<?xml version="1.0" encoding="UTF-8"?>
  <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 
  <url>
    <loc>https://www.sans.edu/research-papers/building-scalable-detection-code-pipelines-agentic-validation-refinement</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/evaluating-large-language-models-automated-threat-modeling-comparative-analysis</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/32839</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/protecting-ot-inherent-front-end-vulnerabilities</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/automating-generative-ai-guidelines-reducing-prompt-injection-risk-shift-left-mitre-atlas-mitigation-testing</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/structural-vulnerability-autodesk-revit-server-wan-exposure-versus-cost-autodesk-construction-cloud</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/code-modularity-heuristic-malware-design</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/scrutinizing-web-based-llm-private-browsing-mode-analysis-memory-artifacts-privacy-implications</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/can-your-security-stack-handle-ai-empirical-assessment-enterprise-controls-versus-generative-ai-risks</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/isolated-trust-zero-trust-standalone-systems</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/adversary-aware-ioc-retention-analyzing-time-live-patterns-threat-actor-attribution</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/breaking-time-methods-artifacts-forensic-detection-timestomping-fat32-ext3-ext4-file-systems</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/breaking-through-deception-addressing-barriers-adoption-cyber-deception-technologies</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/interrogators-attack-surface-mapping-agentic-world</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/you-again-fingerprinting-tracking-mechanisms-malicious-sites</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/privacy-protections-are-stronger-laws-changing-what-we-reveal</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/mimic-octopus-weaponizing-file-corruption-recoverability-bypass-antivirus-email-filtering</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/fixing-what-you-broke-can-ai-be-used-thwart-ai-generated-malware</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/forensic-investigation-bluetooth-based-credit-card-skimmers</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/trust-but-verify-evaluating-accuracy-llms-normalizing-threat-data-feeds</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/do-ai-coding-assistants-make-bad-coders-worse-security-evaluation-github-copilot</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/evaluating-zero-trust-network-access-framework-comparative-security-testing</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/securing-azure-pim-just-in-time-access-study</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/beneath-mask-can-contribution-data-unveil-malicious-personas-open-source-projects</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/ai-driven-insecurity-assessing-security-gaps-ai-generated-it-guidance</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/out-band-defense-securing-vpns-from-password-spray-attacks-cloud-automation</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/from-crash-compromise-unlocking-potential-windows-crash-dumps-offensive-security</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/siem-detection-logic-conversion-with-llms</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/catching-the-hand-cookie-jar-canary-session-cookies</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/pebble-ocean-maximizing-log-fidelity-container-environments</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/webs-deception-using-sans-ics-kill-chain-flip-advantage-defender</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/validating-effectiveness-mitre-engage-active-defense</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/shift-left-awareness-detection-developers-using-vulnerable-open-source-software-components</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/leveraging-large-language-models-security-focused-code-reviews</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/strolling-through-stig</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/building-resilient-iot-devices-binary-hardening-with-yocto-and-clang</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/identifying-advanced-persistent-threat-activity-through-threat-informed-detection-engineering-enhancing-alert-visibility-enterprises</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/flavor-clouds-some-cloud-platforms-more-attractive-attackers</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/persistence-busters-high-impact-methods-adversary-threat-detection</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/evaluating-modern-network-protocol-fingerprinting-defending-bastion-hosts-hostile-networks</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/unveiling-dependency-network-telemetry-optimizing-lateral-movement-detection</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/detecting-azure-hybrid-machine-attack-paths-graph-theory</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/beyond-detection-using-real-phishing-data-gauge-security-training-program-success</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/mitre-att-ck-labeling-cyber-threat-intelligence-via-llm</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/protecting-poor-deep-dive-ebt-skimming-solutions-combat</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/hunting-hound-of-hades-kerberos-delegation-attacks-detections-defenses</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/revolutionizing-enterprise-security-exciting-future-passkeys-beyond-passwords</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/proof-pudding-edr-configuration-versus-ransomware</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/untested-an-overlooked-link-software-supply-chain</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/cyber-risk-intelligence-security-posture-crisp-compliance-threat-informed-intelligence</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/implementing-micro-segmentation-legacy-enterprise-lab-network</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/assessing-impact-memory-acquisition-key-windows-artifacts</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/post-exploitation-c2-framework-effectiveness-against-advanced-audit-logging</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/leveraging-generative-ai-password-cracking-efficiency-under-resource-constraints</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/enhancing-linux-threat-detection-sysmon-based-approach-identifying-sandworm-ttps</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/open-source-national-security-infrastructure-swedens-national-security-apparatus</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/ics-asset-inventory-passive-active-siemens-s7-1200-plcs</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/reducing-excessive-trust-web-pki-ecosystem</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/detecting-ai-pickling</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/how-many-llms-classify-suspicious-email</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/autonomous-threat-emulation-detection-using-agentic-ai</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/evaluating-configurations-reducing-problematic-emotional-engagement-enterprise-llm-deployments-implications-insider-threat-risk</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/configuring-windows-11-workgroup-computers-cis-windows-11-l1-bitlocker-baseline-recommendations-using-powershell-dsc</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/from-ambiguity-action-forensic-framework-differentiating-clickfix-payloads</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/digital-forensics-incident-response-cloud-addressing-gcp-challenges</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/infrastructure-as-code-driven-group-policy-infrastructure-comprehensive-engine-group-policy-architecture-enforcement</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/marketing-added-value-truth-about-purpose-built-detection-response-container</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/enhancing-security-operations-google-threat-intelligence</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/no-cost-detection-endpoint-hard-drive-removal</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/defending-vulnerable-populations-against-scams-effectiveness-browser-extensions-mitigating-scammer-attack-chains</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/measuring-malware-obfuscation-evaluating-cnn-based-detection-real-world-resilience</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/sanitized-source-removing-embedded-objects-plc-projects-cdr</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/bookmark-bruggling-novel-data-exfiltration-with-brugglemark</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/operationalizing-ctem-soc-proactive-approach-threat-detection-response</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.edu/research-papers/39680</loc>
    <lastmod>2026-04-28T16:40:55Z</lastmod>
  </url>

  </urlset>