Cybersecurity

Is Generative AI the Next Tactical Cyber Weapon For Threat Actors? Unforeseen Implications of AI Generated Cyber Attacks

Authors: Yusuf Usman, Aadesh Upadhyay, Prashnna Gyawali, Robin Chataut | Published: 2024-08-23
Cybersecurity
Prompt Injection
Attack Method

Security Concerns in Quantum Machine Learning as a Service

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2024-08-18
Cybersecurity
Data Obfuscation
Quantum Framework

KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment

Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15
Cybersecurity
Dataset Generation
Evaluation Method

Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques

Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14
Cybersecurity
Data Preprocessing
Model Performance Evaluation

A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution

Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12
LLM Performance Evaluation
RAG
Cybersecurity

AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset

Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09
LLM Performance Evaluation
Cybersecurity
Prompt Injection

The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era

Authors: Abraham Itzhak Weinberg | Published: 2024-08-08
Cybersecurity
Simulation Result Evaluation
Risk Management

AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent

Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08
Edge Computing
Cybersecurity
Automated Intrusion Detection System

Zero-day attack and ransomware detection

Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08
Cybersecurity
Ransomware Assessment
Machine Learning Method

Quantum Clustering for Cybersecurity

Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique | Published: 2024-08-05
Algorithm
Cybersecurity
Quantum Framework