AutoBnB-RAG: Enhancing Multi-Agent Incident Response with
Retrieval-Augmented Generation
http://arxiv.org/abs/2508.13118v1
VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in
Verilog
http://arxiv.org/abs/2508.13092v1
MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of
Diverse Innovative Strategies
http://arxiv.org/abs/2508.13048v1
AuthenTree: A Scalable MPC-Based Distributed Trust Architecture for
Chiplet-based Heterogeneous Systems
http://arxiv.org/abs/2508.13033v1
The Application of Transformer-Based Models for Predicting Consequences
of Cyber Attacks
http://arxiv.org/abs/2508.13030v1
Prescriptive Zero Trust- Assessing the impact of zero trust on cyber
attack prevention
http://arxiv.org/abs/2508.12953v1
SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite
State Machines in Systems-on-Chip
http://arxiv.org/abs/2508.12910v1
FuSaR: A Fuzzification-Based Method for LRM Safety-Reasoning Balance
http://arxiv.org/abs/2508.12897v1
Supporting Socially Constrained Private Communications with
SecureWhispers
http://arxiv.org/abs/2508.12870v1
The covering radius of Butson Hadamard codes for the homogeneous metric
http://arxiv.org/abs/2508.12859v1
Efficient and Verifiable Privacy-Preserving Convolutional Computation
for CNN Inference with Untrusted Clouds
http://arxiv.org/abs/2508.12832v1
Unlearning Comparator: A Visual Analytics System for Comparative
Evaluation of Machine Unlearning Methods
http://arxiv.org/abs/2508.12730v1
MPOCryptoML: Multi-Pattern based Off-Chain Crypto Money Laundering
Detection
http://arxiv.org/abs/2508.12641v1
Consiglieres in the Shadow: Understanding the Use of Uncensored Large
Language Models in Cybercrimes
http://arxiv.org/abs/2508.12622v1
UAV Individual Identification via Distilled RF Fingerprints-Based LLM in
ISAC Networks
http://arxiv.org/abs/2508.12597v1
Reducing False Positives with Active Behavioral Analysis for Cloud
Security
http://arxiv.org/abs/2508.12584v1
Cyber Risks to Next-Gen Brain-Computer Interfaces: Analysis and
Recommendations
http://arxiv.org/abs/2508.12571v1
Data-driven Trust Bootstrapping for Mobile Edge Computing-based
Industrial IoT Services
http://arxiv.org/abs/2508.12560v1
DEFENDCLI: {Command-Line} Driven Attack Provenance Examination
http://arxiv.org/abs/2508.12553v1
The Hidden Cost of Correlation: Rethinking Privacy Leakage in Local
Differential Privacy
http://arxiv.org/abs/2508.12539v1
Systematic Analysis of MCP Security
http://arxiv.org/abs/2508.12538v1
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>