From 52ffd9154c6f1e9a168f02d2bf3dfc6e32b41051 Mon Sep 17 00:00:00 2001 From: Frank Xu Date: Tue, 23 Jul 2024 10:33:30 -0400 Subject: [PATCH] add CKIM2024 cyber incident case study --- AI4Forensics/CKIM2024/readme.md | 1 + 1 file changed, 1 insertion(+) diff --git a/AI4Forensics/CKIM2024/readme.md b/AI4Forensics/CKIM2024/readme.md index 5e776ce..2352c5c 100644 --- a/AI4Forensics/CKIM2024/readme.md +++ b/AI4Forensics/CKIM2024/readme.md @@ -49,6 +49,7 @@ By fostering a collaborative learning environment, this tutorial aims to empower The cyber incident report documents a conversation between an IT Security Specialist and an Employee about an email phishing attack. We use LLMs to identify evidence entities and relationships and to construct digital forensic knowledge graphs. Here is an example of a reconstructed digital forensics knowledge graph: + ### Political Insight Analysis Leveraging LLMs