POLAR: Automating Cyber Threat Prioritization through LLM-Powered Assessment Authors: Luoxi Tang, Yuqiao Meng, Ankita Patra, Weicheng Ma, Muchao Ye, Zhaohan Xi | Published: 2025-10-02 Security Information ManagementSecurity Strategy GenerationVulnerability Prediction 2025.10.02 2025.10.04 Literature Database
Better Privilege Separation for Agents by Restricting Data Types Authors: Dennis Jacob, Emad Alghamdi, Zhanhao Hu, Basel Alomair, David Wagner | Published: 2025-09-30 Indirect Prompt InjectionSecurity Strategy GenerationMalicious Prompt 2025.09.30 2025.10.02 Literature Database
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGSecurity Strategy GenerationEfficient Resolution of Learning Tasks 2025.09.28 2025.10.03 Literature Database
AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs Authors: Ruisi Zhang, Yifei Zhao, Neusha Javidnia, Mengxin Zheng, Farinaz Koushanfar | Published: 2025-09-08 Security Strategy GenerationEfficiency EvaluationLarge Language Model 2025.09.08 2025.09.10 Literature Database
KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis Authors: Omri Sgan Cohen, Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai | Published: 2025-09-04 Security Strategy GenerationNetwork Forensics監査ログ分析 2025.09.04 2025.09.06 Literature Database
Regression-aware Continual Learning for Android Malware Detection Authors: Daniele Ghiani, Daniele Angioni, Giorgio Piras, Angelo Sotgiu, Luca Minnei, Srishti Gupta, Maura Pintor, Fabio Roli, Battista Biggio | Published: 2025-07-24 Security Strategy GenerationSoftware SecurityDrift Detection Method 2025.07.24 2025.07.26 Literature Database
RECALLED: An Unbounded Resource Consumption Attack on Large Vision-Language Models Authors: Haoran Gao, Yuanhe Zhang, Zhenhong Zhou, Lei Jiang, Fanyu Meng, Yujia Xiao, Kun Wang, Yang Liu, Junlan Feng | Published: 2025-07-24 Security Strategy Generation攻撃戦略分析Visual Techniques 2025.07.24 2025.07.26 Literature Database
Enabling Cyber Security Education through Digital Twins and Generative AI Authors: Vita Santa Barletta, Vito Bavaro, Miriana Calvano, Antonio Curci, Antonio Piccinno, Davide Pio Posa | Published: 2025-07-23 Security Strategy Generation攻撃戦略分析Educational Approach 2025.07.23 2025.07.25 Literature Database
MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems Authors: Yu Cui, Hongyang Du | Published: 2025-07-17 Security Strategy GenerationPrompt leakingAttacker Behavior Analysis 2025.07.17 2025.07.19 Literature Database
An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06 | Updated: 2025-05-07 Poisoning attack on RAGSecurity Strategy GenerationSelf-Evolving Framework 2025.05.06 2025.05.27 Literature Database