RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 Network Traffic AnalysisBackdoor DetectionEvaluation Method 2025.10.16 2025.10.18 Literature Database
Scout: Leveraging Large Language Models for Rapid Digital Evidence Discovery Authors: Shariq Murtuza | Published: 2025-07-24 デジタル証拠Network Traffic AnalysisNetwork Forensics 2025.07.24 2025.07.26 Literature Database
Information Security Based on LLM Approaches: A Review Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24 Network Traffic AnalysisPrompt InjectionPrompt leaking 2025.07.24 2025.07.26 Literature Database
eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models Authors: Paul R. B. Houssel, Siamak Layeghy, Priyanka Singh, Marius Portmann | Published: 2025-07-22 Relationship of AI SystemsNetwork Traffic AnalysisExplainability Evaluation 2025.07.22 2025.07.24 Literature Database
Intelligent IoT Attack Detection Design via ODLLM with Feature Ranking-based Knowledge Base Authors: Satvik Verma, Qun Wang, E. Wes Bethel | Published: 2025-03-27 DDoS Attack DetectionLLM SecurityNetwork Traffic Analysis 2025.03.27 2025.05.27 Literature Database
SoK: Adversarial Evasion Attacks Practicality in NIDS Domain and the Impact of Dynamic Learning Authors: Mohamed elShehaby, Ashraf Matrawy | Published: 2023-06-08 | Updated: 2025-10-16 Network Traffic AnalysisCertified Robustness攻撃者のアプローチ 2023.06.08 2025.10.18 Literature Database
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28 Network Traffic AnalysisPerformance EvaluationMachine Learning Method 2019.10.21 2025.05.28 Literature Database
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31 Data Collection MethodNetwork Traffic AnalysisPerformance Evaluation Method 2019.05.31 2025.05.28 Literature Database