{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:36:20Z","timestamp":1757626580257,"version":"3.44.0"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944574"},{"type":"electronic","value":"9783031944581"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94458-1_8","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:55:00Z","timestamp":1756569300000},"page":"169-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity with\u00a0LLMs and\u00a0RAGs: Challenges and\u00a0Innovations"],"prefix":"10.1007","author":[{"given":"Marco","family":"Simoni","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abu-Amara, F., Hosani, R., Tamimi, H., et\u00a0al.: Spreading cybersecurity awareness via gamification: zero-day game. Int. J. Inf. Technol. 16, 2945\u20132953 (2024). https:\/\/link.springer.com\/article\/10.1007\/s41870-024-01810-4","DOI":"10.1007\/s41870-024-01810-4"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Akuthota, V., Kasula, R., Sumona, S.T., Mohiuddin, M., Reza, M.T., Rahman, M.M.: Vulnerability detection and monitoring using LLM. In: 2023 IEEE 9th International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), pp. 309\u2013314. IEEE (2023)","DOI":"10.1109\/WIECON-ECE60392.2023.10456393"},{"key":"8_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103805","volume":"141","author":"M Boffa","year":"2024","unstructured":"Boffa, M., et al.: Logpr\u00e9cis: unleashing language models for automated malicious log analysis: pr\u00e9cis: a concise summary of essential points, statements, or facts. Comput. Secur. 141, 103805 (2024)","journal-title":"Comput. Secur."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chamberlain, D., Casey, E.: Capture the flag with ChatGPT: security testing with AI chatbots. In: International Conference on Cyber Warfare and Security, vol.\u00a019, pp. 43\u201354 (2024)","DOI":"10.34190\/iccws.19.1.2171"},{"key":"8_CR5","unstructured":"CrowdStrikes: Llms in cybersecurity: the bright side (2024). https:\/\/www.crowdstrike.com\/cybersecurity-101\/artificial-intelligence\/large-language-model-llm\/"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Deng, Y., Zhang, W., Lam, W., Ng, S.K., Chua, T.S.: Plug-and-play policy planner for large language model powered dialogue agents. In: The Twelfth International Conference on Learning Representations (2024). https:\/\/openreview.net\/forum?id=MCNqgUFTHI","DOI":"10.1145\/3589335.3641240"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Devadiga, D., et al.: Gleam: Gan and LLM for evasive adversarial malware. In: 2023 14th International Conference on Information and Communication Technology Convergence (ICTC), pp. 53\u201358. IEEE (2023)","DOI":"10.1109\/ICTC58733.2023.10393706"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Es, S., James, J., Espinosa\u00a0Anke, L., Schockaert, S.: RAGAs: automated evaluation of retrieval augmented generation. In: Aletras, N., De\u00a0Clercq, O. (eds.) Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics: System Demonstrations, pp. 150\u2013158. Association for Computational Linguistics, St. Julians, Malta, March 2024. https:\/\/aclanthology.org\/2024.eacl-demo.16","DOI":"10.18653\/v1\/2024.eacl-demo.16"},{"key":"8_CR9","unstructured":"Gennari, J., Lau, S.h., Perl, S., Parish, J., Sastry, G.: Considerations for evaluating large language models for cybersecurity tasks (2024)"},{"issue":"6","key":"8_CR10","doi-asserted-by":"publisher","first-page":"4684","DOI":"10.11591\/ijece.v9i6.pp4684-4695","volume":"9","author":"VP Gowda","year":"2019","unstructured":"Gowda, V.P., Murugavelu, M., Thangamuthu, S.K.: Continuous Kannada speech segmentation and speech recognition based on threshold using MFCC and VQ. Int. J. Elect. Comput. Eng. 9(6), 4684 (2019)","journal-title":"Int. J. Elect. Comput. Eng."},{"key":"8_CR11","unstructured":"Gu, A., Dao, T.: Mamba: Linear-time sequence modeling with selective state spaces. arXiv preprint arXiv:2312.00752 (2023)"},{"key":"8_CR12","unstructured":"Guu, K., Lee, K., Tung, Z., Pasupat, P., Chang, M.: Retrieval augmented language model pre-training. In: III, H.D., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0119, pp. 3929\u20133938. PMLR, 13\u201318 July 2020. https:\/\/proceedings.mlr.press\/v119\/guu20a.html"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Happe, A., Cito, J.: Getting PWN\u2019D by AI: penetration testing with large language models. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 2082\u20132086 (2023)","DOI":"10.1145\/3611643.3613083"},{"key":"8_CR14","unstructured":"Jiang, A.Q., et al.: Mistral 7b (2023). https:\/\/arxiv.org\/abs\/2310.06825"},{"key":"8_CR15","unstructured":"Jiang, A.Q., et\u00a0al.: Mixtral of experts. arXiv preprint arXiv:2401.04088 (2024)"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Johnson, D.D., Tarlow, D., Duvenaud, D., Maddison, C.J.: Experts don\u2019t cheat: learning what you don\u2019t know by predicting pairs. CoRR abs\/2402.08733 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2402.08733, https:\/\/doi.org\/10.48550\/arXiv.2402.08733","DOI":"10.48550\/ARXIV.2402.08733"},{"key":"8_CR17","unstructured":"J\u00fcttner, V., Grimmer, M., Buchmann, E.: Chatids: Explainable cybersecurity using generative AI. arXiv preprint arXiv:2306.14504 (2023)"},{"key":"8_CR18","unstructured":"Kandpal, N., Deng, H., Roberts, A., Wallace, E., Raffel, C.: Large language models struggle to learn long-tail knowledge. In: International Conference on Machine Learning, pp. 15696\u201315707. PMLR (2023)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Karpukhin, V., et\u00a0al.: Dense passage retrieval for open-domain question answering. arXiv preprint arXiv:2004.04906 (2020)","DOI":"10.18653\/v1\/2020.emnlp-main.550"},{"key":"8_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101861","volume":"99","author":"J Koco\u0144","year":"2023","unstructured":"Koco\u0144, J., et al.: Chatgpt: jack of all trades, master of none. Inf. Fusion 99, 101861 (2023)","journal-title":"Inf. Fusion"},{"key":"8_CR21","unstructured":"Lewis, P., et al.: Retrieval-augmented generation for knowledge-intensive NLP tasks. Adv. Neural. Inf. Process. Syst. 33, 9459\u20139474 (2020)"},{"key":"8_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-981-15-9129-7_8","volume-title":"Security and Privacy in Digital Economy","author":"K Li","year":"2020","unstructured":"Li, K., Zhou, H., Tu, Z., Feng, B.: CSKB: a cyber security knowledge base based on knowledge graph. In: Yu, S., Mueller, P., Qian, J. (eds.) SPDE 2020. CCIS, vol. 1268, pp. 100\u2013113. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9129-7_8"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Li, X., Zhu, T., Zhang, W.: Efficient ransomware detection via portable executable file image analysis by LLaMA-7b (2023)","DOI":"10.21203\/rs.3.rs-3679775\/v1"},{"key":"8_CR24","unstructured":"Liu, Z.: Working mechanism of eternalblue and its application in ransomworm (2021). https:\/\/arxiv.org\/abs\/2112.14773"},{"key":"8_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112031","volume":"212","author":"G Lu","year":"2024","unstructured":"Lu, G., Ju, X., Chen, X., Pei, W., Cai, Z.: Grace: empowering LLM-based software vulnerability detection with graph structure and in-context learning. J. Syst. Softw. 212, 112031 (2024)","journal-title":"J. Syst. Softw."},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Mallen, A., Asai, A., Zhong, V., Das, R., Khashabi, D., Hajishirzi, H.: When not to trust language models: Investigating effectiveness of parametric and non-parametric memories. In: Rogers, A., Boyd-Graber, J., Okazaki, N. (eds.) Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 9802\u20139822. Association for Computational Linguistics, Toronto, Canada, July 2023. https:\/\/doi.org\/10.18653\/v1\/2023.acl-long.546, https:\/\/aclanthology.org\/2023.acl-long.546","DOI":"10.18653\/v1\/2023.acl-long.546"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Mesnard, T., et\u00a0al.: Gemma: open models based on Gemini research and technology. CoRR abs\/2403.08295 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2403.08295","DOI":"10.48550\/ARXIV.2403.08295"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Mitra, S., et al.: Localintel: generating organizational threat intelligence from global and local cyber knowledge. arXiv preprint arXiv:2401.10036 (2024)","DOI":"10.1007\/978-3-031-87496-3_5"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Muennighoff, N., Tazi, N., Magne, L., Reimers, N.: MTEB: massive text embedding benchmark. arXiv preprint arXiv:2210.07316 (2022)","DOI":"10.18653\/v1\/2023.eacl-main.148"},{"key":"8_CR30","unstructured":"Osband, I., et al.: Epistemic neural networks. In: Oh, A., Naumann, T., Globerson, A., Saenko, K., Hardt, M., Levine, S. (eds.) Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023 (2023). http:\/\/papers.nips.cc\/paper_files\/paper\/2023\/hash\/07fbde96bee50f4e09303fd4f877c2f3-Abstract-Conference.html"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Patsakis, C., Casino, F., Lykousas, N.: Assessing LLMs in malicious code deobfuscation of real-world malware campaigns. arXiv preprint arXiv:2404.19715 (2024)","DOI":"10.1016\/j.eswa.2024.124912"},{"key":"8_CR32","doi-asserted-by":"publisher","first-page":"268","DOI":"10.34190\/iccws.19.1.1992","volume":"19","author":"H Pieterse","year":"2024","unstructured":"Pieterse, H.: Friend or foe-the impact of ChatGPT on capture the flag competitions. Int. Conf. Cyber Warfare Secur. 19, 268\u2013276 (2024)","journal-title":"Int. Conf. Cyber Warfare Secur."},{"key":"8_CR33","unstructured":"Poli, M., et al.: Hyena hierarchy: Towards larger convolutional language models. In: International Conference on Machine Learning, pp. 28043\u201328078. PMLR (2023)"},{"key":"8_CR34","unstructured":"Radford, A., et\u00a0al.: Improving language understanding by generative pre-training. OpenAI Blog (2018)"},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Saracino, A., Simoni, M.: Graph-based android malware detection and categorization through BERT transformer. In: Proceedings of the 18th International Conference on Availability, Reliability and Security. ARES 2023, Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3600160.3605057, https:\/\/doi.org\/10.1145\/3600160.3605057","DOI":"10.1145\/3600160.3605057"},{"key":"8_CR36","unstructured":"Sewak, M., Emani, V., Naresh, A.: Crush: Cybersecurity research using universal LLMs and semantic hypernetworks (2023)"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Sultana, M., Taylor, A., Li, L., Majumdar, S.: Towards evaluation and understanding of large language models for cyber operation automation. In: 2023 IEEE Conference on Communications and Network Security (CNS), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/CNS59707.2023.10288677"},{"key":"8_CR38","unstructured":"Sun, Y., et al.: Llm4vuln: A unified evaluation framework for decoupling and enhancing LLMs\u2019 vulnerability reasoning. arXiv preprint arXiv:2401.16185 (2024)"},{"key":"8_CR39","unstructured":"Tang, Y., Yang, Y.: Multihop-rag: Benchmarking retrieval-augmented generation for multi-hop queries (2024)"},{"key":"8_CR40","unstructured":"Tihanyi, N., Ferrag, M.A., Jain, R., Debbah, M.: Cybermetric: a benchmark dataset for evaluating large language models knowledge in cybersecurity. arXiv preprint arXiv:2402.07688 (2024)"},{"issue":"1","key":"8_CR41","doi-asserted-by":"publisher","first-page":"407","DOI":"10.12928\/telkomnika.v18i1.13958","volume":"18","author":"RA Ulfattah","year":"2020","unstructured":"Ulfattah, R.A., Endah, S.N., Kusumaningrum, R., Adhy, S.: Continuous speech segmentation using local adaptive thresholding technique in the blocking block area method. TELKOMNIKA (Telecommun. Comput. Elect. Control 18(1), 407\u2013418 (2020)","journal-title":"TELKOMNIKA (Telecommun. Comput. Elect. Control"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Ullah, S., Han, M., Pujar, S., Pearce, H., Coskun, A., Stringhini, G.: LLMs cannot reliably identify and reason about security vulnerabilities (yet?): a comprehensive evaluation, framework, and benchmarks. In: IEEE Symposium on Security and Privacy (2024)","DOI":"10.1109\/SP54263.2024.00210"},{"key":"8_CR43","unstructured":"Vaswani, A., et\u00a0al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (2017)"},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"V\u00f6r\u00f6s, T., Bergeron, S.P., Berlin, K.: Web content filtering through knowledge distillation of large language models. In: 2023 IEEE International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), pp. 357\u2013361. IEEE (2023)","DOI":"10.1109\/WI-IAT59888.2023.00058"},{"key":"8_CR45","unstructured":"Wang, J., Huang, Z., Liu, H., Yang, N., Xiao, Y.: Defecthunter: a novel LLM-driven boosted-conformer-based code vulnerability detection mechanism. arXiv e-prints pp. arXiv\u20132309 (2023)"},{"key":"8_CR46","doi-asserted-by":"publisher","unstructured":"Wang, S., Song, Y., Drozdov, A., Garimella, A., Manjunatha, V., Iyyer, M.: $$k$$NN-LM does not improve open-ended text generation. In: Bouamor, H., Pino, J., Bali, K. (eds.) Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, pp. 15023\u201315037. Association for Computational Linguistics, Singapore, December 2023. https:\/\/doi.org\/10.18653\/v1\/2023.emnlp-main.929, https:\/\/aclanthology.org\/2023.emnlp-main.929","DOI":"10.18653\/v1\/2023.emnlp-main.929"},{"key":"8_CR47","unstructured":"Xiong, W., et\u00a0al.: Answering complex open-domain questions with multi-hop dense retrieval. arXiv preprint arXiv:2009.12756 (2020)"},{"key":"8_CR48","unstructured":"Yadkori, Y.A., Kuzborskij, I., Gy\u00f6rgy, A., Szepesv\u00e1ri, C.: To believe or not to believe your LLM (2024). https:\/\/arxiv.org\/abs\/2406.02543"},{"key":"8_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211","volume":"4","author":"Y Yao","year":"2024","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, Z., Zhang, Y.: A survey on large language model (LLM) security and privacy: the good, the bad, and the ugly. High Confid. Comput. 4, 100211 (2024)","journal-title":"High Confid. Comput."},{"key":"8_CR50","doi-asserted-by":"crossref","unstructured":"Yoo, C., Wolff, J., Lehr, W.: Lessons from GDPR for AI policymaking. Virginia J. Law Technol. 27, 1 (2024). https:\/\/scholarship.law.upenn.edu\/cgi\/viewcontent.cgi?article=1376&context=faculty_articles","DOI":"10.2139\/ssrn.4528698"},{"key":"8_CR51","doi-asserted-by":"crossref","unstructured":"Yu, F., Martin, M.V.: Honey, i chunked the passwords: Generating semantic honeywords resistant to targeted attacks using pre-trained language models. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 89\u2013108. Springer (2023)","DOI":"10.1007\/978-3-031-35504-2_5"},{"key":"8_CR52","unstructured":"Zahan, N., Burckhardt, P., Lysenko, M., Aboukhadijeh, F., Williams, L.: Shifting the lens: Detecting malware in NPM ecosystem with large language models. arXiv preprint arXiv:2403.12196 (2024)"},{"key":"8_CR53","first-page":"16595","volume":"36","author":"L Zheng","year":"2024","unstructured":"Zheng, L., et al.: Judging LLM-as-a-judge with MT-bench and chatbot arena. Adv. Neural Inf. Process. Syst. 36, 16595\u201346653 (2024)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Zhou, G., He, T., Zhao, J., Hu, P.: Learning continuous word embedding with metadata for question retrieval in community question answering. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), pp. 250\u2013259 (2015)","DOI":"10.3115\/v1\/P15-1025"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94458-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:44:17Z","timestamp":1757457857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94458-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783031944574","9783031944581"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94458-1_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}