[1]
F. Aguilera-Martinez and F. Berzal, “LLM Security: Vulnerabilities, Attacks, Defenses, and Countermeasures”, SI, vol. 2, no. 2, May 2025.