脆弱性優先順位付け

Full-Stack Knowledge Graph and LLM Framework for Post-Quantum Cyber Readiness

Authors: Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe | Published: 2026-01-07
Data-Driven Vulnerability Assessment
知識グラフ設計
脆弱性優先順位付け

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29
LLM活用
Security Analysis Method
脆弱性優先順位付け

Multi-Agent Framework for Threat Mitigation and Resilience in AI-Based Systems

Authors: Armstrong Foundjem, Lionel Nganyewou Tidjon, Leuson Da Silva, Foutse Khomh | Published: 2025-12-29
RAG
Model DoS
脆弱性優先順位付け

Assessing the Software Security Comprehension of Large Language Models

Authors: Mohammed Latif Siddiq, Natalie Sekerak, Antonio Karam, Maria Leal, Arvin Islam-Gomes, Joanna C. S. Santos | Published: 2025-12-24
Indirect Prompt Injection
Security Analysis Method
脆弱性優先順位付け

Beyond Context: Large Language Models Failure to Grasp Users Intent

Authors: Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos | Published: 2025-12-24
Indirect Prompt Injection
マルチモーダル安全性
脆弱性優先順位付け

Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization

Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21
Prompt Injection
Prompt leaking
脆弱性優先順位付け