Cybersecurity

LLMs for Cyber Security: New Opportunities

Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17
LLM Security
Cybersecurity

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Cybersecurity
Dataset Generation

Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis

Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03
Cybersecurity
Prompt Injection
Malware Classification

Large language models in 6G security: challenges and opportunities

Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18
LLM Security
Cybersecurity
Decentralized LLM Architecture

Thwarting Cybersecurity Attacks with Explainable Concept Drift

Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18
Cybersecurity
Model Performance Evaluation
Concept Drift

Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19
Cybersecurity
Proactive Defense
Strategic Game

WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces

Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12
Cybersecurity
Ransomware Assessment
Selection and Evaluation of Optimization Algorithms

Using LLMs for Tabletop Exercises within the Security Domain

Authors: Sam Hays, Jules White | Published: 2024-03-03
Cybersecurity
Tabletop Exercise Challenges
Prompt Injection

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
Incident Response Plan
Cybersecurity
Risk Management

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01
Cybersecurity
Enhancement of Strategic Insights
Vulnerability Management