Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
8 sources · matching filters · sorted by citation density
Sort
BApplied AI in Security8 sources
01

Computer security incident handling guide covering detection, analysis, containment, eradication, and recovery.

Test your knowledge · B1
02

Comprehensive survey of ML applications in cybersecurity. Covers supervised/unsupervised approaches for intrusion detection, malware analysis, phishing detection. Maps ML techniques to security use cases with performance benchmarks.

Test your knowledge · B1
03

Sec-PaLM and Security AI Workbench for threat intelligence summarization and detection. Shows how LLMs are being applied to SOC workflows — not just pattern matching but contextual threat analysis.

Test your knowledge · B1
04

Research on using LLMs for automated triage, alert correlation, and response orchestration. Includes studies on analyst productivity gains and error reduction.

Test your knowledge · B2
05

LLM-powered security assistant. Technical docs cover prompt engineering for security, incident summarization, KQL generation. Useful for questions about practical LLM integration in SOC, not product features.

Test your knowledge · B1
06

Knowledge graph of cybersecurity countermeasures. Maps defensive techniques to the ATT&CK techniques they counter.

Test your knowledge · B1
07

Workshop proceedings covering the bidirectional relationship between AI and security. Sections on automation risks (adversarial evasion of AI detectors, automation bias in SOC).

Test your knowledge · B2
08

SOAR platform with 800+ integrations. The playbook marketplace shows real-world automation patterns: phishing triage, enrichment, containment. Useful for understanding what's actually automatable vs. aspirational.

GuideIntermediateB2 · AI-Driven Security AutomationNEW · 22d ago
Test your knowledge · B2

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.