Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4

M Kaheh, DK Kholgh, P Kostakos - arxiv preprint arxiv:2309.16422, 2023 - arxiv.org
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …

Enhancing network threat detection with random forest-based NIDS and permutation feature importance

MT Abdelaziz, A Radwan, H Mamdouh… - Journal of Network and …, 2025 - Springer
Abstract Network Intrusion Detection Systems (NIDS) are critical for protecting computer
networks from unauthorized activities. Traditional NIDS rely on rule-based signatures, which …

Large language models in 6G security: challenges and opportunities

T Nguyen, H Nguyen, A Ijaz, S Sheikhi… - arxiv preprint arxiv …, 2024 - arxiv.org
The rapid integration of Generative AI (GenAI) and Large Language Models (LLMs) in
sectors such as education and healthcare have marked a significant advancement in …

Hazard prediction of water inrush in water-rich tunnels based on random forest algorithm

N Zhang, M Niu, F Wan, J Lu, Y Wang, X Yan, C Zhou - Applied Sciences, 2024 - mdpi.com
To prevent large-scale water inrush accidents during the excavation process of a water-rich
tunnel, a method, based on a random forest (RF) algorithm, for predicting the hazard level of …

Intrusion detection method based on improved social network search algorithm

Z Yang, Q Wang, X Zong, G Wang - Computers & Security, 2024 - Elsevier
The network security problem in today's world is becoming more and more prominent, and
intrusion detection as a branch in the field of network security has been developed …

ENNigma: A framework for Private Neural Networks

P Barbosa, I Amorim, E Maia, I Praça - Future Generation Computer …, 2025 - Elsevier
The widespread use of the Internet and digital services has significantly increased data
collection and processing. Critical domains like healthcare rely on this data, but privacy and …

Cyber threat hunting using unsupervised federated learning and adversary emulation

S Sheikhi, P Kostakos - … on Cyber Security and Resilience (CSR …, 2023 - ieeexplore.ieee.org
The rapid growth of communication networks, coupled with the increasing complexity of
cyber threats, necessitates the implementation of proactive measures to protect networks …

Advancing security in 5g core networks through unsupervised federated time series modeling

S Sheikhi, P Kostakos - … on Cyber Security and Resilience (CSR …, 2024 - ieeexplore.ieee.org
The rapid development of fifth-generation (5G) mobile communication technology poses
fresh challenges for cybersecurity defense systems. Current intrusion detection mechanisms …

Application of GA-WELM Model Based on Stratified Cross-Validation in Intrusion Detection

C Chen, X Guo, W Zhang, Y Zhao, B Wang, B Ma… - Symmetry, 2023 - mdpi.com
Aiming at the problem of poor detection performance under the environment of imbalanced
type distribution, an intrusion detection model of genetic algorithm to optimize weighted …

ResACAG: A graph neural network based intrusion detection

A Zhang, Y Zhao, C Zhou, T Zhang - Computers and Electrical Engineering, 2025 - Elsevier
With the continuous growth of network throughput, the field of network security is facing
increasingly severe challenges. To address this challenge, this paper proposes a network …