Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Critical Path Prioritization Dashboard for Alert-driven Attack Graphs Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem | Published: 2023-10-19 Security AnalysisUser Experience EvaluationAttack Graph Generation 2023.10.19 2025.05.28 Literature Database
The Efficacy of Transformer-based Adversarial Attacks in Security Domains Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17 Security AnalysisModel DesignAdversarial Example 2023.10.17 2025.05.28 Literature Database
Harnessing the Power of LLM to Support Binary Taint Analysis Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09 Security AnalysisPrompting StrategyDynamic Analysis 2023.10.12 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 Security AnalysisNetwork SlicingMachine Learning Method 2023.10.03 2025.05.28 Literature Database
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16 Security AnalysisPrompt InjectionVulnerability Prediction 2023.10.02 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20 Security AnalysisProgram VerificationAttack Method 2023.07.20 2025.05.28 Literature Database
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17 AUC EvaluationSecurity AnalysisMalware Detection with Limited Samples 2023.07.17 2025.05.28 Literature Database
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič | Published: 2023-07-13 Security AnalysisDataset GenerationEducational Data Mining 2023.07.13 2025.05.28 Literature Database