ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2404.11338
  4. Cited By
LLMs for Cyber Security: New Opportunities

LLMs for Cyber Security: New Opportunities

17 April 2024
D. Divakaran
Sai Teja Peddinti
ArXiv (abs)PDFHTML

Papers citing "LLMs for Cyber Security: New Opportunities"

11 / 11 papers shown
Title
From Trace to Line: LLM Agent for Real-World OSS Vulnerability Localization
From Trace to Line: LLM Agent for Real-World OSS Vulnerability Localization
Haoran Xi
Minghao Shao
Brendan Dolan-Gavitt
Muhammad Shafique
Ramesh Karri
LLMAG
207
0
0
30 Sep 2025
Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques
Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection TechniquesIEEE Communications Surveys and Tutorials (COMST), 2025
Aditya Kulkarni
Vivek Balachandran
Tamal Das
42
8
0
10 Sep 2025
Adaptive Linguistic Prompting (ALP) Enhances Phishing Webpage Detection in Multimodal Large Language Models
Adaptive Linguistic Prompting (ALP) Enhances Phishing Webpage Detection in Multimodal Large Language Models
Atharva Bhargude
Ishan Gonehal
Dave Yoon
Kaustubh Vinnakota
Chandler Haney
Aaron Sandoval
Kevin Zhu
100
0
0
29 Jun 2025
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems
Yazan Otoum
Arghavan Asad
Amiya Nayak
404
12
0
01 May 2025
Prompt Inject Detection with Generative Explanation as an Investigative Tool
Prompt Inject Detection with Generative Explanation as an Investigative Tool
Jonathan Pan
Swee Liang Wong
Yidi Yuan
Xin Wei Chia
SILM
300
1
0
16 Feb 2025
Hacking Back the AI-Hacker: Prompt Injection as a Defense Against
  LLM-driven Cyberattacks
Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks
Dario Pasquini
Evgenios M. Kornaropoulos
G. Ateniese
AAML
185
10
0
28 Oct 2024
Content Moderation by LLM: From Accuracy to Legitimacy
Content Moderation by LLM: From Accuracy to LegitimacyArtificial Intelligence Review (Artif Intell Rev), 2024
Tao Huang
AILaw
300
17
0
05 Sep 2024
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance
  Graphs
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance GraphsAPWG Symposium on Electronic Crime Research (APWG eCrime), 2024
Philipp Gysel
Candid Wuest
Kenneth Nwafor
Otakar Jašek
Andrey Ustyuzhanin
D. Divakaran
207
3
0
17 Aug 2024
Multimodal Large Language Models for Phishing Webpage Detection and
  Identification
Multimodal Large Language Models for Phishing Webpage Detection and IdentificationAPWG Symposium on Electronic Crime Research (APWG eCrime), 2024
Jehyun Lee
Peiyuan Lim
Bryan Hooi
D. Divakaran
169
16
0
12 Aug 2024
Large Language Models for Cyber Security: A Systematic Literature Review
Large Language Models for Cyber Security: A Systematic Literature Review
HanXiang Xu
Shenao Wang
Ningke Li
Kaidi Wang
Yanjie Zhao
Kai Chen
Ting Yu
Yang Liu
Haoyu Wang
518
98
0
08 May 2024
Certifying LLM Safety against Adversarial Prompting
Certifying LLM Safety against Adversarial Prompting
Aounon Kumar
Chirag Agarwal
Suraj Srinivas
Aaron Jiaxun Li
Soheil Feizi
Himabindu Lakkaraju
AAML
586
259
0
06 Sep 2023
1