Risk Management

Unifying Re-Identification, Attribute Inference, and Data Reconstruction Risks in Differential Privacy

Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Jamie Hayes, Borja Balle, Flavio du Pin Calmon, Jean Louis Raisaro | Published: 2025-07-09
Privacy Risk Management
Risk Management
Differential Privacy

Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World

Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08
Risk Management
Information Security
量子コンピューティング

Understanding, Implementing, and Supporting Security Assurance Cases in Safety-Critical Domains

Authors: Mazen Mohamad | Published: 2025-01-08
Security Assurance
Risk Management
Workshop Survey

On Large Language Models in Mission-Critical IT Governance: Are We Ready Yet?

Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-12-16 | Updated: 2025-01-10
Privacy Protection
Framework
Risk Management

The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era

Authors: Abraham Itzhak Weinberg | Published: 2024-08-08
Cybersecurity
Simulation Result Evaluation
Risk Management

Threat Modelling and Risk Analysis for Large Language Model (LLM)-Powered Applications

Authors: Stephen Burabari Tete | Published: 2024-06-16
LLM Security
Prompt Injection
Risk Management

RMF: A Risk Measurement Framework for Machine Learning Models

Authors: Jan Schröder, Jakub Breier | Published: 2024-06-15
Backdoor Attack
Poisoning
Risk Management

Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis

Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi | Published: 2024-06-11 | Updated: 2024-09-06
LLM Performance Evaluation
RAG
Risk Management

Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke | Published: 2024-05-08
Cybersecurity
Privacy Protection
Risk Management

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
Incident Response Plan
Cybersecurity
Risk Management