POLAR: Automating Cyber Threat Prioritization through LLM-Powered Assessment Authors: Luoxi Tang, Yuqiao Meng, Ankita Patra, Weicheng Ma, Muchao Ye, Zhaohan Xi | Published: 2025-10-02 Security Information ManagementSecurity Strategy GenerationVulnerability Prediction 2025.10.02 2025.10.04 Literature Database
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10 Indirect Prompt InjectionSecurity Information Management計画と実行のパターン 2025.09.10 2025.09.12 Literature Database
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01 Security Information ManagementMachine LearningWatermarking Technology 2017.11.01 2025.05.28 Literature Database