{"id":"https://openalex.org/W4403278985","doi":"https://doi.org/10.1109/is61756.2024.10705238","title":"A Framework for Security Testing of Large Language Models","display_name":"A Framework for Security Testing of Large Language Models","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4403278985","doi":"https://doi.org/10.1109/is61756.2024.10705238"},"language":"en","primary_location":{"id":"doi:10.1109/is61756.2024.10705238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is61756.2024.10705238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108184290","display_name":"Kiril Traykov","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kiril Traykov","raw_affiliation_strings":["Sofia,Bulgaria"],"affiliations":[{"raw_affiliation_string":"Sofia,Bulgaria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108184290"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5523,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84830368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.8364999890327454,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.8364999890327454,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.8212000131607056,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.7465999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7425544857978821},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.49344030022621155},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.33409810066223145},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.16243451833724976},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.1268005669116974},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09232872724533081},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09213268756866455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7425544857978821},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.49344030022621155},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.33409810066223145},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16243451833724976},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.1268005669116974},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09232872724533081},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09213268756866455}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/is61756.2024.10705238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/is61756.2024.10705238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1846261984","https://openalex.org/W4210690107","https://openalex.org/W4317748910","https://openalex.org/W4318002288","https://openalex.org/W4362584214","https://openalex.org/W4376644705","https://openalex.org/W4388886073","https://openalex.org/W4393948917","https://openalex.org/W6682631176","https://openalex.org/W6852755587","https://openalex.org/W6857320562","https://openalex.org/W6861285878","https://openalex.org/W6878761659"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0,26,99],"purpose":[1],"of":[2,12,59,66,75,127,134,154,159,168,200],"this":[3],"paper":[4,27],"is":[5],"to":[6,23,184],"present":[7],"a":[8],"framework":[9,89],"for":[10,17,49,110,144,165,177,197],"testing":[11,85,88,130],"large":[13],"language":[14],"models":[15,170],"(LLMs)":[16],"security":[18],"vulnerabilities":[19,65],"before":[20],"their":[21,81],"implementation":[22],"production":[24],"environment.":[25],"discusses":[28],"the":[29,33,45,47,60,67,118,125,128,135,150,152,155,157,160,166,169,181,201],"latest":[30],"developments":[31],"in":[32,44],"Artificial":[34,39],"Intelligence":[35,40],"(AI)":[36],"and":[37,53,64,73,87,93,105,120,123,137,146,194],"Generative":[38],"(Generative":[41],"AI)":[42],"adoption":[43,52],"industry,":[46],"expectations":[48],"further":[50,178],"accelerated":[51],"evolving":[54],"regulatory":[55],"landscape.":[56],"An":[57],"overview":[58],"most":[61],"significant":[62,185],"risks":[63],"LLMs":[68,113],"such":[69],"as":[70],"prompt":[71],"injection":[72],"denial":[74],"service":[76],"have":[77,90,102,107],"been":[78,91,103,108],"presented":[79],"with":[80,95,151,174,188],"mitigation":[82],"strategies.":[83],"A":[84],"approach":[86],"developed":[92],"implemented":[94],"simple":[96],"chatbot":[97],"app.":[98],"test":[100,119,138,182,203],"scenarios":[101,183],"executed":[104],"results":[106,156],"obtained":[109],"three":[111,175],"open-source":[112],"from":[114],"which":[115],"two":[116],"pass":[117],"one":[121],"failed":[122],"demonstrated":[124],"application":[126,136],"proposed":[129],"framework.":[131],"Source":[132],"code":[133],"script":[139],"are":[140],"published":[141],"open":[142],"source":[143],"reproducibility":[145],"reuse.":[147],"In":[148],"conclusion":[149],"confirmation":[153],"limitation":[158],"reliance":[161],"on":[162],"semantic":[163],"similarity":[164],"responses":[167],"was":[171],"discussed":[172],"together":[173],"areas":[176],"development:":[179],"expanding":[180],"risks,":[186],"integration":[187],"popular":[189],"cloud":[190],"continuous":[191],"development":[192],"platforms":[193],"integrating":[195],"blockchain":[196],"transparent":[198],"publication":[199],"final":[202],"results.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
