﻿{"id":5893,"date":"2025-11-11T15:57:06","date_gmt":"2025-11-11T15:57:06","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5893"},"modified":"2025-11-16T19:14:07","modified_gmt":"2025-11-16T19:14:07","slug":"two-cybersecurity-papers-one-at-the-3rd-international-conference-on-foundation-and-large-language-models-fllm2025-and-one-at-the-12th-ieee-international-conference-on-social-networks-analysis-man","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2025\/11\/11\/two-cybersecurity-papers-one-at-the-3rd-international-conference-on-foundation-and-large-language-models-fllm2025-and-one-at-the-12th-ieee-international-conference-on-social-networks-analysis-man\/","title":{"rendered":"Two cybersecurity papers accepted: one at the 3rd International Conference on Foundation Models and Large Language Models (FLLM2025)  and one at the 12th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2025)"},"content":{"rendered":"<p>We have two research papers accepted: one at the <a href=\"https:\/\/fllm-conference.org\/2025\/\">3rd International Conference on Foundation and Large Language Models (FLLM2025)<\/a> and one at the <a href=\"https:\/\/emergingtechnet.org\/SNAMS2025\/\">12th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2025)<\/a> -- both conferences are co-located, saving CO2 footprint as only one presenter needs to fly to Vienna in order to present both papers.<\/p>\n<ul>\n<li>Adetayo Adebimpe, Helmut Neukirchen, Thomas Welsh<br \/>\n<i>SBASH: a Framework for Designing and Evaluating RAG vs. Prompt-Tuned LLM Honeypots.<\/i><br \/>\nThe 3rd International Conference on Foundation and Large Language Models (FLLM2025), IEEE, to appear 2025.<br \/>\n<a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/10\/Adebimpe_Neukirchen_Welsh_SBASH_Framework_RAG_Prompt_Tuned_LLM_Honeypots.pdf\">Download<\/a> Postprint DOI: <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2510.21459\">10.48550\/arXiv.2510.21459<\/a><\/li>\n<li>Thomas Welsh, Krist\u00f3fer Finnsson, Brynj\u00f3lfur Stef\u00e1nsson, Helmut Neukirchen<br \/>\n<i>Towards Socio-Technical Topology-Aware Adaptive Threat Detection in Software Supply Chains.<\/i><br \/>\nThe 12 International Conference on Social Networks Analysis, Management and Security (SNAMS 2025), IEEE, to appear 2025.<br \/>\n<a href=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/10\/Welsh_Finnsson_Stefansson_Neukirchen_Towards_Sociotechnical_Adapative_SSCSec.pdf\">Download<\/a> Postprint DOI: <a href=\"https:\/\/doi.org\/10.48550\/arXiv.2510.21452\">10.48550\/arXiv.2510.21452<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/fllm-conference.org\/2025\/program_details.php\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend-670x311.png\" alt=\"\" width=\"670\" height=\"311\" class=\"alignnone size-medium wp-image-5895\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend-670x311.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend-1024x476.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend-150x70.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend-768x357.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/FLLM2025_detailed_agend.png 1349w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/emergingtechnet.org\/SNAMS2025\/program_details.php\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend-670x248.png\" alt=\"\" width=\"670\" height=\"248\" class=\"alignnone size-medium wp-image-5896\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend-670x248.png 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend-1024x380.png 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend-150x56.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend-768x285.png 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/11\/SNAM2025_detailed_agend.png 1338w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/a><\/p>\n<hr>\n<p>This research is in the context of our <a href=\"https:\/\/uni.hi.is\/helmut\/cybersecurity\/\">cybersecurity activities<\/a> and the ECCC\/EU co-funded projects <a href=\"https:\/\/uni.hi.is\/helmut\/research\/icedef-defend-iceland\/\">ICEDEF \u2013 Defend Iceland<\/a> and <a href=\"https:\/\/uni.hi.is\/helmut\/research\/eyvor-ncc\/\">Eyv\u00f6r \u2013 the National Cybersecurity Coordination Centre of Iceland (NCC-IS)<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png\" alt=\"\" width=\"150\" height=\"49\" class=\"alignright size-thumbnail wp-image-5148\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo.png 442w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><br \/>\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg\" alt=\"\" width=\"150\" height=\"31\" class=\"alignright size-thumbnail wp-image-3911\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-670x141.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-768x161.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS.jpg 991w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have two research papers accepted: one at the 3rd International Conference on Foundation and Large Language Models (FLLM2025) and one at the 12th IEEE International Conference on Social Networks Analysis, Management and Security (SNAMS-2025) -- both conferences are co-located, saving CO2 footprint as only one presenter needs to fly to Vienna in order to [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208,79],"tags":[],"class_list":["post-5893","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-research"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5893"}],"version-history":[{"count":11,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5893\/revisions"}],"predecessor-version":[{"id":5907,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5893\/revisions\/5907"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}