Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21 Indirect Prompt InjectionData Flow AnalysisAttack Method 2025.03.17 2025.05.27 Literature Database
Deep Learning Application in Security and Privacy — Theory and Practice: A Position Paper Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis | Published: 2018-12-01 Data Flow AnalysisGeneralization PerformanceLegal Compliance 2018.12.01 2025.05.28 Literature Database
PIDS – A Behavioral Framework for Analysis and Detection of Network Printer Attacks Authors: Asaf Hecht, Adi Sagi, Yuval Elovici | Published: 2018-06-27 FDI Attack Detection MethodsData Flow AnalysisPrinter Security 2018.06.27 2025.05.28 Literature Database
Tokenized Data Markets Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31 Data Flow AnalysisVoting MechanismWatermark Evaluation 2018.05.31 2025.05.28 Literature Database