Picture for Dudu Mimran

Dudu Mimran

KubeGuard: LLM-Assisted Kubernetes Hardening via Configuration Files and Runtime Logs Analysis

Add code
Sep 04, 2025
Viaarxiv icon

ImpReSS: Implicit Recommender System for Support Conversations

Add code
Jun 17, 2025
Figure 1 for ImpReSS: Implicit Recommender System for Support Conversations
Figure 2 for ImpReSS: Implicit Recommender System for Support Conversations
Figure 3 for ImpReSS: Implicit Recommender System for Support Conversations
Figure 4 for ImpReSS: Implicit Recommender System for Support Conversations
Viaarxiv icon

Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp

Add code
May 03, 2025
Viaarxiv icon

Detection of Compromised Functions in a Serverless Cloud Environment

Add code
Aug 05, 2024
Figure 1 for Detection of Compromised Functions in a Serverless Cloud Environment
Figure 2 for Detection of Compromised Functions in a Serverless Cloud Environment
Figure 3 for Detection of Compromised Functions in a Serverless Cloud Environment
Figure 4 for Detection of Compromised Functions in a Serverless Cloud Environment
Viaarxiv icon

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

Add code
Jul 06, 2024
Figure 1 for LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Figure 2 for LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Figure 3 for LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Figure 4 for LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Viaarxiv icon

GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation

Add code
May 30, 2024
Viaarxiv icon

CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants

Add code
Apr 13, 2024
Figure 1 for CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Figure 2 for CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Figure 3 for CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Figure 4 for CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants
Viaarxiv icon

Adversarial Machine Learning Threat Analysis in Open Radio Access Networks

Add code
Jan 16, 2022
Figure 1 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 2 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 3 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Figure 4 for Adversarial Machine Learning Threat Analysis in Open Radio Access Networks
Viaarxiv icon