Hacking, The Lazy Way: LLM Augmented Pentesting Authors: Dhruva Goyal, Sitaraman Subramanian, Aditya Peela, Nisha P. Shetty | Published: 2024-09-14 | Updated: 2025-05-19 File Analysis MethodPrompt EngineeringPenetration Testing Applicability 2024.09.14 2025.05.27 Literature Database
ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics Authors: Víctor Mayoral-Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-04 Q-Learning AlgorithmPenetration Testing ApplicabilityMachine Learning Method 2023.08.04 2025.05.28 Literature Database