Scopus AI Prompts
Ready-to-use academic search prompts for Elsevier's Scopus AI. Each prompt is under the 500 character limit.
Important Notes
Character Limit
Scopus AI has a 500 character limit per prompt. Use multiple focused queries for comprehensive research.
BibTeX Export
Always request BibTeX format for easy import into your bibliography.
Generic Templates
Survey/Review Papers
Find top 10 survey papers (2022-2025) on [TOPIC]. Return as
markdown table: Authors, Title, Year, Venue, Citations, Key
finding. Include BibTeX entries. Focus on IEEE, ACM, Elsevier.~200 characters - customize with topic
Specific Technology
Find top 10 papers (2023-2025) on [TECHNOLOGY]: [subtopics].
Return as markdown table: Authors, Title, Year, Venue,
Citations. Include BibTeX. Prioritize [VENUES].~180 characters - customize with details
Application Domain
Find papers (2022-2025) on [TECH] in [DOMAIN]: [applications].
Return table: Authors, Title, Year, Venue, Citations, Key
contribution. Include BibTeX entries.~170 characters - customize with specifics
Cybersecurity Prompts
Adversarial Machine Learning (489 chars)
Find top 10 papers (2022-2025) on adversarial machine learning:
data poisoning, evasion attacks, model extraction, membership
inference. Return as markdown table: Authors, Title, Year,
Venue, Citations, Key finding. Include BibTeX. Focus on IEEE
TIFS, ACM CCS, USENIX Security.LLM Security (481 chars)
Find top 10 papers (2023-2025) on LLM security: prompt
injection, jailbreaking, training data extraction, backdoors
in language models. Return as markdown table: Authors, Title,
Year, Venue, Citations. Include BibTeX entries. Prioritize
NeurIPS, ICML, ACL, USENIX.Intrusion Detection with Deep Learning (487 chars)
Find top 10 survey papers (2022-2025) on deep learning for
intrusion detection: anomaly detection, network security,
real-time detection. Return as markdown table: Authors, Title,
Year, Venue, Citations. Include BibTeX entries. Focus on IEEE
TIFS, Computers & Security.AI Risk Frameworks (474 chars)
Find papers (2022-2025) analyzing AI risk frameworks: NIST AI
RMF, ISO 42001, AI governance, regulatory compliance. Return
as markdown table: Authors, Title, Year, Venue, Citations, Key
contribution. Include BibTeX entries.Ransomware Research (456 chars)
Find top 10 papers (2022-2025) on ransomware: detection,
prevention, forensics, cryptocurrency tracking. Return as
table: Authors, Title, Year, Venue, Citations. Include BibTeX.
Focus on IEEE, ACM, USENIX venues.Supply Chain Security (478 chars)
Find papers (2022-2025) on software supply chain security:
dependency attacks, package managers, CI/CD security, SBOM.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize IEEE S&P, CCS, NDSS.AI/ML Security Prompts
Federated Learning Security (465 chars)
Find top 10 papers (2022-2025) on federated learning security:
privacy attacks, Byzantine attacks, secure aggregation.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Focus on NeurIPS, ICML, IEEE TIFS.Model Robustness (448 chars)
Find survey papers (2022-2025) on neural network robustness:
adversarial examples, certified defenses, verification.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize ICML, NeurIPS, ICLR.AI Fairness and Bias (455 chars)
Find papers (2022-2025) on AI fairness: bias detection,
algorithmic fairness, fairness metrics, debiasing methods.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Focus on FAccT, NeurIPS, AAAI.Software Engineering Prompts
AI Code Generation (478 chars)
Find top 10 papers (2023-2025) on AI code generation: LLM for
coding, Copilot evaluation, code completion, program
synthesis. Return as markdown table: Authors, Title, Year,
Venue, Citations. Include BibTeX. Prioritize ICSE, FSE, ASE.DevSecOps (462 chars)
Find papers (2022-2025) on DevSecOps and security automation:
SAST, DAST, container security, CI/CD security. Return as
table: Authors, Title, Year, Venue, Citations. Include BibTeX.
Focus on IEEE S&P, CCS, NDSS.Software Vulnerability Detection (485 chars)
Find top 10 papers (2022-2025) on automated vulnerability
detection: static analysis, ML-based detection, code analysis.
Return as table: Authors, Title, Year, Venue, Citations.
Include BibTeX. Prioritize ICSE, FSE, IEEE TSE.Processing Results
Combine Multiple Queries
markdown
# Scopus AI Research Results
Date: [Date]
## 1. Adversarial ML Papers
[Query 1 results]
## 2. LLM Security Papers
[Query 2 results]
## 3. Defense Mechanisms
[Query 3 results]
---
## Combined BibTeX Entries
@article{...}
@inproceedings{...}Import to Bibliography
bash
# Append BibTeX entries to bibliography
cat >> latex/bibliography.bib << 'EOF'
[Paste BibTeX entries here]
EOF
# Check for duplicates
grep -E "^@" latex/bibliography.bib | sort | uniq -d
# Validate syntax
biber --validate-datamodel latex/mainCreate Citation Index
Track papers for specific chapters:
markdown
# Citation Index
## Chapter 3: Attack Vectors
- smith2024adversarial - Main attack taxonomy
- jones2024llm - LLM-specific threats
## Chapter 4: Defense Mechanisms
- wilson2024defense - Defense framework
- brown2024detection - Detection methodsHigh-Impact Venues
Computer Security
| Venue | Abbreviation | Type | Impact |
|---|---|---|---|
| IEEE Trans. Information Forensics & Security | IEEE TIFS | Journal | Top |
| ACM Conference on Computer and Communications Security | CCS | Conference | Top |
| USENIX Security Symposium | USENIX Sec | Conference | Top |
| IEEE Symposium on Security and Privacy | IEEE S&P | Conference | Top |
| Network and Distributed System Security | NDSS | Conference | Top |
| Computers & Security | C&S | Journal | High |
Machine Learning
| Venue | Abbreviation | Type | Impact |
|---|---|---|---|
| Neural Information Processing Systems | NeurIPS | Conference | Top |
| International Conference on Machine Learning | ICML | Conference | Top |
| International Conference on Learning Representations | ICLR | Conference | Top |
| AAAI Conference on Artificial Intelligence | AAAI | Conference | Top |
| Journal of Machine Learning Research | JMLR | Journal | Top |
| IEEE Trans. Pattern Analysis and Machine Intelligence | TPAMI | Journal | Top |
Software Engineering
| Venue | Abbreviation | Type | Impact |
|---|---|---|---|
| International Conference on Software Engineering | ICSE | Conference | Top |
| Foundations of Software Engineering | FSE | Conference | Top |
| Automated Software Engineering | ASE | Conference | Top |
| IEEE Trans. Software Engineering | TSE | Journal | Top |
| Empirical Software Engineering | ESE | Journal | High |
Tips for Better Results
1. Venue Specification
Include target venues for higher quality:
Focus on IEEE TIFS, ACM CCS, USENIX Security2. Year Range
Specify recent years for current research:
(2022-2025) or (2023-2025)3. Multiple Queries
Break comprehensive topics into focused queries:
Query 1: "Adversarial attacks"
Query 2: "Defense mechanisms"
Query 3: "Detection methods"4. BibTeX Request
Always include:
Include BibTeX entriesNext Steps
- NotebookLM Prompts - Source synthesis
- Perplexity Prompts - Current statistics
- External AI Services - Full process