Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs Authors: Venkata Tanuja Madireddy | Published: 2025-12-11 グラフ分析Trigger Detection行動分析手法 2025.12.11 2025.12.13 Literature Database
Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study Authors: Yuchen Lei, Yuexin Xiang, Qin Wang, Rafael Dowsley, Tsz Hon Yuen, Kim-Kwang Raymond Choo, Jiangshan Yu | Published: 2025-01-30 | Updated: 2025-09-04 Indirect Prompt Injectionグラフ分析Fraudulent Transaction 2025.01.30 2025.09.06 Literature Database