Send to which account? Evaluation of an LLM-based Scambaiting System Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10 Disabling Safety Mechanisms of LLMResearch Methodology詐欺対策 2025.09.10 2025.09.12 Literature Database
A Transformer-Based Approach for DDoS Attack Detection in IoT Networks Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14 Data CollectionPerformance EvaluationResearch Methodology 2025.08.14 2025.08.16 Literature Database
Gaze3P: Gaze-Based Prediction of User-Perceived Privacy Authors: Mayar Elfares, Pascal Reisert, Ralf Küsters, Andreas Bulling | Published: 2025-07-01 | Updated: 2025-09-10 Privacy TechniquePrivacy AssessmentResearch Methodology 2025.07.01 2025.09.12 Literature Database
PRISON: Unmasking the Criminal Potential of Large Language Models Authors: Xinyi Wu, Geng Hong, Pei Chen, Yueyue Chen, Xudong Pan, Min Yang | Published: 2025-06-19 | Updated: 2025-08-04 Disabling Safety Mechanisms of LLM法執行回避Research Methodology 2025.06.19 2025.08.06 Literature Database
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23 LLMとAPTの関係Information SecurityResearch Methodology 2025.05.24 2025.06.25 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
On Benchmarking Code LLMs for Android Malware Analysis Authors: Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro | Published: 2025-04-01 | Updated: 2025-04-23 LLM Performance EvaluationMalware Detection MethodResearch Methodology 2025.04.01 2025.05.27 Literature Database
A Systematic Literature Review on Phishing and Anti-Phishing Techniques Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02 Phishing AttackPhishing DetectionResearch Methodology 2021.04.02 2025.05.28 Literature Database
Stack-based Buffer Overflow Detection using Recurrent Neural Networks Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30 Data Generation MethodMachine Learning MethodResearch Methodology 2020.12.30 2025.05.28 Literature Database
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach Authors: Benjamin M. Ampel | Published: 2020-12-26 Challenges of Data LabelingMachine Learning AlgorithmResearch Methodology 2020.12.26 2025.05.28 Literature Database