437

Researchers warn generative tools are helping militant groups from neo-Nazis to the Islamic State spread ideologyWhile the artificial intelligence boom is upending sections of the music industry, voice generating bots are also becoming a boon to another unlikely corner of the internet: extremist mov…
317

arXiv:2512.16717v1 Announce Type: new
Abstract: In actuality, phishing attacks remain one of the most prevalent cybersecurity risks in existence today, with malevolent actors constantly changing their strategies to successfully trick users. This paper presents an AI model for a phishing detection s…
211

arXiv:2512.15966v1 Announce Type: new
Abstract: For the rise of electric vehicles, especially for long-distance driving, minimizing charging times is vital. While multiple standards for DC fast charging exist, the leading standard in Europe is ISO 15118. In theory, this standard is accompanied by a…
111

arXiv:2512.15794v1 Announce Type: new
Abstract: This paper analyzes the relationship between cybersecurity management, data protection, and corporate reputation in the context of digital transformation. The study examines how organizations implement strategies and tools to mitigate cyber risks, com…
109

arXiv:2411.14516v2 Announce Type: replace
Abstract: Neural networks are often trained on proprietary datasets, making them attractive attack targets. We present a novel dataset extraction method leveraging an innovative training time backdoor attack, allowing a malicious federated learning server t…