Unresolved Challenges in AI-Driven Cybersecurity

G-CTR Framework Analysis | Mayoral-Vilches et al., arXiv:2601.05887

502x
Scalability Speedup
GPT-5
Best LLM
0.869
G-CTR Composite
6x
Annotation Speedup

Attack Graph Generation Time

Coverage by Method

LLM Cybersecurity Benchmark

Integration Approach Comparison

Annotation Workflow Comparison