“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09 API SecurityCyber ThreatInformation Leakage Analysis 2025.06.09 2025.06.11 Literature Database
MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09 Cyber ThreatPrompt Injectionマルウェア生成 2025.06.09 2025.06.11 Literature Database
Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09 Cyber ThreatAnomaly Detection Algorithm説明可能な機械学習 2025.06.09 2025.06.11 Literature Database
Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures Authors: Yukai Zhou, Sibei Yang, Wenjie Wang | Published: 2025-06-09 Cooperative Effects with LLMCyber ThreatLarge Language Model 2025.06.09 2025.06.11 Literature Database
A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds Authors: Jamal H. Al-Yasiri, Mohamad Fadli Bin Zolkipli, Nik Fatinah N Mohd Farid, Mohammed Alsamman, Zainab Ali Mohammed | Published: 2025-06-04 Cyber ThreatEfficiency EvaluationInformation Extraction Method 2025.06.04 2025.06.06 Literature Database
MARVEL: Multi-Agent RTL Vulnerability Extraction using Large Language Models Authors: Luca Collini, Baleegh Ahmad, Joey Ah-kiow, Ramesh Karri | Published: 2025-05-17 | Updated: 2025-06-09 Poisoning attack on RAGCyber ThreatPrompt Injection 2025.05.17 2025.06.11 Literature Database
CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21 Indirect Prompt InjectionCyber ThreatVulnerability Prediction 2025.03.21 2025.05.27 Literature Database
Anomaly-Flow: A Multi-domain Federated Generative Adversarial Network for Distributed Denial-of-Service Detection Authors: Leonardo Henrique de Melo, Gustavo de Carvalho Bertoli, Michele Nogueira, Aldri Luiz dos Santos, Lourenço Alves Pereira Junior | Published: 2025-03-18 Cyber ThreatData Generation MethodAttack Method 2025.03.18 2025.05.27 Literature Database
Enforcing Cybersecurity Constraints for LLM-driven Robot Agents for Online Transactions Authors: Shraddha Pradipbhai Shah, Aditya Vilas Deshpande | Published: 2025-03-17 Indirect Prompt InjectionCyber ThreatUser Authentication System 2025.03.17 2025.05.27 Literature Database
Defending Against Social Engineering Attacks in the Age of LLMs Authors: Lin Ai, Tharindu Kumarage, Amrita Bhattacharjee, Zizhou Liu, Zheng Hui, Michael Davinroy, James Cook, Laura Cassani, Kirill Trapeznikov, Matthias Kirchner, Arslan Basharat, Anthony Hoogs, Joshua Garland, Huan Liu, Julia Hirschberg | Published: 2024-06-18 | Updated: 2024-10-11 Indirect Prompt InjectionCyber ThreatSocial Engineering Attack 2024.06.18 2025.05.27 Literature Database