From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs Authors: Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings | Published: 2025-06-16 Indirect Prompt InjectionCybersecurityEducation and Follow-up 2025.06.16 2025.06.18 Literature Database
Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16 CybersecurityPerformance Evaluationevaluation metrics 2025.03.06 2025.06.18 Literature Database
Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14 CybersecurityPrivacy ProtectionLarge Language Model 2025.01.14 2025.05.27 Literature Database
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection Authors: Sina Ahmadi | Published: 2025-01-14 CybersecurityNetwork Threat DetectionDynamic Firewall 2025.01.14 2025.05.27 Literature Database
A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13 IoMT SecurityCybersecurity 2025.01.13 2025.05.27 Literature Database
Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13 CybersecurityLarge Language ModelAttack Evaluation 2025.01.13 2025.05.27 Literature Database
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 CybersecurityDataset GenerationNetwork Threat Detection 2025.01.13 2025.05.27 Literature Database
Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13 LLM Performance EvaluationCybersecuritySmart Contract 2025.01.13 2025.05.27 Literature Database
Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10 CybersecurityCryptographyDurability Issue 2025.01.10 2025.05.27 Literature Database
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 CybersecurityExperimental ValidationAttack Evaluation 2025.01.10 2025.05.27 Literature Database