Literature Database

Large language models in 6G security: challenges and opportunities

Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18
LLM Security
Cybersecurity
Decentralized LLM Architecture

Thwarting Cybersecurity Attacks with Explainable Concept Drift

Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18
Cybersecurity
Model Performance Evaluation
Concept Drift

Leveraging Large Language Models to Detect npm Malicious Packages

Authors: Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams | Published: 2024-03-18 | Updated: 2025-01-06
LLM Performance Evaluation
Prompt Injection
Malware Classification

SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator

Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18
Dynamic Threshold Calculation
Adversarial Example
Evaluation Method

Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks

Authors: Andrea Venturi, Dario Stabili, Mirco Marchetti | Published: 2024-03-18 | Updated: 2024-04-23
Intrusion Detection System
Adversarial Training
Structural Attack

Nonsmooth Implicit Differentiation: Deterministic and Stochastic Convergence Rates

Authors: Riccardo Grazzi, Massimiliano Pontil, Saverio Salzo | Published: 2024-03-18 | Updated: 2024-06-04
Convergence Guarantee
Convergence Analysis
Optimization Problem

Semantic Data Representation for Explainable Windows Malware Detection Models

Authors: Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták | Published: 2024-03-18
Watermarking
Dataset Generation
Malware Classification

Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Training Data Extraction Method
Model Performance Evaluation
Hierarchical Classification Methods

CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17
Few-Shot Learning
Malware Classification
Methods for Dynamically Identifying New Classes

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Intrusion Detection System
Unknown Attack Detection
Hierarchical Classification Methods