Information Gathering Methods

Jailbreaking Attack against Multimodal Large Language Model

Authors: Zhenxing Niu, Haodong Ren, Xinbo Gao, Gang Hua, Rong Jin | Published: 2024-02-04
Prompt Injection
Malicious Content Generation
Information Gathering Methods

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Authors: Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly | Published: 2023-10-10
Prompt Injection
Information Gathering Methods
Threat Actor Support

Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!

Authors: Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson | Published: 2023-10-05
Data Collection
Prompt Injection
Information Gathering Methods

Maximal Information Leakage from Quantum Encoding of Classical Data

Authors: Farhad Farokhi | Published: 2023-07-24 | Updated: 2024-01-02
Data Privacy Assessment
Information Gathering Methods
Quantum Cryptography Technology

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
Automation of Cybersecurity
Information Gathering Methods
Vulnerability Management

Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate

Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu | Published: 2022-07-04
Review and Investigation
Information Gathering Methods
Deception Detection

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28
Protocol Procedure
Trust Evaluation Module
Information Gathering Methods

Studying Ransomware Attacks Using Web Search Logs

Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23
User Behavior Analysis
Ransomware Assessment
Information Gathering Methods

Capacity Bounded Differential Privacy

Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03
Privacy Protection
Information Gathering Methods
Research Methodology

A Bayesian Hierarchical Model for Criminal Investigations

Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05
Task Design
Data Extraction and Analysis
Information Gathering Methods