KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15 CybersecurityDataset GenerationEvaluation Method 2024.08.15 2025.05.27 Literature Database
Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14 CybersecurityData PreprocessingModel Performance Evaluation 2024.08.14 2025.05.27 Literature Database
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 LLM Performance EvaluationRAGCybersecurity 2024.08.12 2025.05.27 Literature Database
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09 LLM Performance EvaluationCybersecurityPrompt Injection 2024.08.09 2025.05.27 Literature Database
The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era Authors: Abraham Itzhak Weinberg | Published: 2024-08-08 CybersecuritySimulation Result EvaluationRisk Management 2024.08.08 2025.05.27 Literature Database
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08 Edge ComputingCybersecurityAutomated Intrusion Detection System 2024.08.08 2025.05.27 Literature Database
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 CybersecurityRansomware AssessmentMachine Learning Method 2024.08.08 2025.05.27 Literature Database
Quantum Clustering for Cybersecurity Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique | Published: 2024-08-05 AlgorithmCybersecurityQuantum Framework 2024.08.05 2025.05.27 Literature Database
A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02 SDN ArchitectureCybersecurityEvaluation Method 2024.08.02 2025.05.27 Literature Database
Ollabench: Evaluating LLMs’ Reasoning for Human-centric Interdependent Cybersecurity Authors: Tam n. Nguyen | Published: 2024-06-11 LLM Performance EvaluationCybersecurityEvaluation Method 2024.06.11 2025.05.27 Literature Database