A Transformer-Based Approach for DDoS Attack Detection in IoT Networks Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14 Data CollectionPerformance EvaluationResearch Methodology 2025.08.14 2025.08.16 Literature Database
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11 Indirect Prompt InjectionData CollectionUser Behavior Analysis 2025.08.11 2025.08.13 Literature Database
The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06 Kubernetes Market TrendsCybersecurityData Collection 2024.09.06 2025.05.27 Literature Database
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints Authors: Blerim Rexha, Arbena Musa, Kamer Vishi, Edlira Martiri | Published: 2024-09-01 Data CollectionFingerprinting MethodPrivacy Protection 2024.09.01 2025.05.27 Literature Database
Ethical Challenges in Computer Vision: Ensuring Privacy and Mitigating Bias in Publicly Available Datasets Authors: Ghalib Ahmed Tahir | Published: 2024-08-31 | Updated: 2025-08-11 Data CollectionCompliance with Ethical GuidelinesEnsuring Fairness 2024.08.31 2025.08.13 Literature Database
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments Authors: Valdemar Švábenský, Kristián Tkáčik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Čeleda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay | Published: 2024-08-16 Data CollectionStudent Performance PredictionImprovement of Learning 2024.08.16 2025.05.27 Literature Database
The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums Authors: Vanessa Clairoux-Trepanier, Isa-May Beauchamp, Estelle Ruellan, Masarah Paquet-Clouston, Serge-Olivier Paquette, Eric Clay | Published: 2024-08-06 | Updated: 2024-10-01 LLM Performance EvaluationData CollectionVariable Extraction Method 2024.08.06 2025.05.27 Literature Database
Towards Automatic Hands-on-Keyboard Attack Detection Using LLMs in EDR Solutions Authors: Amit Portnoy, Ehud Azikri, Shay Kels | Published: 2024-08-04 LLM SecurityEndpoint DetectionData Collection 2024.08.04 2025.05.27 Literature Database
Evaluation of the Programming Skills of Large Language Models Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23 LLM Performance EvaluationCode GenerationData Collection 2024.05.23 2025.05.27 Literature Database
IoT Device Labeling Using Large Language Models Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03 IoT Device IdentificationData CollectionLabel 2024.03.03 2025.05.27 Literature Database