LLM Application

CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis

Authors: Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese | Published: 2025-04-08
LLM Application
Model Performance Evaluation
Large Language Model

Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking

Authors: Yu-Hang Wu, Yu-Jie Xiong, Jie-Zhang | Published: 2025-04-08
LLM Application
Prompt Injection
Large Language Model

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLM Application
Risk Analysis Method
Information Security

LLM for SoC Security: A Paradigm Shift

Authors: Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi | Published: 2023-10-09
LLM Application
Prompt Injection
Vulnerability detection

On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing

Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18
LLM Application
Prompt Injection
Literature List

Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia

Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05
LLM Application
Cyber Attack
Compliance with Ethical Guidelines

PassGPT: Password Modeling and (Guided) Generation with Large Language Models

Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14
LLM Application
Model Design and Accuracy
Watermark Evaluation