Abstract is missing.
- Real-time Analytics for APT Detection and Threat Hunting Using Cyber-threat Intelligence and Provenance GraphsV. N. Venkatakrishnan. 1 [doi]
- Enhancing Security Insights with KnowGen-RAG: Combining Knowledge Graphs, LLMs, and Multimodal InterpretabilityArnav Nishith Sharma, Khandakar Ashrafi Akbar, Bhavani Thuraisingham, Latifur Khan. 2-12 [doi]
- Generative AI vs. Human Deception: A Comparative Analysis of ChatGPT, Gemini, and Human-Generated DisinformationChristopher Mason, Ahmed AlEroud, Abdullah Melhem, Zain A. Halloush, Jason A. Williams. 13-22 [doi]
- Exploring Prompt Patterns for Effective Vulnerability Repair in Real-World Code by Large Language ModelsYining Luo, Baobao Li, Anoop Singhal, Peiyu Tseng, Lan Zhang, Qingtian Zou, Xiaoyan Sun, Peng Liu. 23-33 [doi]
- LLMs Under Attack: Understanding the Adversarial MindsetBryan E. Tuck. 34-35 [doi]
- Secure and attack-resilient Release of Timed Information using BlockchainsBalaji Palanisamy. 36-37 [doi]
- Poisoning Attacks against Quantile L1 Regression in CPS Anomaly Detection FrameworksMohammad Jaminur Islam, Richard T. Meyer, Shameek Bhattacharjee. 38-48 [doi]
- A Framework for Cryptographic Verifiability of End-to-End AI PipelinesKar Balan, Robert Learney, Tim Wood 0003. 49-59 [doi]
- Sparse Moving Averages for Lifelong Open-Ended Probabilistic PredictionOmid Madani. 60-61 [doi]
- Analyzing Security & Privacy (S&P) Labels For AI Integrated Social Robots: A Novel User Assessment Based Research StudyEzra Faith, Ankur Chattopadhyay, Mohammad Q. Azhar. 62-72 [doi]
- Privacy Risks and Protections in 2021 Texas State Abortion DataVaroon Bashyakarla, Prem Radhakrishnan, Katelynn Hernandez, Alex Hlavka. 73-78 [doi]