Unresolved Challenges in AI-Driven Cybersecurity
G-CTR Framework Analysis | Mayoral-Vilches et al., arXiv:2601.05887
502x
Scalability Speedup
GPT-5
Best LLM
0.869
G-CTR Composite
6x
Annotation Speedup
Attack Graph Generation Time
Coverage by Method
LLM Cybersecurity Benchmark
Integration Approach Comparison
Annotation Workflow Comparison