Full-Stack Knowledge Graph and LLM Framework for Post-Quantum Cyber Readiness Authors: Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe | Published: 2026-01-07 Data-Driven Vulnerability Assessment知識グラフ設計脆弱性優先順位付け 2026.01.07 2026.01.09 Literature Database
Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29 LLM活用Security Analysis Method脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database
Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29 RAGModel DoS脆弱性優先順位付け 2025.12.29 2025.12.31 Literature Database
Assessing the Software Security Comprehension of Large Language Models Authors: Mohammed Latif Siddiq, Natalie Sekerak, Antonio Karam, Maria Leal, Arvin Islam-Gomes, Joanna C. S. Santos | Published: 2025-12-24 Indirect Prompt InjectionSecurity Analysis Method脆弱性優先順位付け 2025.12.24 2025.12.26 Literature Database
Beyond Context: Large Language Models Failure to Grasp Users Intent Authors: Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos | Published: 2025-12-24 Indirect Prompt Injectionマルチモーダル安全性脆弱性優先順位付け 2025.12.24 2025.12.26 Literature Database
Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21 Prompt InjectionPrompt leaking脆弱性優先順位付け 2025.10.21 2025.10.23 Literature Database