Skip to content

Scopus AI Prompts

Ready-to-use academic search prompts for Elsevier's Scopus AI. Each prompt is under the 500 character limit.

Important Notes

Character Limit

Scopus AI has a 500 character limit per prompt. Use multiple focused queries for comprehensive research.

BibTeX Export

Always request BibTeX format for easy import into your bibliography.

Generic Templates

Survey/Review Papers

Find top 10 survey papers (2022-2025) on [TOPIC]. Return as
markdown table: Authors, Title, Year, Venue, Citations, Key
finding. Include BibTeX entries. Focus on IEEE, ACM, Elsevier.

~200 characters - customize with topic

Specific Technology

Find top 10 papers (2023-2025) on [TECHNOLOGY]: [subtopics].
Return as markdown table: Authors, Title, Year, Venue,
Citations. Include BibTeX. Prioritize [VENUES].

~180 characters - customize with details

Application Domain

Find papers (2022-2025) on [TECH] in [DOMAIN]: [applications].
Return table: Authors, Title, Year, Venue, Citations, Key
contribution. Include BibTeX entries.

~170 characters - customize with specifics

Cybersecurity Prompts

Adversarial Machine Learning (489 chars)

Find top 10 papers (2022-2025) on adversarial machine learning:
data poisoning, evasion attacks, model extraction, membership
inference. Return as markdown table: Authors, Title, Year,
Venue, Citations, Key finding. Include BibTeX. Focus on IEEE
TIFS, ACM CCS, USENIX Security.

LLM Security (481 chars)

Find top 10 papers (2023-2025) on LLM security: prompt
injection, jailbreaking, training data extraction, backdoors
in language models. Return as markdown table: Authors, Title,
Year, Venue, Citations. Include BibTeX entries. Prioritize
NeurIPS, ICML, ACL, USENIX.

Intrusion Detection with Deep Learning (487 chars)

Find top 10 survey papers (2022-2025) on deep learning for
intrusion detection: anomaly detection, network security,
real-time detection. Return as markdown table: Authors, Title,
Year, Venue, Citations. Include BibTeX entries. Focus on IEEE
TIFS, Computers & Security.

AI Risk Frameworks (474 chars)

Find papers (2022-2025) analyzing AI risk frameworks: NIST AI
RMF, ISO 42001, AI governance, regulatory compliance. Return
as markdown table: Authors, Title, Year, Venue, Citations, Key
contribution. Include BibTeX entries.

Ransomware Research (456 chars)

Find top 10 papers (2022-2025) on ransomware: detection,
prevention, forensics, cryptocurrency tracking. Return as
table: Authors, Title, Year, Venue, Citations. Include BibTeX.
Focus on IEEE, ACM, USENIX venues.

Supply Chain Security (478 chars)

Find papers (2022-2025) on software supply chain security:
dependency attacks, package managers, CI/CD security, SBOM.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize IEEE S&P, CCS, NDSS.

AI/ML Security Prompts

Federated Learning Security (465 chars)

Find top 10 papers (2022-2025) on federated learning security:
privacy attacks, Byzantine attacks, secure aggregation.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Focus on NeurIPS, ICML, IEEE TIFS.

Model Robustness (448 chars)

Find survey papers (2022-2025) on neural network robustness:
adversarial examples, certified defenses, verification.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize ICML, NeurIPS, ICLR.

AI Fairness and Bias (455 chars)

Find papers (2022-2025) on AI fairness: bias detection,
algorithmic fairness, fairness metrics, debiasing methods.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Focus on FAccT, NeurIPS, AAAI.

Software Engineering Prompts

AI Code Generation (478 chars)

Find top 10 papers (2023-2025) on AI code generation: LLM for
coding, Copilot evaluation, code completion, program
synthesis. Return as markdown table: Authors, Title, Year,
Venue, Citations. Include BibTeX. Prioritize ICSE, FSE, ASE.

DevSecOps (462 chars)

Find papers (2022-2025) on DevSecOps and security automation:
SAST, DAST, container security, CI/CD security. Return as
table: Authors, Title, Year, Venue, Citations. Include BibTeX.
Focus on IEEE S&P, CCS, NDSS.

Software Vulnerability Detection (485 chars)

Find top 10 papers (2022-2025) on automated vulnerability
detection: static analysis, ML-based detection, code analysis.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize ICSE, FSE, IEEE TSE.

Processing Results

Combine Multiple Queries

markdown
# Scopus AI Research Results
Date: [Date]

## 1. Adversarial ML Papers
[Query 1 results]

## 2. LLM Security Papers
[Query 2 results]

## 3. Defense Mechanisms
[Query 3 results]

---

## Combined BibTeX Entries

@article{...}

@inproceedings{...}

Import to Bibliography

bash
# Append BibTeX entries to bibliography
cat >> latex/bibliography.bib << 'EOF'
[Paste BibTeX entries here]
EOF

# Check for duplicates
grep -E "^@" latex/bibliography.bib | sort | uniq -d

# Validate syntax
biber --validate-datamodel latex/main

Create Citation Index

Track papers for specific chapters:

markdown
# Citation Index

## Chapter 3: Attack Vectors
- smith2024adversarial - Main attack taxonomy
- jones2024llm - LLM-specific threats

## Chapter 4: Defense Mechanisms
- wilson2024defense - Defense framework
- brown2024detection - Detection methods

High-Impact Venues

Computer Security

VenueAbbreviationTypeImpact
IEEE Trans. Information Forensics & SecurityIEEE TIFSJournalTop
ACM Conference on Computer and Communications SecurityCCSConferenceTop
USENIX Security SymposiumUSENIX SecConferenceTop
IEEE Symposium on Security and PrivacyIEEE S&PConferenceTop
Network and Distributed System SecurityNDSSConferenceTop
Computers & SecurityC&SJournalHigh

Machine Learning

VenueAbbreviationTypeImpact
Neural Information Processing SystemsNeurIPSConferenceTop
International Conference on Machine LearningICMLConferenceTop
International Conference on Learning RepresentationsICLRConferenceTop
AAAI Conference on Artificial IntelligenceAAAIConferenceTop
Journal of Machine Learning ResearchJMLRJournalTop
IEEE Trans. Pattern Analysis and Machine IntelligenceTPAMIJournalTop

Software Engineering

VenueAbbreviationTypeImpact
International Conference on Software EngineeringICSEConferenceTop
Foundations of Software EngineeringFSEConferenceTop
Automated Software EngineeringASEConferenceTop
IEEE Trans. Software EngineeringTSEJournalTop
Empirical Software EngineeringESEJournalHigh

Tips for Better Results

1. Venue Specification

Include target venues for higher quality:

Focus on IEEE TIFS, ACM CCS, USENIX Security

2. Year Range

Specify recent years for current research:

(2022-2025) or (2023-2025)

3. Multiple Queries

Break comprehensive topics into focused queries:

Query 1: "Adversarial attacks"
Query 2: "Defense mechanisms"
Query 3: "Detection methods"

4. BibTeX Request

Always include:

Include BibTeX entries

Next Steps

Multi-Agent Documentation Generation System