Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19 CybersecurityDataset GenerationRansomware Assessment 2024.04.19 2025.05.27 Literature Database
LLMs for Cyber Security: New Opportunities Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17 LLM SecurityCybersecurity 2024.04.17 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03 CybersecurityPrompt InjectionMalware Classification 2024.04.03 2025.05.27 Literature Database
Large language models in 6G security: challenges and opportunities Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18 LLM SecurityCybersecurityDecentralized LLM Architecture 2024.03.18 2025.05.27 Literature Database
Thwarting Cybersecurity Attacks with Explainable Concept Drift Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18 CybersecurityModel Performance EvaluationConcept Drift 2024.03.18 2025.05.27 Literature Database
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19 CybersecurityProactive DefenseStrategic Game 2024.03.14 2025.05.27 Literature Database
WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12 CybersecurityRansomware AssessmentSelection and Evaluation of Optimization Algorithms 2024.03.12 2025.05.27 Literature Database
Using LLMs for Tabletop Exercises within the Security Domain Authors: Sam Hays, Jules White | Published: 2024-03-03 CybersecurityTabletop Exercise ChallengesPrompt Injection 2024.03.03 2025.05.27 Literature Database
Employing LLMs for Incident Response Planning and Review Authors: Sam Hays, Jules White | Published: 2024-03-02 Incident Response PlanCybersecurityRisk Management 2024.03.02 2025.05.27 Literature Database