Cybersecurity

Study of Attacks on the HHL Quantum Algorithm

Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10
Cybersecurity
Attack Evaluation
Attack Method

Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders

Authors: David Noever, Forrest McKee | Published: 2024-10-09
Cybersecurity
Prompt Injection
Attack Method

QML-IDS: Quantum Machine Learning Intrusion Detection System

Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07
Cybersecurity
Network Threat Detection

Watermarking Decision Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06
Watermarking
Cybersecurity
Watermark Evaluation

A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models

Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06
Cybersecurity
Backdoor Attack

Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security

Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06
Cybersecurity
Network Threat Detection

LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems

Authors: Hakan T. Otal, M. Abdullah Canbaz | Published: 2024-09-12 | Updated: 2024-09-15
LLM Security
Cybersecurity
Prompt Injection

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems

Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06
Cybersecurity
Automated Threat Attribution

The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions

Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06
Kubernetes Market Trends
Cybersecurity
Data Collection

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer

Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03
LLM Performance Evaluation
Cybersecurity
Prompt Injection