Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 2026.03.26 文献データベース
Attack Assessment and Augmented Identity Recognition for Human Skeleton Data Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25 2026.03.25 文献データベース
Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25 2026.03.25 文献データベース
Walma: Learning to See Memory Corruption in WebAssembly Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25 2026.03.25 文献データベース
Toward a Multi-Layer ML-Based Security Framework for Industrial IoT Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25 2026.03.25 文献データベース
When Understanding Becomes a Risk: Authenticity and Safety Risks in the Emerging Image Generation Paradigm Authors: Ye Leng, Junjie Chu, Mingjie Li, Chenhao Lin, Chao Shen, Michael Backes, Yun Shen, Yang Zhang | Published: 2026-03-25 2026.03.25 文献データベース
Forensic Implications of Localized AI: Artifact Analysis of Ollama, LM Studio, and llama.cpp Authors: Shariq Murtuza | Published: 2026-03-25 2026.03.25 文献データベース
Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage Authors: Rishikesh Sahay, Bell Eapen, Weizhi Meng, Md Rasel Al Mamun, Nikhil Kumar Dora, Manjusha Sumasadan, Sumit Kumar Tetarave, Rod Soto | Published: 2026-03-25 2026.03.25 文献データベース
An Adaptive Neuro-Fuzzy Blockchain-AI Framework for Secure and Intelligent FinTech Transactions Authors: Gunjan Mishra, Yash Mishra | Published: 2026-03-25 2026.03.25 文献データベース
How Vulnerable Are Edge LLMs? Authors: Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu | Published: 2026-03-25 2026.03.25 文献データベース