QML-IDS: Quantum Machine Learning Intrusion Detection System Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07 CybersecurityNetwork Threat Detection 2024.10.07 2025.05.27 Literature Database
Watermarking Decision Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06 WatermarkingCybersecurityWatermark Evaluation 2024.10.06 2025.05.27 Literature Database
A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06 CybersecurityBackdoor Attack 2024.10.06 2025.05.27 Literature Database
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06 CybersecurityNetwork Threat Detection 2024.10.01 2025.05.27 Literature Database
LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems Authors: Hakan T. Otal, M. Abdullah Canbaz | Published: 2024-09-12 | Updated: 2024-09-15 LLM SecurityCybersecurityPrompt Injection 2024.09.12 2025.05.27 Literature Database
A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06 CybersecurityAutomated Threat Attribution 2024.09.07 2025.05.27 Literature Database
The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06 Kubernetes Market TrendsCybersecurityData Collection 2024.09.06 2025.05.27 Literature Database
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03 LLM Performance EvaluationCybersecurityPrompt Injection 2024.09.03 2025.05.27 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database
Obfuscated Memory Malware Detection Authors: Sharmila S P, Aruna Tiwari, Narendra S Chaudhari | Published: 2024-08-23 CybersecurityMalware ClassificationModel Performance Evaluation 2024.08.23 2025.05.27 Literature Database