PhishLang: A Lightweight, Client-Side Phishing Detection Framework using MobileBERT for Real-Time, Explainable Threat Mitigation

Authors: Sayak Saha Roy, Shirin Nilizadeh | Published: 2024-08-11 | Updated: 2024-09-09

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning

Authors: William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore | Published: 2024-08-10

AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset

Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09

h4rm3l: A language for Composable Jailbreak Attack Synthesis

Authors: Moussa Koulako Bala Doumbouya, Ananjan Nandi, Gabriel Poesia, Davide Ghilardi, Anna Goldie, Federico Bianchi, Dan Jurafsky, Christopher D. Manning | Published: 2024-08-09 | Updated: 2025-03-25

Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era

Authors: Saleh Darzi, Attila A. Yavuz | Published: 2024-08-08

The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era

Authors: Abraham Itzhak Weinberg | Published: 2024-08-08

Towards Explainable Network Intrusion Detection using Large Language Models

Authors: Paul R. B. Houssel, Priyanka Singh, Siamak Layeghy, Marius Portmann | Published: 2024-08-08

AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent

Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08

Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding

Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08

Zero-day attack and ransomware detection

Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08