Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study

Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12

A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution

Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12

Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption

Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12

Multimodal Large Language Models for Phishing Webpage Detection and Identification

Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12

Fast John Ellipsoid Computation with Differential Privacy Optimization

Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12

Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search

Authors: Robert J. Moss | Published: 2024-08-11

Using Retriever Augmented Large Language Models for Attack Graph Generation

Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11

PhishLang: A Lightweight, Client-Side Phishing Detection Framework using MobileBERT for Real-Time, Explainable Threat Mitigation

Authors: Sayak Saha Roy, Shirin Nilizadeh | Published: 2024-08-11 | Updated: 2024-09-09

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore | Published: 2024-08-10