Recent papers on Security and Evaluation

Sorted by publication year (newest first) via OpenAlex. List regenerates every 24h.

  1. Agentic Artificial Intelligence for Offensive Capture-the-Flag Challenges: Design, Ethical Boundaries, and Security Evaluation

    2026 · Zenodo (CERN European Organization for Nuclear Research) · Hayes, Nidra, Komi, Jacob

    2026
  2. Red-Teaming Agent Execution Contexts: Open-World Security Evaluation on OpenClaw

    2026 · arXiv (Cornell University) · Yao, Hongwei, Liu, Yiming, He, Yiling et al.

    2026
  3. A Statistical Evaluation of Artificial Intelligence (AI) and Big Data Analytics on National Security Performance Indicators in Nigeria: A Simulation-Based Analysis

    2026 · Zenodo (CERN European Organization for Nuclear Research) · T.,, Alanamu,, K.O.,, Adetunji,, M.O., Muhammed et al.

    2026
  4. When the Ruler is Broken: Parsing-Induced Suppression in LLM-Based Security Log Evaluation

    2026 · ArXiv.org · Garware, Chaitanya Vilas, Zisad, Sharif Noor

    2026
  5. Security Evaluation of the TIF Dashboard Using the Penetration Testing Execution Standard (PTES) Methodology

    2026 · Engineering and Technology Journal · Rinaldi, Muhammad Aditya, Abdillah, Rahmad, ., Novriyanto et al.

    2026
  6. A NOVEL GEOMETRIC MEAN-BASED AHP APPROACH: IMPROVING CONSISTENCY IN THE EVALUATION OF ENERGY SECURITY CRITERIA

    2026 · Veredas do Direito Direito Ambiental e Desenvolvimento Sustentável · Ergün, Edanur

    2026
  7. Reactive Correctness, sIND-CPAD-Security and Deterministic Evaluation for TFHE

    2026 · IACR Communications in Cryptology · Smart, Nigel, Walter, Michael

    2026
  8. An Evaluation of AES-256 Based PDF Document Security Using Cryptographic Metrics and Blockchain Based Hash Storage

    2026 · Scientific Journal of Informatics · Chandra, Ellen, Astuti, Nur Rochmah Dyah Puji

    2026
  9. Improving Interoperability among Defence and National Security Ontologies: Analysis and Evaluation Tasks

    2026 · Zenodo (CERN European Organization for Nuclear Research) · Dilworth, Jonathon, Cotovio, Pedro, Herron, David et al.

    2026
  10. Preparing research software engineers to become security champions: Development and evaluation of a security awareness workshop

    2026 · Future Generation Computer Systems · Armstrong, Matthew, Carver, Jeffrey, Milewicz, Reed

    2026
  11. EVALUATION OF THE DEVELOPMENT OF INDEPENDENCE IN AGRICULTURAL AND LIVESTOCK ACTIVITIES TO PROMOTE FOOD SECURITY AT THE CLASS IIA BATAM CORRECTIONAL INSTITUTION

    2026 · DOAJ (DOAJ: Directory of Open Access Journals) · Firmansyah, Muhammad Rafly, Simanjuntak, Meitissa Vanya

    2026
  12. A Quantitative Evaluation Method of Security Embeddedness in ICS Products Based on IEC 62443-4-2 Security Requirements

    2026 · Academic Society for Appropriate Technology · Jin, Jungha, Park, SangSeon

    2026
  13. Evaluating Autoencoders Vs Variational Autoencoders For Anomaly Detection In Network Security

    2026 · Global Journal of Engineering Innovations and Interdisciplinary Research · Cherla, Lavanya Kumari, Mounika, Tallapally, Akurathi, Lakshmi Pathi Rao

    2026
  14. Security evaluation and anomaly correction for EV charging network considering hybrid cyber-attacks

    2026 · Electric Power Systems Research · Xia, Jinhui, Wang, Mengzhi, Huang, Lingying

    2026
  15. Research on Security Evaluation Technology of Active Defense Network Driven by Big Data

    2026 · IEIE Transactions on Smart Processing and Computing · Guo, Yunhong, Zhang, Shihao

    2026
  16. An Empirical Security Evaluation of LLM-Generated Cryptographic Rust Code

    2026 · ArXiv.org · Elsayed, Mohamed, Fulton, Kenneth, Yang, Jeong

    2026

Command palette

Jump anywhere, run any action.