Cybersecurity

CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge

Authors: Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamas Bisztray, Merouane Debbah | Published: 2024-02-12 | Updated: 2024-06-03
LLM Performance Evaluation
Cybersecurity
Dataset Generation

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01
Algorithm
Website Vulnerability
Cybersecurity

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
Cybersecurity
Ransomware Assessment
Machine Learning Method

Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira | Published: 2024-01-26 | Updated: 2024-04-19
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17
DDoS Attack
Cybersecurity
Advancements in Medical IoT

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14
Cybersecurity
Security Analysis
Advancements in Medical IoT

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12
Cybersecurity
Security Analysis
Physical layer security

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03
Cybersecurity
Attack Method
Time-Related Features

Opening A Pandora’s Box: Things You Should Know in the Era of Custom GPTs

Authors: Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang | Published: 2023-12-31
Cybersecurity
Phishing Attack
Prompt Injection