Sharpening Kubernetes Audit Logs with Context Awareness Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27 ログ分析の課題性能評価手法監査手法 2025.06.19 文献データベース
Improving LLM Outputs Against Jailbreak Attacks with Expert Model Integration Authors: Tatia Tsmindashvili, Ana Kolkhidashvili, Dachi Kurtskhalia, Nino Maghlakelidze, Elene Mekvabishvili, Guram Dentoshvili, Orkhan Shamilov, Zaal Gachechiladze, Steven Saporta, David Dachi Choladze | Published: 2025-05-18 | Updated: 2025-08-11 プロンプトインジェクション大規模言語モデル性能評価手法 2025.05.18 文献データベース
Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29 性能評価手法攻撃検出量子フレームワーク 2025.04.29 文献データベース
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 プライバシー保護プロトコル性能評価手法透かし設計 2025.04.16 文献データベース
Large Language Models are Unreliable for Cyber Threat Intelligence Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16 Few-Shot Learningプロンプトリーキング性能評価手法 2025.03.29 文献データベース
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 RAGへのポイズニング攻撃性能評価手法特徴抽出手法 2025.03.20 2025.04.03 文献データベース
RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16 プライバシー保護プロトコル性能評価手法連合学習 2025.02.13 文献データベース
OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud Authors: Shuai Yuan, Hongwei Li, Xinyuan Qian, Guowen Xu | Published: 2024-09-28 | Updated: 2025-07-21 プライバシーと最適化性能評価手法暗号化手法 2024.09.28 文献データベース
Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21 ネットワーク脅威検出モデル抽出攻撃性能評価手法 2024.01.10 文献データベース
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31 データ収集手法ネットワークトラフィック分析性能評価手法 2019.05.31 2025.04.03 文献データベース