Data Collection

The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions

Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06
Kubernetes Market Trends
Cybersecurity
Data Collection

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01
Data Collection
Fingerprinting Method
Privacy Protection

Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments

Authors: Valdemar Švábenský, Kristián Tkáčik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Čeleda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay | Published: 2024-08-16
Data Collection
Student Performance Prediction
Improvement of Learning

The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums

Authors: Vanessa Clairoux-Trepanier, Isa-May Beauchamp, Estelle Ruellan, Masarah Paquet-Clouston, Serge-Olivier Paquette, Eric Clay | Published: 2024-08-06 | Updated: 2024-10-01
LLM Performance Evaluation
Data Collection
Variable Extraction Method

Towards Automatic Hands-on-Keyboard Attack Detection Using LLMs in EDR Solutions

Authors: Amit Portnoy, Ehud Azikri, Shay Kels | Published: 2024-08-04
LLM Security
Endpoint Detection
Data Collection

Evaluation of the Programming Skills of Large Language Models

Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23
LLM Performance Evaluation
Code Generation
Data Collection

IoT Device Labeling Using Large Language Models

Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03
IoT Device Identification
Data Collection
Label

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13
Cybersecurity
Data Collection
Intrusion Detection System

ReposVul: A Repository-Level High-Quality Vulnerability Dataset

Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08
Code Change Analysis
Data Collection
Vulnerability Management

Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN

Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17
O-RAN Security
Cyber Attack
Data Collection