A Graph-Based Approach to Alert Contextualisation in Security Operations Centres Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16 Security AnalysisAttack Scenario AnalysisMachine Learning Method 2025.09.16 2025.09.18 Literature Database
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Carrier Articles Authors: Zhilong Wang, Haizhou Wang, Nanqing Luo, Lan Zhang, Xiaoyan Sun, Yebo Cao, Peng Liu | Published: 2024-08-20 | Updated: 2025-02-07 Prompt InjectionLarge Language ModelAttack Scenario Analysis 2024.08.20 2025.05.27 Literature Database
ANALYSE — Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents Authors: Thomas Wolgast, Nils Wenninghoff, Stephan Balduin, Eric Veith, Bastian Fraune, Torben Woltjen, Astrid Nieße | Published: 2023-04-21 Cyber AttackReinforcement LearningAttack Scenario Analysis 2023.04.21 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-24 | Updated: 2023-10-12 PoisoningMalicious Website DetectionAttack Scenario Analysis 2022.10.24 2025.05.28 Literature Database
Inferring Sensitive Attributes from Model Explanations Authors: Vasisht Duddu, Antoine Boutet | Published: 2022-08-21 | Updated: 2022-09-07 Privacy Risk ManagementMembership InferenceAttack Scenario Analysis 2022.08.21 2025.05.28 Literature Database
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning Authors: Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur | Published: 2021-07-11 Dataset GenerationData Flow AnalysisAttack Scenario Analysis 2021.07.11 2025.05.28 Literature Database
Hack The Box: Fooling Deep Learning Abstraction-Based Monitors Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18 Attack Scenario AnalysisAdversarial ExampleVulnerability of Adversarial Examples 2021.07.10 2025.05.28 Literature Database
Adversarial Example Detection for DNN Models: A Review and Experimental Comparison Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07 Performance EvaluationAttack Scenario AnalysisAdversarial Example Detection 2021.05.01 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database