CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models Authors: Johan Wahréus, Ahmed Mohamed Hussain, Panos Papadimitratos | Published: 2025-01-02 LLM Performance EvaluationCybersecurityPrompt Injection 2025.01.02 2025.05.27 Literature Database
SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01 CybersecurityPrompt InjectionPrompt Engineering 2025.01.01 2025.05.27 Literature Database
SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06 LLM Performance EvaluationCybersecurityPrompt Injection 2024.12.30 2025.05.27 Literature Database
Detection and classification of DDoS flooding attacks by machine learning method Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02 CybersecurityNetwork Threat Detection 2024.12.25 2025.05.27 Literature Database
Scam Detection for Ethereum Smart Contracts: Leveraging Graph Representation Learning for Secure Blockchain Authors: Yihong Jin, Ze Yang | Published: 2024-12-16 | Updated: 2025-01-12 CybersecuritySmart Contract 2024.12.16 2025.05.27 Literature Database
CS-Eval: A Comprehensive Large Language Model Benchmark for CyberSecurity Authors: Zhengmin Yu, Jiutian Zeng, Siyi Chen, Wenhan Xu, Dandan Xu, Xiangyu Liu, Zonghao Ying, Nan Wang, Yuan Zhang, Min Yang | Published: 2024-11-25 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurity 2024.11.25 2025.05.27 Literature Database
A Novel Reinforcement Learning Model for Post-Incident Malware Investigations Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev | Published: 2024-10-19 | Updated: 2025-01-12 CybersecurityMalware Classification 2024.10.19 2025.05.27 Literature Database
Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern Authors: Zhang Lvyang, Lu Wen, Zhao Yang, Li Jiaqi, Zhai Lidong | Published: 2024-10-14 Cybersecurity 2024.10.14 2025.05.27 Literature Database
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 CybersecurityAttack EvaluationAttack Method 2024.10.10 2025.05.27 Literature Database
Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders Authors: David Noever, Forrest McKee | Published: 2024-10-09 CybersecurityPrompt InjectionAttack Method 2024.10.09 2025.05.27 Literature Database