SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06 LLM Performance EvaluationCybersecurityPrompt Injection 2024.12.30 2025.05.27 Literature Database
Detection and classification of DDoS flooding attacks by machine learning method Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02 CybersecurityNetwork Threat Detection 2024.12.25 2025.05.27 Literature Database
Scam Detection for Ethereum Smart Contracts: Leveraging Graph Representation Learning for Secure Blockchain Authors: Yihong Jin, Ze Yang | Published: 2024-12-16 | Updated: 2025-01-12 CybersecuritySmart Contract 2024.12.16 2025.05.27 Literature Database
CS-Eval: A Comprehensive Large Language Model Benchmark for CyberSecurity Authors: Zhengmin Yu, Jiutian Zeng, Siyi Chen, Wenhan Xu, Dandan Xu, Xiangyu Liu, Zonghao Ying, Nan Wang, Yuan Zhang, Min Yang | Published: 2024-11-25 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurity 2024.11.25 2025.05.27 Literature Database
A Novel Reinforcement Learning Model for Post-Incident Malware Investigations Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev | Published: 2024-10-19 | Updated: 2025-01-12 CybersecurityMalware Classification 2024.10.19 2025.05.27 Literature Database
Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern Authors: Zhang Lvyang, Lu Wen, Zhao Yang, Li Jiaqi, Zhai Lidong | Published: 2024-10-14 Cybersecurity 2024.10.14 2025.05.27 Literature Database
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 CybersecurityAttack EvaluationAttack Method 2024.10.10 2025.05.27 Literature Database
Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders Authors: David Noever, Forrest McKee | Published: 2024-10-09 CybersecurityPrompt InjectionAttack Method 2024.10.09 2025.05.27 Literature Database
QML-IDS: Quantum Machine Learning Intrusion Detection System Authors: Diego Abreu, Christian Esteve Rothenberg, Antonio Abelem | Published: 2024-10-07 CybersecurityNetwork Threat Detection 2024.10.07 2025.05.27 Literature Database
Watermarking Decision Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06 WatermarkingCybersecurityWatermark Evaluation 2024.10.06 2025.05.27 Literature Database