Xiao, Yue Zhao | Published: 2026-01-12
Prompt leaking
Performance Evaluation
Adversarial Attack Analysis

Safe-FedLLM: Delving into the Safety of Federated Large Language Models

Authors: Mingxiang Tao, Yu Tian, Wenxuan Tu, Yue Yang, Xue Yang, Xiangyan Tang | Published: 2026-01-12
Security Assurance
Privacy Protection
Prompt Injection

Enhancing Cloud Network Resilience via a Robust LLM-Empowered Multi-Agent Reinforcement Learning Framework

Authors: Yixiao Peng, Hao Hu, Feiyang Li, Xinye Cao, Yingchang Jiang, Jipeng Tang, Guoshun Nan, Yuling Liu | Published: 2026-01-12
LLM活用
Security Assurance
Performance Evaluation

Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation

Authors: Konstantinos E. Kampourakis, Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Stefanos Gritzalis | Published: 2026-01-08
LLM活用
Prompt Injection
Intrusion Detection System

CurricuLLM: Designing Personalized and Workforce-Aligned Cybersecurity Curricula Using Fine-Tuned LLMs

Authors: Arthur Nijdam, Harri Kähkönen, Valtteri Niemi, Paul Stankovski Wagner, Sara Ramezanian | Published: 2026-01-08
LLM活用
カリキュラム設計
Security Analysis