Let the Bees Find the Weak Spots: A Path Planning Perspective on Multi-Turn Jailbreak Attacks against LLMs Authors: Yize Liu, Yunyun Hou, Aina Sui | Published: 2025-11-05 Automation of CybersecurityPrompt Injectionマルチターン攻撃分析 2025.11.05 2025.11.07 Literature Database
Cybersecurity threat detection based on a UEBA framework using Deep Autoencoders Authors: Jose Fuentes, Ines Ortega-Fernandez, Nora M. Villanueva, Marta Sestelo | Published: 2025-05-14 | Updated: 2025-10-30 Automation of CybersecurityDeep Learning TechnologyThreat modeling 2025.05.14 2025.11.01 Literature Database
FTSmartAudit: A Knowledge Distillation-Enhanced Framework for Automated Smart Contract Auditing Using Fine-Tuned LLMs Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Zhe Hou | Published: 2024-10-17 | Updated: 2025-11-03 Bias Detection in AI OutputAutomation of CybersecurityInformation Security 2024.10.17 2025.11.05 Literature Database
Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09 AI ComplianceAutomation of CybersecurityData Management System 2023.08.09 2025.05.28 Literature Database
Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30 Automation of CybersecurityAdversarial ExampleMachine Learning Technology 2023.03.28 2025.05.28 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 Automation of CybersecurityData CollectionVulnerability detection 2023.01.31 2025.05.28 Literature Database
Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07 Automation of CybersecurityInformation Gathering MethodsVulnerability Management 2023.01.27 2025.05.28 Literature Database
Color Teams for Machine Learning Development Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20 Automation of CybersecurityData CollectionMachine Learning Framework 2021.10.20 2025.05.28 Literature Database
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15 Automation of CybersecurityMachine Learning AlgorithmAutomated Vulnerability Remediation 2021.10.15 2025.05.28 Literature Database
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27 Automation of CybersecurityModel DesignMachine Learning Technology 2021.04.23 2025.05.28 Literature Database