{"id":"https://openalex.org/W7125381354","doi":"https://doi.org/10.48550/arxiv.2601.14606","title":"An LLM Agent-based Framework for Whaling Countermeasures","display_name":"An LLM Agent-based Framework for Whaling Countermeasures","publication_year":2026,"publication_date":"2026-01-21","ids":{"openalex":"https://openalex.org/W7125381354","doi":"https://doi.org/10.48550/arxiv.2601.14606"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.14606","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.14606","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123583346","display_name":"Daisuke Miyamoto","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Miyamoto, Daisuke","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000216060","display_name":"Takuji Iimura","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Iimura, Takuji","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5111513462","display_name":"Joel Peter Atkinson.","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michishita, Narushige","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123583346"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.05770000070333481,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.05770000070333481,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.05389999970793724,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.053300000727176666,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/whaling","display_name":"Whaling","score":0.9449999928474426},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.557200014591217},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.507099986076355},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4952999949455261},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.48019999265670776},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.41190001368522644}],"concepts":[{"id":"https://openalex.org/C519069842","wikidata":"https://www.wikidata.org/wiki/Q42767","display_name":"Whaling","level":2,"score":0.9449999928474426},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.557200014591217},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.507099986076355},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4952999949455261},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.48019999265670776},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4194999933242798},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.41190001368522644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3765999972820282},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.36660000681877136},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3517000079154968},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3328999876976013},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.32659998536109924},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.31619998812675476},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3082999885082245},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.27059999108314514},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.25529998540878296}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.14606","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.14606","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.14606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,38,62,82,170,181,195,211],"spread":[2],"of":[3,22,40,66,84,204,214],"generative":[4,90,103],"AI":[5,104],"in":[6],"recent":[7],"years,":[8],"attacks":[9,97],"known":[10],"as":[11,70],"Whaling":[12,18,96,114,158,178,219],"have":[13],"become":[14,106],"a":[15,20,113,187],"serious":[16],"threat.":[17],"is":[19],"form":[21],"social":[23],"engineering":[24],"that":[25,48,95,121,136,194,207],"targets":[26],"important":[27],"high-authority":[28],"individuals":[29],"within":[30,54],"organizations":[31],"and":[32,73,126,172,175,227,233],"uses":[33,127],"sophisticated":[34],"fraudulent":[35],"emails.":[36],"In":[37,108],"context":[39,213],"Japanese":[41],"universities,":[42],"faculty":[43,119,149,215],"members":[44,120,216],"frequently":[45],"hold":[46],"positions":[47],"combine":[49],"research":[50],"leadership":[51],"with":[52,210],"authority":[53],"institutional":[55],"workflows.":[56],"This":[57,92],"structural":[58],"characteristic":[59],"leads":[60],"to":[61,157,169],"wide":[63],"public":[64],"disclosure":[65],"high-value":[67],"information":[68,79,147],"such":[69],"publications,":[71],"grants,":[72],"detailed":[74],"researcher":[75],"profiles.":[76,183],"Such":[77],"extensive":[78],"exposure":[80],"enables":[81],"construction":[83],"highly":[85],"precise":[86],"target":[87,143],"profiles":[88,125,140,167],"using":[89,180],"AI.":[91],"raises":[93],"concerns":[94],"based":[98,160],"on":[99,148,161],"high-precision":[100],"profiling":[101],"by":[102,202],"will":[105],"prevalent.":[107],"this":[109],"study,":[110],"we":[111,185],"propose":[112],"countermeasure":[115],"framework":[116],"for":[117,141,229],"university":[118],"constructs":[122],"personalized":[123],"defense":[124,159,166,182],"large":[128],"language":[129],"model":[130],"(LLM)-based":[131],"agents.":[132],"We":[133],"design":[134],"agents":[135],"(i)":[137],"build":[138],"vulnerability":[139],"each":[142],"from":[144],"publicly":[145],"available":[146],"members,":[150],"(ii)":[151],"identify":[152],"potential":[153],"risk":[154],"scenarios":[155],"relevant":[156],"those":[162],"profiles,":[163],"(iii)":[164],"construct":[165],"corresponding":[168],"vulnerabilities":[171],"anticipated":[173],"risks,":[174],"(iv)":[176],"analyze":[177],"emails":[179],"Furthermore,":[184],"conduct":[186],"preliminary":[188],"risk-assessment":[189],"experiment.":[190],"The":[191,221],"results":[192],"indicate":[193],"proposed":[196],"method":[197],"can":[198],"produce":[199],"judgments":[200],"accompanied":[201],"explanations":[203],"response":[205],"policies":[206],"are":[208,218],"consistent":[209],"work":[212],"who":[217],"targets.":[220],"findings":[222],"also":[223],"highlight":[224],"practical":[225],"challenges":[226],"considerations":[228],"future":[230],"operational":[231],"deployment":[232],"systematic":[234],"evaluation.":[235]},"counts_by_year":[],"updated_date":"2026-01-23T23:24:52.574035","created_date":"2026-01-23T00:00:00"}
