Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28 RAGTCP Connection CharacteristicsVulnerability Analysis 2025.10.28 2025.10.30 Literature Database
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 RAGPrompt InjectionAnomaly Detection in Logs 2025.10.28 2025.10.30 Literature Database
RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23 RAGPoisoning attack on RAGCyber Threat Intelligence 2025.10.23 2025.10.25 Literature Database
The Attribution Story of WhisperGate: An Academic Perspective Authors: Oleksandr Adamov, Anders Carlsson | Published: 2025-10-21 RAGNetwork Threat DetectionInformation Leakage Analysis 2025.10.21 2025.10.23 Literature Database
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Xi Li, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 RAGSecurity Strategy GenerationEfficient Resolution of Learning Tasks 2025.09.28 2025.10.03 Literature Database
RAG Security and Privacy: Formalizing the Threat Model and Attack Surface Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24 RAGPoisoning attack on RAGPrivacy Protection Method 2025.09.24 2025.09.26 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database
SoK: Large Language Model Copyright Auditing via Fingerprinting Authors: Shuo Shao, Yiming Li, Yu He, Hongwei Yao, Wenyuan Yang, Dacheng Tao, Zhan Qin | Published: 2025-08-27 LLMフィンガープリンティングRAGPrompt Engineering 2025.08.27 2025.08.29 Literature Database
AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18 RAGProtocol Procedureマルチエージェントシステム 2025.08.18 2025.08.20 Literature Database
SoK: Data Minimization in Machine Learning Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14 RAGPrivacy AssessmentDifferential Privacy 2025.08.14 2025.08.16 Literature Database