From 005e1eca0c7c94332927a3e347c1dcda8b79a196 Mon Sep 17 00:00:00 2001 From: Frank Xu Date: Tue, 23 Jul 2024 10:31:47 -0400 Subject: [PATCH] add CKIM2024 cyber incident case study --- AI4Forensics/CKIM2024/readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/AI4Forensics/CKIM2024/readme.md b/AI4Forensics/CKIM2024/readme.md index 5f7e56a..1cfc2ee 100644 --- a/AI4Forensics/CKIM2024/readme.md +++ b/AI4Forensics/CKIM2024/readme.md @@ -48,7 +48,7 @@ By fostering a collaborative learning environment, this tutorial aims to empower The cyber incident report documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs. -Here is an example of a reconstructed digital forensics knowledge graph: +Here is an example of a reconstructed digital forensics knowledge graph: ### Political Insight Analysis Leveraging LLMs