[1]
“Patterns Of LLM Weaponization: A Comparative Analysis of Exploitation Incidents Across Commercial AI Systems”, IJASSE, vol. 3, no. 2, pp. 125–146, Dec. 2025, doi: 10.55549/ijasse.50.