Literature Database

Elevating Cyber Threat Intelligence against Disinformation Campaigns with LLM-based Concept Extraction and the FakeCTI Dataset

Authors: Domenico Cotroneo, Roberto Natella, Vittorio Orbinato | Published: 2025-05-06
Bias Detection in AI Output
Detection of Misinformation
Information Extraction Method

Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity

Authors: Shahroz Tariq, Ronal Singh, Mohan Baruwal Chhetri, Surya Nepal, Cecile Paris | Published: 2025-05-06
Cooperative Effects with LLM
Alignment
Participant Question Analysis

An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks

Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07
Poisoning attack on RAG
Security Strategy Generation
Self-Evolving Framework

Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models

Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06
Prompt leaking
Attack Type
Taxonomy of Attacks

Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems

Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06
Attack Type
Adversarial Example
Machine Learning Technology

Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis

Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06
LLM Performance Evaluation
Large Language Model
Evaluation Method

Acoustic Side-Channel Attacks on a Computer Mouse

Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05
Changes in User Behavior
Machine Learning Technology
Speech Recognition System

Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study

Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05
API Security
Indirect Prompt Injection
Prompt leaking

Bayesian Robust Aggregation for Federated Learning

Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05
Group-Based Robustness
Trigger Detection
Adversarial Learning

Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models

Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05
Online Learning
Application of Text Classification
Machine Learning Technology