Automation of Cybersecurity

Let the Bees Find the Weak Spots: A Path Planning Perspective on Multi-Turn Jailbreak Attacks against LLMs

Authors: Yize Liu, Yunyun Hou, Aina Sui | Published: 2025-11-05
Automation of Cybersecurity
Prompt Injection
マルチターン攻撃分析

Cybersecurity threat detection based on a UEBA framework using Deep Autoencoders

Authors: Jose Fuentes, Ines Ortega-Fernandez, Nora M. Villanueva, Marta Sestelo | Published: 2025-05-14 | Updated: 2025-10-30
Automation of Cybersecurity
Deep Learning Technology
Threat modeling

FTSmartAudit: A Knowledge Distillation-Enhanced Framework for Automated Smart Contract Auditing Using Fine-Tuned LLMs

Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Zhe Hou | Published: 2024-10-17 | Updated: 2025-11-03
Bias Detection in AI Output
Automation of Cybersecurity
Information Security

Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper

Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09
AI Compliance
Automation of Cybersecurity
Data Management System

Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids

Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30
Automation of Cybersecurity
Adversarial Example
Machine Learning Technology

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
Automation of Cybersecurity
Data Collection
Vulnerability detection

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
Automation of Cybersecurity
Information Gathering Methods
Vulnerability Management

Color Teams for Machine Learning Development

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20
Automation of Cybersecurity
Data Collection
Machine Learning Framework

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15
Automation of Cybersecurity
Machine Learning Algorithm
Automated Vulnerability Remediation

Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27
Automation of Cybersecurity
Model Design
Machine Learning Technology