Cybersecurity

Improving Phishing Resilience with AI-Generated Training: Evidence on Prompting, Personalization, and Duration

Authors: Francesco Greco, Giuseppe Desolda, Cesare Tucci, Andrea Esposito, Antonio Curci, Antonio Piccinno | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Training Method

AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data

Authors: Benjamin Blakely, Yeni Li, Akshay Dave, Derek Kultgen, Rick Vilim | Published: 2025-12-01
Cybersecurity
Anomaly Detection Method
Watermarking Technology

Demystifying Feature Engineering in Malware Analysis of API Call Sequences

Authors: Tianheng Qu, Hongsong Zhu, Limin Sun, Haining Wang, Haiqiang Fei, Zheng He, Zhi Li | Published: 2025-12-01
Cybersecurity
Dataset Generation
Feature Extraction

EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations

Authors: Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong | Published: 2025-12-01
Poisoning attack on RAG
Cybersecurity
Data Contamination Detection

Securing Large Language Models (LLMs) from Prompt Injection Attacks

Authors: Omar Farooq Khan Suri, John McCrae | Published: 2025-12-01
Indirect Prompt Injection
Cybersecurity
Effectiveness Analysis of Defense Methods

Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation

Authors: Qingyuan Fei, Xin Liu, Song Li, Shujiang Wu, Jianwei Hou, Ping Chen, Zifeng Kang | Published: 2025-12-01
Cybersecurity
Data-Driven Vulnerability Assessment
Hallucination

From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs

Authors: Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings | Published: 2025-06-16
Indirect Prompt Injection
Cybersecurity
Education and Follow-up

Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset

Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16
Cybersecurity
Performance Evaluation
evaluation metrics

Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack

Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14
Cybersecurity
Privacy Protection
Large Language Model

Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection

Authors: Sina Ahmadi | Published: 2025-01-14
Cybersecurity
Network Threat Detection
Dynamic Firewall