Towards Automatic Hands-on-Keyboard Attack Detection Using LLMs in EDR Solutions Authors: Amit Portnoy, Ehud Azikri, Shay Kels | Published: 2024-08-04 2024.08.04 2025.04.03 文献データベース
Automated Phishing Detection Using URLs and Webpages Authors: Huilin Wang, Bryan Hooi | Published: 2024-08-03 | Updated: 2024-08-16 2024.08.03 2025.04.03 文献データベース
MCGMark: An Encodable and Robust Online Watermark for LLM-Generated Malicious Code Authors: Kaiwen Ning, Jiachi Chen, Qingyuan Zhong, Tao Zhang, Yanlin Wang, Wei Li, Yu Zhang, Weizhe Zhang, Zibin Zheng | Published: 2024-08-02 2024.08.02 2025.04.03 文献データベース
A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02 2024.08.02 2025.04.03 文献データベース
Assessing Robustness of Machine Learning Models using Covariate Perturbations Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02 2024.08.02 2025.04.03 文献データベース
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems Authors: Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li, David Lo | Published: 2024-08-02 2024.08.02 2025.04.03 文献データベース
Verification of Machine Unlearning is Fragile Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01 2024.08.01 2025.04.03 文献データベース
Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities Authors: Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Hussam Al Hamadi, Engin Zeydan | Published: 2024-08-01 | Updated: 2025-01-06 2024.08.01 2025.04.03 文献データベース
Jailbreaking Text-to-Image Models with LLM-Based Agents Authors: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo | Published: 2024-08-01 | Updated: 2024-09-09 2024.08.01 2025.04.03 文献データベース
A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01 2024.08.01 2025.04.03 文献データベース