Cybersecurity

QML-IDS: Quantum Machine Learning Intrusion Detection System

Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07
Cybersecurity
Network Threat Detection

Watermarking Decision Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06
Watermarking
Cybersecurity
Watermark Evaluation

A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models

Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06
Cybersecurity
Backdoor Attack

Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security

Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06
Cybersecurity
Network Threat Detection

LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems

Authors: Hakan T. Otal, M. Abdullah Canbaz | Published: 2024-09-12 | Updated: 2024-09-15
LLM Security
Cybersecurity
Prompt Injection

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems

Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06
Cybersecurity
Automated Threat Attribution

The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions

Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06
Kubernetes Market Trends
Cybersecurity
Data Collection

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer

Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Poster: Developing an O-RAN Security Test Lab

Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02
Watermarking
Cybersecurity
Security Analysis

Obfuscated Memory Malware Detection

Authors: Sharmila S P, Aruna Tiwari, Narendra S Chaudhari | Published: 2024-08-23
Cybersecurity
Malware Classification
Model Performance Evaluation