Cybersecurity

A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks

Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02
SDN Architecture
Cybersecurity
Evaluation Method

Ollabench: Evaluating LLMs’ Reasoning for Human-centric Interdependent Cybersecurity

Authors: Tam n. Nguyen | Published: 2024-06-11
LLM Performance Evaluation
Cybersecurity
Evaluation Method

Siren — Advancing Cybersecurity through Deception and Adaptive Analysis

Authors: Samhruth Ananthanarayanan, Girish Kulathumani, Ganesh Narayanan | Published: 2024-06-10 | Updated: 2025-04-24
Cybersecurity
Proactive Defense
Cryptography

A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications

Authors: Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong | Published: 2024-06-08
LLM Performance Evaluation
Cybersecurity
Anomaly Detection Method

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models

Authors: Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian | Published: 2024-06-02
LLM Security
Cybersecurity
Compliance with Ethical Guidelines

A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions

Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23
LLM Security
Cybersecurity
Prompt Injection

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Adversarial Machine Learning Threats to Spacecraft

Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14
Cybersecurity
Poisoning
Attack Method

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09
Watermarking
Cybersecurity
Compliance with Ethical Guidelines

PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks

Authors: Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma | Published: 2024-05-09
LLM Security
Cybersecurity
Anomaly Detection Method