Cyber Threat Intelligence

Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection

Authors: Fei Zuo, Junghwan Rhee, Yung Ryn Choe | Published: 2025-03-24
Cyber Threat Intelligence
Prompt Injection
Information Extraction

Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots

Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16
Cyber Threat Intelligence
Prompt leaking
Model Extraction Attack

CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models

Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21
Cyber Threat Intelligence
Prompt leaking
Watermarking Technology

Cyber Threat Intelligence : Challenges and Opportunities

Authors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi | Published: 2018-08-03
Cyber Threat Intelligence
Malware Classification
Role of Artificial Intelligence

Cognitive Techniques for Early Detection of Cybersecurity Events

Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01
Cyber Threat Intelligence
Attack Scenario Analysis
Knowledge Extraction Method