Death by a Thousand Prompts: Open Model Vulnerability Analysis Authors: Amy Chang, Nicholas Conley, Harish Santhanalakshmi Ganesan, Adam Swanda | Published: 2025-11-05 Disabling Safety Mechanisms of LLMIndirect Prompt InjectionThreat modeling 2025.11.05 2025.11.07 Literature Database
Retrieval-Augmented Defense: Adaptive and Controllable Jailbreak Prevention for Large Language Models Authors: Guangyu Yang, Jinghong Chen, Jingbiao Mei, Weizhe Lin, Bill Byrne | Published: 2025-08-22 | Updated: 2025-11-03 Prompt InjectionPrompt leakingThreat modeling 2025.08.22 2025.11.05 Literature Database
From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction Authors: Ahmed Lekssays, Husrev Taha Sencar, Ting Yu | Published: 2025-07-22 Indirect Prompt InjectionAttack MethodThreat modeling 2025.07.22 2025.07.24 Literature Database
Thought Purity: Defense Paradigm For Chain-of-Thought Attack Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16 Information SecurityThreat modelingDefense Method 2025.07.16 2025.07.18 Literature Database
Cybersecurity threat detection based on a UEBA framework using Deep Autoencoders Authors: Jose Fuentes, Ines Ortega-Fernandez, Nora M. Villanueva, Marta Sestelo | Published: 2025-05-14 | Updated: 2025-10-30 Automation of CybersecurityDeep Learning TechnologyThreat modeling 2025.05.14 2025.11.01 Literature Database
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09 Layout SecurityThreat modelingDefense Method 2024.05.09 2025.05.27 Literature Database
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08 CybersecurityThreat modelingEvaluation Method 2024.05.08 2025.05.27 Literature Database
Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06 Physical attackThreat modelingDefense Method 2024.05.06 2025.05.27 Literature Database
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security Authors: Yihe Fan, Yuxin Cao, Ziyu Zhao, Ziyao Liu, Shaofeng Li | Published: 2024-04-08 | Updated: 2024-08-11 LLM SecurityPrompt InjectionThreat modeling 2024.04.08 2025.05.27 Literature Database
CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems Authors: Francesco Marchiori, Mauro Conti | Published: 2024-04-06 Intrusion Detection SystemAdversarial TrainingThreat modeling 2024.04.06 2025.05.27 Literature Database