The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation Authors: Md Nasiruzzaman, Maaruf Ali, Iftekhar Salam, Mahdi H. Miraz | Published: 2025-04-16 Misuse of Security APIData-Centric SecurityUser Behavior Analysis 2025.04.16 2025.05.27 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 Misuse of Security APISecurity AnalysisPrompt Injection 2024.04.04 2025.05.27 Literature Database