diff --git a/AI4Forensics/CKIM2024/readme.md b/AI4Forensics/CKIM2024/readme.md index 5e776ce..2352c5c 100644 --- a/AI4Forensics/CKIM2024/readme.md +++ b/AI4Forensics/CKIM2024/readme.md @@ -49,6 +49,7 @@ By fostering a collaborative learning environment, this tutorial aims to empower The cyber incident report documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs. Here is an example of a reconstructed digital forensics knowledge graph: + ### Political Insight Analysis Leveraging LLMs