|
AI's Double Edged Sword: Fighting Against Synthetic CSAM
Shekhinah Adra Green, Old Dominion University
|
|
Artificial Intelligence Moderation in Online Gaming: A Cybersecurity Analysis of Risks and Defenses
Labib Khan, Old Dominion University
|
|
Bio-cybersecurity: Securing the Healthcare Industry
Amanda D. Coleman, Old Dominion University
|
|
Escaping Isolation: An Analysis of Virtual Machine and Container Breakout Vulnerabilities
Felix Iov, William & Mary
|
|
Hijacking the Prompt: A Survey of Prompt Injection Attacks, Detection, and Defense in Large Language Models
Edward J. Griggs, Christopher Newport University
|
|
Landscaping of MCP: An Overview of MCP Mitigations and Tools
Arden Michel, William & Mary
|
|
Limitations of Signature-Based Network Intrusion Detection Under Modern Traffic Conditions
Henry Guidry, Christopher Newport University
|
|
Phishing Restraint: University Simulated Phishing Campaigns
Alexander M. Abou Khir, Old Dominion University
|
|
Security Risks of AI-Generated Code in Software Development
Maame Agyekum, Christopher Newport University
|
|
Social Engineering in the Age of AI
Mohammad A. Saleh, Old Dominion University
|
|
Temperature-Induced Uncertainty in Fixed-Context Retrieval-Augmented Generation
Steven Zeng, William & Mary
Murat Kuzlu, Old Dominion University
|