A Sociotechnical, Practitioner-Centered Approach to Technology Adoption in Cybersecurity Operations: An LLM Case

Authors: Francis Hahn, Mohd Mamoon, Alexandru G. Bardas, Michael Collins, Daniel Lende, Xinming Ou, S. Raj Rajagopalan | Published: 2026-04-23

Differentially Private De-identification of Dutch Clinical Notes: A Comparative Evaluation

Authors: Michele Miranda, Xinlan Yan, Nishant Mishra, Rachel Murphy, Ameen Abu-Hanna, Sébastien Bratières, Iacer Calixto | Published: 2026-04-23

Provably Secure Steganography Based on List Decoding

Authors: Kaiyi Pang, Minhao Bai | Published: 2026-04-23

DAIRE: A lightweight AI model for real-time detection of Controller Area Network attacks in the Internet of Vehicles

Authors: Shahid Alam, Amina Jameel, Zahida Parveen, Ehab Alnfrawy, Adeela Ashraf, Raza Uddin, Jamal Aqib | Published: 2026-04-22

Towards Certified Malware Detection: Provable Guarantees Against Evasion Attacks

Authors: Nandakrishna Giri, Asmitha K. A., Serena Nicolazzo, Antonino Nocera, Vinod P | Published: 2026-04-22

CyberCertBench: Evaluating LLMs in Cybersecurity Certification Knowledge

Authors: Gustav Keppler, Ghada Elbez, Veit Hagenmeyer | Published: 2026-04-22

Text Steganography with Dynamic Codebook and Multimodal Large Language Model

Authors: Jianxin Gao, Ruohan Lei, Wanli Peng | Published: 2026-04-22

Taint-Style Vulnerability Detection and Confirmation for Node.js Packages Using LLM Agent Reasoning

Authors: Ronghao Ni, Mihai Christodorescu, Limin Jia | Published: 2026-04-22

Cyber Defense Benchmark: Agentic Threat Hunting Evaluation for LLMs in SecOps

Authors: Alankrit Chona, Igor Kozlov, Ambuj Kumar | Published: 2026-04-21

Evaluating LLM-Generated Obfuscated XSS Payloads for Machine Learning-Based Detection

Authors: Divyesh Gabbireddy, Suman Saha | Published: 2026-04-21