{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:54:35Z","timestamp":1762509275282,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819660070","type":"print"},{"value":"9789819660087","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-6008-7_23","type":"book-chapter","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:17:45Z","timestamp":1745464665000},"page":"317-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of\u00a0Artificial Intelligence Solutions in\u00a0Offensive Cybersecurity Domains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9704-7110","authenticated-orcid":false,"given":"Maciej","family":"Kisielewicz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7764-1303","authenticated-orcid":false,"given":"Michal","family":"Kedziora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2160-7077","authenticated-orcid":false,"given":"Ireneusz","family":"Jozwiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,21]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., Marchetti, M.: On the effectiveness of machine and deep learning for cyber security. In: 2018 10th International Conference on Cyber Conflict (CyCon), pp. 371\u2013390. IEEE (2018)","DOI":"10.23919\/CYCON.2018.8405026"},{"issue":"1","key":"23_CR2","first-page":"52","volume":"1","author":"M Aslam","year":"2024","unstructured":"Aslam, M.: Ai and cybersecurity: an ever-evolving landscape. Int. J. Adv. Eng. Technol. Innovations 1(1), 52\u201371 (2024)","journal-title":"Int. J. Adv. Eng. Technol. Innovations"},{"issue":"9","key":"23_CR3","doi-asserted-by":"publisher","first-page":"6775","DOI":"10.1016\/j.jksuci.2021.09.018","volume":"34","author":"M Aydos","year":"2022","unstructured":"Aydos, M., Aldan, \u00c7., Co\u015fkun, E., Soydan, A.: Security testing of web applications: a systematic mapping of the literature. J. King Saud Univ.-Comput. Inf. Sci. 34(9), 6775\u20136792 (2022)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10(4), 122 (2019)","journal-title":"Information"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Chang, Z., Li, M., Liu, Y., Wang, J., Wang, Q., Liu, Y.: Play guessing game with LLM: indirect jailbreak attack with implicit clues (2024)","DOI":"10.18653\/v1\/2024.findings-acl.304"},{"key":"23_CR6","unstructured":"Cybersecurity Ventures: Cybercrime to cost the world \\$10.5 trillion annually by 2025 (2020). https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Futur. Gener. Comput. Syst. 82, 761\u2013768 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"23_CR8","unstructured":"Fang, R., Bindu, R., Gupta, A., Zhan, Q., Kang, D.: LLM agents can autonomously hack websites (2024)"},{"key":"23_CR9","unstructured":"Flashpoint: Vulnerability report 2023 (2023). https:\/\/www.flashpoint-intel.com\/resources\/vulnerability-report-2023\/"},{"issue":"12","key":"23_CR10","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1007\/s10439-023-03272-4","volume":"51","author":"L Giray","year":"2023","unstructured":"Giray, L.: Prompt engineering with chatgpt: a guide for academic writers. Ann. Biomed. Eng. 51(12), 2629\u20132633 (2023)","journal-title":"Ann. Biomed. Eng."},{"key":"23_CR11","unstructured":"IBM: Cost of a data breach report 2020. Technical report, IBM (2020). https:\/\/www.ibm.com\/security\/data-breach"},{"key":"23_CR12","unstructured":"(ISC)$$^2$$: Cybersecurity workforce study (2021). https:\/\/www.isc2.org\/Research\/Workforce-Study"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-981-97-5937-8_28","volume-title":"Recent Challenges in Intelligent Information and Database Systems","author":"M Kisielewicz","year":"2024","unstructured":"Kisielewicz, M., Kedziora, M., Jozwiak, I.: Penetration testing and security assessment methodology for biomedical devices. In: Nguyen, N.T., Chbeir, R., Manolopoulos, Y., Fujita, H., Hong, T.P., Nguyen, L.M., Wojtkiewicz, K. (eds.) Recent Challenges in Intelligent Information and Database Systems, pp. 337\u2013348. Springer, Singapore (2024)"},{"key":"23_CR14","unstructured":"La\u00a0Malfa, E., et al.: Language models as a service: overview of a new paradigm and its challenges. arXiv e-prints pp. arXiv-2309 (2023)"},{"key":"23_CR15","unstructured":"La\u00a0Malfa, E., et al.: Code simulation challenges for large language models. arXiv preprint arXiv:2401.09074 (2024)"},{"key":"23_CR16","unstructured":"Li, J.: Cybersecurity challenges in the age of AI: new attack and defense opportunities. Ph.D. thesis, Carnegie Mellon University (2024)"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Li, W., Tondi, B., Ni, R., Barni, M.: Increased-confidence adversarial examples for deep learning counter-forensics (2022)","DOI":"10.1007\/978-3-030-68780-9_34"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Mavikumbure, H.S., Cobilean, V., Wickramasinghe, C.S., Drake, D.: Generative AI in cyber security of cyber physical systems: benefits and threats (2024)","DOI":"10.1109\/HSI61632.2024.10613562"},{"key":"23_CR19","unstructured":"OWASP: OWASP Web Security Testing Guide (2024). https:\/\/owasp.org\/www-project-web-security-testing-guide\/latest\/. Accessed 15 June 2024"},{"key":"23_CR20","unstructured":"PTES Team: Penetration testing execution standard (2014). http:\/\/www.pentest-standard.org\/. Accessed 16 June 2024"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1007\/s00521-017-3305-0","volume":"31","author":"RS Rao","year":"2019","unstructured":"Rao, R.S., Pais, A.R.: Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. 31, 3851\u20133873 (2019)","journal-title":"Neural Comput. Appl."},{"issue":"5","key":"23_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453158","volume":"54","author":"I Rosenberg","year":"2021","unstructured":"Rosenberg, I., Shabtai, A., Elovici, Y., Rokach, L.: Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Comput. Surv. (CSUR) 54(5), 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"23_CR23","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2667218","volume":"58","author":"J Sametinger","year":"2015","unstructured":"Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74\u201382 (2015)","journal-title":"Commun. ACM"},{"issue":"1","key":"23_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker, I.H., Kayes, A., Badsha, S., Alqahtani, H., Watters, P., Ng, A.: Cybersecurity data science: an overview from machine learning perspective. J. Big Data 7(1), 1\u201329 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00318-5","journal-title":"J. Big Data"},{"key":"23_CR25","unstructured":"Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A.: Technical guide to information security testing and assessment. Special Publication 800-115, National Institute of Standards and Technology (NIST) (2008). https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-115.pdf. Accessed 16 June 2024"},{"key":"23_CR26","unstructured":"Shao, M., et al.: An empirical evaluation of LLMs for solving offensive security challenges. arXiv preprint arXiv:2402.11814 (2024)"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Stefinko, Y., Piskozub, A., Banakh, R.: Manual and automated penetration testing. Benefits and drawbacks. Modern tendency. In: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp. 488\u2013491. IEEE (2016)","DOI":"10.1109\/TCSET.2016.7452095"},{"key":"23_CR28","unstructured":"Tolido, R., et\u00a0al.: Reinventing cybersecurity with artificial intelligence-the new frontier in digital security cap gemini research institute (2019)"},{"issue":"9","key":"23_CR29","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.3390\/electronics12092100","volume":"12","author":"M Wang","year":"2023","unstructured":"Wang, M., Yang, N., Weng, N.: Securing a smart home with a transformer-based IoT intrusion detection system. Electronics 12(9), 2100 (2023)","journal-title":"Electronics"},{"issue":"1","key":"23_CR30","first-page":"131","volume":"1","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Qian, W., Zhou, H., Chen, J., Tan, K.: Exploring new frontiers of deep learning in legal practice: a case study of large language models. Int. J. Comput. Sci. Inf. Technol. 1(1), 131\u2013138 (2023)","journal-title":"Int. J. Comput. Sci. Inf. Technol."}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-6008-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T03:18:00Z","timestamp":1745464680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-6008-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819660070","9789819660087"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-6008-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}