{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:30:43Z","timestamp":1772753443945,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T00:00:00Z","timestamp":1724889600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,29]]},"DOI":"10.1109\/is61756.2024.10705238","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:15Z","timestamp":1728495915000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["A Framework for Security Testing of Large Language Models"],"prefix":"10.1109","author":[{"given":"Kiril","family":"Traykov","sequence":"first","affiliation":[{"name":"Sofia,Bulgaria"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Now decides next: state of Generative AI in the enterprise","year":"2024","journal-title":"2024. (January 2024.). Deloitte United States"},{"key":"ref2","article-title":"The AI Index 2024 Annual Report","author":"Maslej","year":"2024","journal-title":"AI Index Steering Committee, Institute for Human-Centered AI, Stanford University"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.AI.100-1","author":"Tabassi","year":"2023","journal-title":"Artificial Intelligence Risk Management Framework (AI RMF 1.0)"},{"key":"ref4","author":"Yao","year":"2024","journal-title":"A survey on large language model (LLM) security and privacy: The Good, the Bad, and the Ugly"},{"key":"ref5","article-title":"OWASP for Top 10 LLM Applications Version 1.1","year":"2023","journal-title":"OWASP Foundation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-218"},{"issue":"1","key":"ref7","first-page":"16","author":"Popchev","year":"2021","journal-title":"Aspects of the evolution from risk management to enterprise global risk management. - Engineering sciences, LVII"},{"key":"ref8","journal-title":"Proposal for a Regulation of the European Parliament and of the council laying down harmonised rules on artificial intelligence (Artificial Intelligence Act)\/com\/2021\/206"},{"key":"ref9","article-title":"Introducing the AI Safety Institute","year":"2024","journal-title":"GOV.UK"},{"key":"ref10","article-title":"A pro-innovation approach to AI regulation","year":"2023","journal-title":"GOV.UK"},{"key":"ref11","year":"2023","journal-title":"Executive order 14110: Safe, Secure and Trustworthy Development and Use of Artificial Intelligence"},{"key":"ref12","year":"2024","journal-title":"US AI Safety Institute annoucement"},{"key":"ref13","year":"2024","journal-title":"Llama 3"},{"key":"ref14","year":"2024","journal-title":"Mixtral 8x7B"},{"key":"ref15","year":"2024","journal-title":"Gemma 7B"},{"key":"ref16","year":"2024","journal-title":"Azure OpenAI models"},{"key":"ref17","article-title":"Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations","author":"Vassilev","year":"2024","journal-title":"(National Institute of Standards and Technology, Gaithersburg, MD) NIST Artifcial Intelligence (AI) Report, NIST Trustworthy and Responsible AI NIST AI 100\u20132e2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"ref19","year":"2024","journal-title":"Pytest: helps you write better programs"},{"key":"ref20","author":"Kaufmann","year":"2019","journal-title":"Testing robustness against unforeseen adversaries"},{"key":"ref21","author":"Liu","year":"2023","journal-title":"Prompt Injection attack against LLM-integrated Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13071361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41278-3_74"},{"key":"ref24","article-title":"ROUGE: A Package for Automatic Evaluation of summaries","volume-title":"Proceedings of the ACL Workshop: Text Summarization Braches Out 2004","volume":"10","author":"Lin","year":"2004"},{"key":"ref25","volume-title":"BLEU: a Method for Automatic Evaluation of Machine Translation","author":"Papineni","year":"2002"},{"key":"ref26","year":"2024","journal-title":"SentenseTransformer"},{"key":"ref27","author":"Reimers","year":"2019","journal-title":"Sentence-BERT: Sentence embeddings using Siamese BERT-networks"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/is57118.2022.10019715"},{"key":"ref29","article-title":"Jailbreaking black box large language models in twenty queries","author":"Chao","year":"2023","journal-title":"arXiv preprint"},{"key":"ref30","year":"2024","journal-title":"Source code repository of the python test app and test scripts"},{"key":"ref31","year":"2024","journal-title":"Groq cloud based inference system"},{"key":"ref32","year":"2024","journal-title":"LangChain available at"},{"key":"ref33","article-title":"HarmBench: A Standardized Evaluation Framework for Automated Red Teaming and Robust Refusal","author":"Mazeika","year":"2024","journal-title":"arXiv preprint"},{"key":"ref34","article-title":"Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study","author":"Liu","year":"2024","journal-title":"arXiv [Cs.SE]"},{"key":"ref35","author":"Liu","year":"2023","journal-title":"Prompt Injection attack against LLM-integrated Applications"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v19i04.36897"},{"issue":"11","key":"ref37","author":"Popchev","year":"2023","journal-title":"Multi-step methods for machine learning models with web metrics. - Comptes rendus de l\u2019 Academie bulgare des Sciences, Tome 76"},{"key":"ref38","year":"2024","journal-title":"DeepEval: The open-source LLM evaluation framework"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12102244"}],"event":{"name":"2024 IEEE 12th International Conference on Intelligent Systems (IS)","location":"Varna, Bulgaria","start":{"date-parts":[[2024,8,29]]},"end":{"date-parts":[[2024,8,31]]}},"container-title":["2024 IEEE 12th International Conference on Intelligent Systems (IS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10705133\/10705164\/10705238.pdf?arnumber=10705238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:21:33Z","timestamp":1728559293000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,29]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/is61756.2024.10705238","relation":{},"subject":[],"published":{"date-parts":[[2024,8,29]]}}}