グラフ分析

Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs

Authors: Venkata Tanuja Madireddy | Published: 2025-12-11
グラフ分析
トリガーの検知
行動分析手法

Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study

Authors: Yuchen Lei, Yuexin Xiang, Qin Wang, Rafael Dowsley, Tsz Hon Yuen, Kim-Kwang Raymond Choo, Jiangshan Yu | Published: 2025-01-30 | Updated: 2025-09-04
インダイレクトプロンプトインジェクション
グラフ分析
不正取引