Siren — Advancing Cybersecurity through Deception and Adaptive Analysis Authors: Samhruth Ananthanarayanan, Girish Kulathumani, Ganesh Narayanan | Published: 2024-06-10 | Updated: 2025-04-24 CybersecurityProactive DefenseCryptography 2024.06.10 2025.05.27 Literature Database
A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications Authors: Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong | Published: 2024-06-08 LLM Performance EvaluationCybersecurityAnomaly Detection Method 2024.06.08 2025.05.27 Literature Database
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models Authors: Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian | Published: 2024-06-02 LLM SecurityCybersecurityCompliance with Ethical Guidelines 2024.06.02 2025.05.27 Literature Database
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23 LLM SecurityCybersecurityPrompt Injection 2024.05.23 2025.05.27 Literature Database
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurityPrompt Injection 2024.05.21 2025.05.27 Literature Database
Adversarial Machine Learning Threats to Spacecraft Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14 CybersecurityPoisoningAttack Method 2024.05.14 2025.05.27 Literature Database
Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security Authors: Leroy Jacob Valencia | Published: 2024-05-09 WatermarkingCybersecurityCompliance with Ethical Guidelines 2024.05.09 2025.05.27 Literature Database
PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks Authors: Mohammed Hassanin, Marwa Keshk, Sara Salim, Majid Alsubaie, Dharmendra Sharma | Published: 2024-05-09 LLM SecurityCybersecurityAnomaly Detection Method 2024.05.09 2025.05.27 Literature Database
Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke | Published: 2024-05-08 CybersecurityPrivacy ProtectionRisk Management 2024.05.08 2025.05.27 Literature Database
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08 CybersecurityThreat modelingEvaluation Method 2024.05.08 2025.05.27 Literature Database