Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03 CybersecurityPrompt InjectionMalware Classification 2024.04.03 2025.05.27 Literature Database
Large language models in 6G security: challenges and opportunities Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18 LLM SecurityCybersecurityDecentralized LLM Architecture 2024.03.18 2025.05.27 Literature Database
Thwarting Cybersecurity Attacks with Explainable Concept Drift Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18 CybersecurityModel Performance EvaluationConcept Drift 2024.03.18 2025.05.27 Literature Database
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19 CybersecurityProactive DefenseStrategic Game 2024.03.14 2025.05.27 Literature Database
WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12 CybersecurityRansomware AssessmentSelection and Evaluation of Optimization Algorithms 2024.03.12 2025.05.27 Literature Database
Using LLMs for Tabletop Exercises within the Security Domain Authors: Sam Hays, Jules White | Published: 2024-03-03 CybersecurityTabletop Exercise ChallengesPrompt Injection 2024.03.03 2025.05.27 Literature Database
Employing LLMs for Incident Response Planning and Review Authors: Sam Hays, Jules White | Published: 2024-03-02 Incident Response PlanCybersecurityRisk Management 2024.03.02 2025.05.27 Literature Database
Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01 CybersecurityEnhancement of Strategic InsightsVulnerability Management 2024.03.01 2025.05.27 Literature Database
On the Role of Similarity in Detecting Masquerading Files Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17 CybersecurityIntegration of Digital Signatures and Machine LearningMalware Classification 2024.02.17 2025.05.27 Literature Database
ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13 CybersecurityData CollectionIntrusion Detection System 2024.02.13 2025.05.27 Literature Database