Literature Database

A Sociotechnical, Practitioner-Centered Approach to Technology Adoption in Cybersecurity Operations: An LLM Case

Authors: Francis Hahn, Mohd Mamoon, Alexandru G. Bardas, Michael Collins, Daniel Lende, Xinming Ou, S. Raj Rajagopalan | Published: 2026-04-23
LLM Performance Evaluation
Poisoning attack on RAG
Data Collection

Differentially Private De-identification of Dutch Clinical Notes: A Comparative Evaluation

Authors: Michele Miranda, Xinlan Yan, Nishant Mishra, Rachel Murphy, Ameen Abu-Hanna, Sébastien Bratières, Iacer Calixto | Published: 2026-04-23
LLM Performance Evaluation
Privacy Protection Method
Differential Privacy

Provably Secure Steganography Based on List Decoding

Authors: Kaiyi Pang, Minhao Bai | Published: 2026-04-23
リストデコーディング
情報利用率
Watermark

DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of Vehicles

Authors: Shahid Alam, Amina Jameel, Zahida Parveen, Ehab Alnfrawy, Adeela Ashraf, Raza Uddin, Jamal Aqib | Published: 2026-04-22
IoT Security Framework
Machine Learning Application
Anomaly Detection Method

Towards Certified Malware Detection: Provable Guarantees Against Evasion Attacks

Authors: Nandakrishna Giri, Asmitha K. A., Serena Nicolazzo, Antonino Nocera, Vinod P | Published: 2026-04-22
Backdoor Detection
Robust explainability
Generalization Performance

CyberCertBench: Evaluating LLMs in Cybersecurity Certification Knowledge

Authors: Gustav Keppler, Ghada Elbez, Veit Hagenmeyer | Published: 2026-04-22
LLM Performance Evaluation
Prompt Injection
Interpretation Method

Text Steganography with Dynamic Codebook and Multimodal Large Language Model

Authors: Jianxin Gao, Ruohan Lei, Wanli Peng | Published: 2026-04-22
Data Protection Method
Prompt leaking
Watermark

Taint-Style Vulnerability Detection and Confirmation for Node.js Packages Using LLM Agent Reasoning

Authors: Ronghao Ni, Mihai Christodorescu, Limin Jia | Published: 2026-04-22
LLM Performance Evaluation
Indirect Prompt Injection
Data Collection

Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOps

Authors: Alankrit Chona, Igor Kozlov, Ambuj Kumar | Published: 2026-04-21
LLM Performance Evaluation
Data Collection
犯罪シミュレーション

Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based Detection

Authors: Divyesh Gabbireddy, Suman Saha | Published: 2026-04-21
LLM Performance Evaluation
Backdoor Detection
Impact of Transformation