Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection Authors: Fei Zuo, Junghwan Rhee, Yung Ryn Choe | Published: 2025-03-24 Cyber Threat IntelligencePrompt InjectionInformation Extraction 2025.03.24 2025.05.27 Literature Database
Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16 Cyber Threat IntelligencePrompt leakingModel Extraction Attack 2025.02.28 2025.05.27 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 Cyber Threat IntelligencePrompt leakingWatermarking Technology 2024.10.28 2025.05.27 Literature Database
Cyber Threat Intelligence : Challenges and Opportunities Authors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi | Published: 2018-08-03 Cyber Threat IntelligenceMalware ClassificationRole of Artificial Intelligence 2018.08.03 2025.05.28 Literature Database
Cognitive Techniques for Early Detection of Cybersecurity Events Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01 Cyber Threat IntelligenceAttack Scenario AnalysisKnowledge Extraction Method 2018.08.01 2025.05.28 Literature Database