CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis Authors: Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese | Published: 2025-04-08 LLM ApplicationModel Performance EvaluationLarge Language Model 2025.04.08 2025.05.27 Literature Database
Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking Authors: Yu-Hang Wu, Yu-Jie Xiong, Jie-Zhang | Published: 2025-04-08 LLM ApplicationPrompt InjectionLarge Language Model 2025.04.08 2025.05.27 Literature Database
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07 LLM ApplicationRisk Analysis MethodInformation Security 2025.02.10 2025.05.27 Literature Database
LLM for SoC Security: A Paradigm Shift Authors: Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi | Published: 2023-10-09 LLM ApplicationPrompt InjectionVulnerability detection 2023.10.09 2025.05.28 Literature Database
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18 LLM ApplicationPrompt InjectionLiterature List 2023.06.07 2025.05.28 Literature Database
Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05 LLM ApplicationCyber AttackCompliance with Ethical Guidelines 2023.06.05 2025.05.28 Literature Database
PassGPT: Password Modeling and (Guided) Generation with Large Language Models Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14 LLM ApplicationModel Design and AccuracyWatermark Evaluation 2023.06.02 2025.05.28 Literature Database