Cybersecurity

CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models

Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos | Published: 2025-01-02
LLM Performance Evaluation
Cybersecurity
Prompt Injection

SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering

Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01
Cybersecurity
Prompt Injection
Prompt Engineering

SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity

Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Detection and classification of DDoS flooding attacks by machine learning method

Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02
Cybersecurity
Network Threat Detection

Scam Detection for Ethereum Smart Contracts: Leveraging Graph Representation Learning for Secure Blockchain

Authors: Yihong Jin, Ze Yang | Published: 2024-12-16 | Updated: 2025-01-12
Cybersecurity
Smart Contract

CS-Eval: A Comprehensive Large Language Model Benchmark for CyberSecurity

Authors: Zhengmin Yu, Jiutian Zeng, Siyi Chen, Wenhan Xu, Dandan Xu, Xiangyu Liu, Zonghao Ying, Nan Wang, Yuan Zhang, Min Yang | Published: 2024-11-25 | Updated: 2025-01-17
LLM Performance Evaluation
Cybersecurity

A Novel Reinforcement Learning Model for Post-Incident Malware Investigations

Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev | Published: 2024-10-19 | Updated: 2025-01-12
Cybersecurity
Malware Classification

Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern

Authors: Zhang Lvyang, Lu Wen, Zhao Yang, Li Jiaqi, Zhai Lidong | Published: 2024-10-14
Cybersecurity

Study of Attacks on the HHL Quantum Algorithm

Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10
Cybersecurity
Attack Evaluation
Attack Method

Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders

Authors: David Noever, Forrest McKee | Published: 2024-10-09
Cybersecurity
Prompt Injection
Attack Method