[HTML][HTML] When llms meet cybersecurity: A systematic literature review

J Zhang, H Bu, H Wen, Y Liu, H Fei… - …, 2025 - cybersecurity.springeropen.com
The rapid development of large language models (LLMs) has opened new avenues across
various fields, including cybersecurity, which faces an evolving threat landscape and …

Enhancing autonomous system security and resilience with generative AI: A comprehensive survey

M Andreoni, WT Lunardi, G Lawton, S Thakkar - IEEE Access, 2024 - ieeexplore.ieee.org
This survey explores the transformative role of Generative Artificial Intelligence (GenAI) in
enhancing the trustworthiness, reliability, and security of autonomous systems such as …

[ΒΙΒΛΙΟ][B] An efficient superhypersoft framework for evaluating llms-based secure blockchain platforms

M Mohamed, A Elmor, F Smarandache, AA Metwaly - 2024 - books.google.com
In the age of modern technology, the use of the internet has become imperative. However,
this widespread access presents a double-edged sword and opens doors for hackers and …

[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

Large Multimodal Agents for Accurate Phishing Detection with Enhanced Token Optimization and Cost Reduction

F Trad, A Chehab - … on Foundation and Large Language Models …, 2024 - ieeexplore.ieee.org
With the rise of sophisticated phishing attacks, there is a growing need for effective and
economical detection solutions. This paper explores the use of large multimodal agents …

Large Language Models for Cyber Resilience: A Comprehensive Review, Challenges, and Future Perspectives

W Ding, M Abdel-Basset, AM Ali, N Moustafa - Applied Soft Computing, 2024 - Elsevier
Interconnect cyber system is used by various users and organizations worldwide to perform
different activities. These activities are combined with digital information and systems around …

A rag-based question-answering solution for cyber-attack investigation and attribution

S Rajapaksha, R Rani, E Karafili - arxiv preprint arxiv:2408.06272, 2024 - arxiv.org
In the constantly evolving field of cybersecurity, it is imperative for analysts to stay abreast of
the latest attack trends and pertinent information that aids in the investigation and attribution …

CrossAlert: Enhancing Multi-Stage Attack Detection through Semantic Embedding of Alerts Across Targeted Domains

N Niknami, V Mahzoon, J Wu - 2024 IEEE Conference on …, 2024 - ieeexplore.ieee.org
With the continuous evolution of attack methods, cyber attacks have become more
distributed and complex, employing techniques such as multi-stage network attacks (MSA) …

A survey on Hybrid-CNN and LLMs for intrusion detection systems: Recent IoT datasets

S Elouardi, A Motii, M Jouhari, ANH Amadou… - IEEE …, 2024 - ieeexplore.ieee.org
Recently, the growing popularity of the Internet of Things (IoT) presents a promising
opportunity not only for the expansion of various home automation systems but also for …

[HTML][HTML] Leveraging Large Language Models for Enhancing Safety in Maritime Operations

T Miller, I Durlik, E Kostecka, A Łobodzińska… - Applied Sciences, 2025 - mdpi.com
Maritime operations play a critical role in global trade but face persistent safety challenges
due to human error, environmental factors, and operational complexities. This review …