SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 ブロックチェーン戦略脆弱性分析透かし 2025.08.04 文献データベース
White-Basilisk: A Hybrid Model for Code Vulnerability Detection Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31 ハイブリッド分析深層学習手法脆弱性分析 2025.07.11 文献データベース
CyberRAG: An agentic RAG cyber attack classification and reporting tool Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03 RAGへのポイズニング攻撃脆弱性分析解釈可能性 2025.07.03 文献データベース
Evaluating Language Models For Threat Detection in IoT Security Logs Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03 IoTトラフィック分析モデルDoS脆弱性分析 2025.07.03 文献データベース
SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis Authors: Wang Lingxiang, Quanzhi Fu, Wenjia Song, Gelei Deng, Yi Liu, Dan Williams, Ying Zhang | Published: 2025-06-21 | Updated: 2025-07-24 コード変更分析ソフトウェアセキュリティ脆弱性分析 2025.06.21 文献データベース
LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03 RAGトークン分布分析脆弱性分析 2025.06.12 文献データベース
VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28 LLMセキュリティ脆弱性分析逆アセンブル 2025.05.28 文献データベース
Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07 LLMセキュリティ脆弱性分析 2025.05.07 文献データベース
AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07 RAGモデルDoS脆弱性分析 2025.05.07 文献データベース
LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07 LLMセキュリティ性能評価脆弱性分析 2025.05.07 文献データベース