{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:52:10Z","timestamp":1775145130957,"version":"3.50.1"},"reference-count":370,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T00:00:00Z","timestamp":1755648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006196","name":"University of Oulu","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006196","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper presents a comprehensive survey of the applications, challenges, and limitations of Generative AI (GenAI) in enhancing threat intelligence within cybersecurity, supported by real-world case studies. We examine a wide range of data sources in Cyber Threat Intelligence (CTI), including security reports, blogs, social media, network traffic, malware samples, dark web data, and threat intelligence platforms (TIPs). This survey provides a full reference for integrating GenAI into CTI. We discuss various GenAI models such as Large Language Models (LLMs) and Deep Generative Models (DGMs) like Variational Autoencoders (VAEs), Generative Adversarial Networks (GANs), and Diffusion Models, explaining their roles in detecting and addressing complex cyber threats. The survey highlights key applications in areas such as malware detection, network traffic analysis, phishing detection, threat actor attribution, and social engineering defense. We also explore critical challenges in deploying GenAI, including data privacy, security concerns, and the need for interpretable and transparent models. As regulations like the European Commission\u2019s AI Act emerge, ensuring trustworthy AI solutions is becoming more crucial. Real-world case studies, such as the impact of the WannaCry ransomware, the rise of deepfakes, and AI-driven social engineering, demonstrate both the potential and current limitations of GenAI in CTI. Our goal is to provide foundational insights and strategic direction for advancing GenAI\u2019s role in future cybersecurity frameworks, emphasizing the importance of innovation, adaptability, and ongoing learning to enhance resilience against evolving cyber threats. Ultimately, this survey offers critical insights into how GenAI can shape the future of cybersecurity by addressing key challenges and providing actionable guidance for effective implementation.<\/jats:p>","DOI":"10.1007\/s10462-025-11338-z","type":"journal-article","created":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T07:03:47Z","timestamp":1755673427000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Generative AI for cyber threat intelligence: applications, challenges, and analysis of real-world case studies"],"prefix":"10.1007","volume":"58","author":[{"given":"Prasasthy","family":"Balasubramanian","sequence":"first","affiliation":[]},{"given":"Sonali","family":"Liyana","sequence":"additional","affiliation":[]},{"given":"Hamsini","family":"Sankaran","sequence":"additional","affiliation":[]},{"given":"Shambavi","family":"Sivaramakrishnan","sequence":"additional","affiliation":[]},{"given":"Sruthi","family":"Pusuluri","sequence":"additional","affiliation":[]},{"given":"Susanna","family":"Pirttikangas","sequence":"additional","affiliation":[]},{"given":"Ella","family":"Peltonen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,20]]},"reference":[{"key":"11338_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","volume":"170","author":"M Abbasi","year":"2021","unstructured":"Abbasi M, Shahraki A, Taherkordi A (2021) Deep learning for network traffic monitoring and analysis (ntma): a survey. Comput Commun 170:19\u201341","journal-title":"Comput Commun"},{"issue":"3","key":"11338_CR2","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s10796-022-10313-1","volume":"24","author":"B Abedin","year":"2022","unstructured":"Abedin B, Meske C, Junglas I, Rabhi F, Motahari-Nezhad HR (2022) Designing and managing human-AI interactions. Inf Syst Front 24(3):691\u2013697","journal-title":"Inf Syst Front"},{"key":"11338_CR3","unstructured":"Abnormal security: accelerated AI automation. Accessed: 2025-04-09. https:\/\/abnormalsecurity.com\/why-abnormal\/accelerated-ai-automation"},{"issue":"17","key":"11338_CR4","doi-asserted-by":"publisher","first-page":"8482","DOI":"10.3390\/app12178482","volume":"12","author":"FA Aboaoja","year":"2022","unstructured":"Aboaoja FA, Zainal A, Ghaleb FA, Al-Rimy BAS, Eisa TAE, Elnour AAH (2022) Malware detection issues, challenges, and future directions: a survey. Appl Sci 12(17):8482","journal-title":"Appl Sci"},{"issue":"1","key":"11338_CR5","first-page":"371","volume":"10","author":"MS Abu","year":"2018","unstructured":"Abu MS, Selamat SR, Ariffin A, Yusof R (2018) Cyber threat intelligence-issue and challenges. Ind J Electr Eng Comput Sci 10(1):371\u2013379","journal-title":"Ind J Electr Eng Comput Sci"},{"key":"11338_CR6","unstructured":"Achiam J, Adler S, Agarwal S, Ahmad L, Akkaya I, Aleman FL, Almeida D, Altenschmidt J, Altman S, Anadkat S et al (2023) Gpt-4 technical report. arXiv preprint arXiv:2303.08774"},{"key":"11338_CR7","unstructured":"Agarwal D, Maheshwara U, Desineedi S, Shah K Llm performance optimized by deepspeed"},{"key":"11338_CR8","doi-asserted-by":"crossref","unstructured":"Ai L, Kumarage T, Bhattacharjee A, Liu Z, Hui Z, Davinroy M, Cook J, Cassani L, Trapeznikov K, Kirchner M, Basharat A, Hoogs A, Garland J, Liu H, Hirschberg J (2024) Defending against social engineering attacks in the age of LLMs","DOI":"10.18653\/v1\/2024.emnlp-main.716"},{"key":"11338_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55343-2","volume-title":"Dark web investigation","author":"B Akhgar","year":"2021","unstructured":"Akhgar B, Gercke M, Vrochidis S, Gibson H (2021) Dark web investigation. Springer, Berlin"},{"issue":"2","key":"11338_CR10","doi-asserted-by":"publisher","first-page":"001","DOI":"10.30574\/gscarr.2024.21.2.0408","volume":"21","author":"AR Akinyele","year":"2024","unstructured":"Akinyele AR, Ajayi OO, Munyaneza G, Ibecheozor U, Gopakumar N (2024) Leveraging generative artificial intelligence (ai) for cybersecurity: analyzing diffusion models in detecting and mitigating cyber threats. GSC Adv Res Rev 21(2):001\u2013014","journal-title":"GSC Adv Res Rev"},{"key":"11338_CR11","doi-asserted-by":"crossref","unstructured":"Al-Ahmadi S, Alotaibi A, Alsaleh O (2022) Pdgan: Phishing detection with generative adversarial networks. IEEE Access","DOI":"10.1109\/ACCESS.2022.3168235"},{"key":"11338_CR12","unstructured":"Alam MT, Bhushl D, Nguyen L, Rastogi N (2024) Ctibench: A benchmark for evaluating llms in cyber threat intelligence. arXiv preprint arXiv:2406.07599"},{"issue":"8","key":"11338_CR13","doi-asserted-by":"publisher","first-page":"462","DOI":"10.3390\/info14080462","volume":"14","author":"M Alawida","year":"2023","unstructured":"Alawida M, Mejri S, Mehmood A, Chikhaoui B, Isaac Abiodun O (2023) A comprehensive study of chatgpt: advancements, limitations, and ethical considerations in natural language processing and cybersecurity. Information 14(8):462","journal-title":"Information"},{"key":"11338_CR14","doi-asserted-by":"publisher","unstructured":"Alawida M, Shawar B, Abiodun O, Mehmood A, Omolara A, Al Hwaitat A (2023) Unveiling the dark side of ChatGPT: exploring cyberattacks and enhancing user awareness. https:\/\/doi.org\/10.20944\/preprints202309.1768.v1","DOI":"10.20944\/preprints202309.1768.v1"},{"key":"11338_CR15","first-page":"23716","volume":"35","author":"J-B Alayrac","year":"2022","unstructured":"Alayrac J-B, Donahue J, Luc P, Miech A, Barr I, Hasson Y, Lenc K, Mensch A, Millican K, Reynolds M et al (2022) Flamingo: a visual language model for few-shot learning. Adv Neural Inf Process Syst 35:23716\u201323736","journal-title":"Adv Neural Inf Process Syst"},{"key":"11338_CR16","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.cose.2017.04.006","volume":"68","author":"A Aleroud","year":"2017","unstructured":"Aleroud A, Zhou L (2017) Phishing environments, techniques, and countermeasures: a survey. Comput Secur 68:160\u2013196","journal-title":"Comput Secur"},{"key":"11338_CR17","doi-asserted-by":"crossref","unstructured":"Ali T, Eleyan A, Bejaoui T, Al-Khalidi M (2024) Lightweight intrusion detection system with gan-based knowledge distillation. In: 2024 International conference on smart applications, communications and networking (SmartNets). IEEE, pp 1\u20137","DOI":"10.1109\/SmartNets61466.2024.10577682"},{"issue":"2","key":"11338_CR18","first-page":"51","volume":"17","author":"B Alkhatib","year":"2019","unstructured":"Alkhatib B, Basheer R (2019) Crawling the dark web: a conceptual perspective, challenges and implementation. J Digit Inf Manag 17(2):51","journal-title":"J Digit Inf Manag"},{"key":"11338_CR19","unstructured":"Allouche Y, Tapas N, Longo F, Shabtai A, Wolfsthal Y (2021) Trade: trusted anonymous data exchange: threat sharing using blockchain technology. arXiv preprint arXiv:2103.13158"},{"issue":"12","key":"11338_CR20","first-page":"285","volume":"4","author":"IM Alsaadi","year":"2015","unstructured":"Alsaadi IM (2015) Physiological biometric authentication systems, advantages, disadvantages and future development: a review. Int J Sci Technol Res 4(12):285\u2013289","journal-title":"Int J Sci Technol Res"},{"key":"11338_CR21","doi-asserted-by":"crossref","unstructured":"Anand A, Gorde K, Antony Moniz JR, Park N, Chakraborty T, Chu B-T (2018) Phishing url detection with oversampling based on text generative adversarial networks. In: 2018 IEEE international conference on big data (Big Data)","DOI":"10.1109\/BigData.2018.8622547"},{"key":"11338_CR22","unstructured":"Anil R, Dai AM, Firat O, Johnson M, Lepikhin D, Passos A, Shakeri S, Taropa E, Bailey P, Chen Z et al (2023) Palm 2 technical report. arXiv preprint arXiv:2305.10403"},{"key":"11338_CR23","doi-asserted-by":"crossref","unstructured":"Ar\u0131kan SM, Acar S (2021) A data mining based system for automating creation of cyber threat intelligence. In: 2021 9th International symposium on digital forensics and security (ISDFS). IEEE, pp 1\u20137","DOI":"10.1109\/ISDFS52919.2021.9486335"},{"key":"11338_CR24","doi-asserted-by":"crossref","unstructured":"Asperti A (2019) About generative aspects of variational autoencoders. In: Machine learning, optimization, and data science: 5th international conference, LOD 2019, Siena, Italy, September 10\u201313, 2019, Proceedings 5. Springer, pp 71\u201382","DOI":"10.1007\/978-3-030-37599-7_7"},{"issue":"3","key":"11338_CR25","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/j.dcan.2022.09.009","volume":"10","author":"A Azab","year":"2024","unstructured":"Azab A, Khasawneh M, Alrabaee S, Choo K-KR, Sarsour M (2024) Network traffic classification: techniques, datasets, and challenges. Digital Commun Netw 10(3):676\u2013692","journal-title":"Digital Commun Netw"},{"key":"11338_CR26","doi-asserted-by":"crossref","unstructured":"Baby D, Verhulst S (2019) Sergan: Speech enhancement using relativistic generative adversarial networks with gradient penalty. In: ICASSP 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 106\u2013110","DOI":"10.1109\/ICASSP.2019.8683799"},{"key":"11338_CR27","doi-asserted-by":"crossref","unstructured":"Bagdasaryan E, Shmatikov V (2022) Spinning language models risks of propaganda-as-a-service and countermeasures. In: 2022 IEEE symposium on security and privacy (SP). IEEE, pp 769\u2013786","DOI":"10.1109\/SP46214.2022.9833572"},{"issue":"2","key":"11338_CR28","first-page":"37","volume":"22","author":"A Bahmanova","year":"2024","unstructured":"Bahmanova A, Lace N (2024) Cyber risks: systematic literature analysis. J Syst Cybern Inform 22(2):37\u201347","journal-title":"J Syst Cybern Inform"},{"key":"11338_CR29","unstructured":"Bakker P (2024) Automating the cybersecurity triage process: a comparative study on the performance of large language models. B.S. thesis, University of Twente"},{"key":"11338_CR30","unstructured":"Bakker J, Schoenmakers S Deepfakes affecting reputation"},{"key":"11338_CR31","unstructured":"Balantrapu SS (2022) Ethical considerations in ai-powered cybersecurity. Int Mach Learn J Comput Eng, 5(5)"},{"key":"11338_CR34","doi-asserted-by":"crossref","unstructured":"Balasubramanian P, Seby J, Kostakos P (2023a) Semantic-driven focused crawling using laser and faiss: a novel approach for threat detection and improved information retrieval. In: 2023 IEEE 22nd international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 1598\u20131605","DOI":"10.1109\/TrustCom60117.2023.00218"},{"key":"11338_CR35","doi-asserted-by":"crossref","unstructured":"Balasubramanian P, Seby J, Kostakos P (2023b) Transformer-based llms in cybersecurity: an in-depth study on log anomaly detection and conversational defense mechanisms. In: 2023 IEEE international conference on big data (BigData). IEEE, pp 3590\u20133599","DOI":"10.1109\/BigData59044.2023.10386976"},{"key":"11338_CR36","doi-asserted-by":"crossref","unstructured":"Balasubramanian P, Seby J, Kostakos P (2024a) Cygent: a cybersecurity conversational agent with log summarization powered by gpt-3. arXiv preprint arXiv:2403.17160","DOI":"10.1109\/AIIoT58432.2024.10574658"},{"key":"11338_CR37","doi-asserted-by":"publisher","unstructured":"Balasubramanian P, Seby J, Kostakos P (2024b) Cygent: A cybersecurity conversational agent with log summarization powered by gpt-3. In: 2024 3rd International conference on artificial intelligence for internet of things (AIIoT), pp 1\u20136. https:\/\/doi.org\/10.1109\/AIIoT58432.2024.10574658","DOI":"10.1109\/AIIoT58432.2024.10574658"},{"key":"11338_CR33","doi-asserted-by":"crossref","unstructured":"Balasubramanian P, Ali T, Salmani M, KhoshKholgh D, Kostakos P (2024c) Hex2sign: automatic ids signature generation from hexadecimal data using llms. In: 2024 IEEE International conference on big data (BigData). IEEE, pp 4524\u20134532","DOI":"10.1109\/BigData62323.2024.10825710"},{"key":"11338_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2025.100545","volume":"10","author":"P Balasubramanian","year":"2025","unstructured":"Balasubramanian P, Nazari S, Kholgh DK, Mahmoodi A, Seby J, Kostakos P (2025) A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing. Decis Anal J 10:100545. https:\/\/doi.org\/10.1016\/j.dajour.2025.100545","journal-title":"Decis Anal J"},{"key":"11338_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115465","volume":"184","author":"DM Ballesteros","year":"2021","unstructured":"Ballesteros DM, Rodriguez-Ortega Y, Renza D, Arce G (2021) Deep4snet: deep learning for fake speech classification. Expert Syst Appl 184:115465","journal-title":"Expert Syst Appl"},{"issue":"6","key":"11338_CR39","first-page":"1","volume":"6","author":"TR Bammidi","year":"2023","unstructured":"Bammidi TR (2023) Enhanced cybersecurity: Ai models for instant threat detection. Int Mach Learn J Comput Eng 6(6):1\u201317","journal-title":"Int Mach Learn J Comput Eng"},{"issue":"8","key":"11338_CR40","doi-asserted-by":"publisher","first-page":"260","DOI":"10.3390\/fi15080260","volume":"15","author":"A Bandi","year":"2023","unstructured":"Bandi A, Adapa PVSR, Kuchi YEVPK (2023) The power of generative ai: a review of requirements, models, input-output formats, evaluation metrics, and challenges. Future Internet 15(8):260","journal-title":"Future Internet"},{"issue":"1","key":"11338_CR41","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12525-023-00680-1","volume":"33","author":"L Banh","year":"2023","unstructured":"Banh L, Strobel G (2023) Generative artificial intelligence. Electron Mark 33(1):63","journal-title":"Electron Mark"},{"key":"11338_CR42","unstructured":"Barnett J (2024) The case against preemptive antitrust in the generative artificial intelligence ecosystem. In: Abbott A, Schrepel T ed. Artificial intelligence and competition policy, concurrences (2024), USC CLASS Research Paper (2419)"},{"issue":"1","key":"11338_CR43","first-page":"1302999","volume":"2021","author":"R Basheer","year":"2021","unstructured":"Basheer R, Alkhatib B (2021) Threats from the dark: a review over dark web investigation research for cyber threat intelligence. J Comput Netw Commun 2021(1):1302999","journal-title":"J Comput Netw Commun"},{"key":"11338_CR44","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2021","unstructured":"Basit A, Zafar M, Liu X, Javed AR, Jalil Z, Kifayat K (2021) A comprehensive survey of ai-enabled phishing attacks detection techniques. Telecommun Syst 76:139\u2013154","journal-title":"Telecommun Syst"},{"key":"11338_CR45","doi-asserted-by":"crossref","unstructured":"Begou N, Vinoy J, Duda A, Korczy\u0144ski M (2023) Exploring the dark side of ai: advanced phishing attack design and deployment using chatgpt. In: 2023 IEEE conference on communications and network security (CNS). IEEE, pp 1\u20136","DOI":"10.1109\/CNS59707.2023.10288940"},{"key":"11338_CR46","doi-asserted-by":"publisher","DOI":"10.3998\/3336451.0007.104","author":"MK Bergman","year":"2001","unstructured":"Bergman MK (2001) White paper: the deep web: surfacing hidden value. J Electron Publ. https:\/\/doi.org\/10.3998\/3336451.0007.104","journal-title":"J Electron Publ"},{"key":"11338_CR48","unstructured":"BigScience workshop: introducing the world\u2019s largest open multilingual language model: BLOOM. Accessed: 2025-04-05 (2022a). https:\/\/bigscience.huggingface.co\/blog\/bloom"},{"key":"11338_CR47","unstructured":"BigScience workshop: BLOOM: a 176B-parameter open-access multilingual language model. Accessed: 2025-04-05 (2022b). https:\/\/huggingface.co\/bigscience\/bloom"},{"key":"11338_CR49","unstructured":"Bissict J (2017) Augmenting security event information with contextual data to improve the detection capabilities of a siem"},{"issue":"1","key":"11338_CR50","doi-asserted-by":"publisher","first-page":"011","DOI":"10.1093\/cybsec\/tyad011","volume":"9","author":"SD Bray","year":"2023","unstructured":"Bray SD, Johnson SD, Kleinberg B (2023) Testing human ability to detect \u2018deepfake\u2019 images of human faces. J Cybersecur 9(1):011","journal-title":"J Cybersecur"},{"key":"11338_CR51","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N, Subbiah M, Kaplan JD, Dhariwal P, Neelakantan A, Shyam P, Sastry G, Askell A et al (2020) Language models are few-shot learners. Adv Neural Inf Process Syst 33:1877\u20131901","journal-title":"Adv Neural Inf Process Syst"},{"key":"11338_CR52","unstructured":"Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitzoff T, Filar B et al (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228"},{"issue":"0704","key":"11338_CR53","first-page":"1","volume":"298","author":"S Caltagirone","year":"2013","unstructured":"Caltagirone S, Pendergast A, Betz C (2013) The diamond model of intrusion analysis. Threat Connect 298(0704):1\u201361","journal-title":"Threat Connect"},{"key":"11338_CR54","unstructured":"Cambria E, Malandri L, Mercorio F, Nobani N, Seveso A (2024) Xai meets llms: a survey of the relation between explainable ai and large language models. arXiv preprint arXiv:2407.15248"},{"key":"11338_CR55","doi-asserted-by":"crossref","unstructured":"Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEW symposium on security and privacy (sp). IEEE, pp 39\u201357","DOI":"10.1109\/SP.2017.49"},{"key":"11338_CR56","unstructured":"Cecil A (2006) A summary of network traffic monitoring and analysis techniques. Comput Syst Anal, 4\u20137"},{"key":"11338_CR57","unstructured":"Chao P, Robey A, Dobriban E, Hassani H, Pappas GJ, Wong E (2023) Jailbreaking black box large language models in twenty queries. arXiv preprint arXiv:2310.08419"},{"key":"11338_CR58","doi-asserted-by":"crossref","unstructured":"Chen Y, Cui M, Wang D, Cao Y, Yang P, Jiang B, Lu Z, Liu B (2024) A survey of large language models for cyber threat detection. Comput Secur, 104016","DOI":"10.1016\/j.cose.2024.104016"},{"issue":"12","key":"11338_CR59","first-page":"4625","volume":"14","author":"J Cheng","year":"2020","unstructured":"Cheng J, Yang Y, Tang X, Xiong N, Zhang Y, Lei F (2020) Generative adversarial networks: a literature review. KSII Trans Internet Inform Syst (TIIS) 14(12):4625\u20134647","journal-title":"KSII Trans Internet Inform Syst (TIIS)"},{"key":"11338_CR60","unstructured":"Cheng M, Le T, Chen P-Y, Yi J, Zhang, H, Hsieh, C-J (2018) Query-efficient hard-label black-box attack: an optimization-based approach. arXiv preprint arXiv:1807.04457"},{"key":"11338_CR61","first-page":"1753","volume":"107","author":"R Chesney","year":"2018","unstructured":"Chesney R, Citron DK (2018) Deep fakes: a looming challenge for privacy, democracy, and national security. Calif Law Rev 107:1753","journal-title":"Calif Law Rev"},{"key":"11338_CR62","first-page":"1753","volume":"107","author":"B Chesney","year":"2019","unstructured":"Chesney B, Citron D (2019) Deep fakes: a looming challenge for privacy, democracy, and national security. Calif L Rev 107:1753","journal-title":"Calif L Rev"},{"key":"11338_CR63","doi-asserted-by":"crossref","unstructured":"Choi Y, Choi M, Kim M, Ha J-W, Kim S, Choo J (2018) Stargan: Unified generative adversarial networks for multi-domain image-to-image translation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 8789\u20138797","DOI":"10.1109\/CVPR.2018.00916"},{"key":"11338_CR64","unstructured":"Chowdhury AG, Islam MM, Kumar V, Shezan FH, Jain V, Chadha A (2024) Breaking down the defenses: a comparative survey of attacks on large language models. arXiv preprint arXiv:2403.04786"},{"key":"11338_CR65","unstructured":"Cofense: artificial intelligence & machine learning in email security: what you need to know. Accessed: 2025-04-09. https:\/\/cofense.com\/knowledge-center\/cybersecurity-artificial-intelligence-and-machine-learning-in-email-security-what-you-need-to-know\/"},{"key":"11338_CR66","unstructured":"Cofense: why human-vetted intelligence is critical for artificial intelligence and machine learning in email security. Accessed: 2025-04-09. https:\/\/cofense.com\/knowledge-center\/why-human-vetted-intelligence-is-critical-for-artificial-intelligence"},{"key":"11338_CR67","unstructured":"Contributors, W.: Deepfake. https:\/\/en.wikipedia.org\/wiki\/Deepfake. Accessed: 2024-05-27 (2024)"},{"issue":"1","key":"11338_CR68","first-page":"31704","volume":"12","author":"JM Corchado","year":"2023","unstructured":"Corchado JM, L\u00f3pez S, Garcia R, Chamoso P et al (2023) Generative artificial intelligence: fundamentals. ADCAIJ Adv Distrib Comput Artif Intell J 12(1):31704\u201331704","journal-title":"ADCAIJ Adv Distrib Comput Artif Intell J"},{"key":"11338_CR69","doi-asserted-by":"crossref","unstructured":"Cui Y, Shen W, Zhang J, Lu W, Liu C, Sun L, Chen S (2022) Using Ebgan for anomaly intrusion detection. In: 2022 International joint conference on neural networks (IJCNN)","DOI":"10.1109\/IJCNN55064.2022.9892744"},{"key":"11338_CR70","unstructured":"Cybersecurity, Agency, I.S.: All resources & tools. https:\/\/www.cisa.gov\/resources-tools\/all-resources-tools. Accessed: [2024-05-19]"},{"issue":"3","key":"11338_CR71","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/TNSM.2019.2933358","volume":"16","author":"A D\u2019Alconzo","year":"2019","unstructured":"D\u2019Alconzo A, Drago I, Morichetta A, Mellia M, Casas P (2019) A survey on big data for network traffic monitoring and analysis. IEEE Trans Netw Serv Manag 16(3):800\u2013813","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"11338_CR72","doi-asserted-by":"crossref","unstructured":"Danish M (2024) Enhancing cyber security through predictive analytics: real-time threat detection and response. arXiv preprint arXiv:2407.10864","DOI":"10.14569\/IJACSA.2025.0160804"},{"key":"11338_CR73","unstructured":"DarkOwl: understanding the difference between the surface web, deep web, and darknet. Accessed: 2024-05-23 (2024). https:\/\/www.darkowl.com\/blog-content\/understanding-the-difference-between-the-surface-web-deep-web-and-darknet\/"},{"key":"11338_CR74","unstructured":"Darktrace: ActiveAI security platform. Accessed: 2025-04-09. https:\/\/www.darktrace.com\/platform"},{"key":"11338_CR75","unstructured":"Darktrace: how does darktrace detect threats? Accessed: 2025-04-09. https:\/\/www.darktrace.com\/cyber-ai-glossary\/darktrace-threat-detection"},{"key":"11338_CR76","doi-asserted-by":"crossref","unstructured":"Demchenko Y, De Laat C, Membrey P (2014) Defining architecture components of the big data ecosystem. In: 2014 International conference on collaboration technologies and systems (CTS). IEEE, pp 104\u2013112","DOI":"10.1109\/CTS.2014.6867550"},{"key":"11338_CR77","doi-asserted-by":"crossref","unstructured":"Derner E, Batisti\u010d K, Zah\u00e1lka J, Babu\u0161ka R (2024) A security risk taxonomy for prompt-based interaction with large language models. IEEE Access","DOI":"10.1109\/ACCESS.2024.3450388"},{"key":"11338_CR78","unstructured":"Devlin J (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"11338_CR79","doi-asserted-by":"crossref","unstructured":"Dey SK, Rahman MM (2018) Flow based anomaly detection in software defined networking: a deep learning approach with feature selection method. In: 2018 4th International conference on electrical engineering and information & communication technology (iCEEiCT). IEEE, pp 630\u2013635","DOI":"10.1109\/CEEICT.2018.8628069"},{"issue":"8","key":"11338_CR80","doi-asserted-by":"publisher","first-page":"13322","DOI":"10.1111\/exsy.13322","volume":"40","author":"A Dixit","year":"2023","unstructured":"Dixit A, Kaur N, Kingra S (2023) Review of audio deepfake detection techniques: issues and prospects. Expert Syst 40(8):13322","journal-title":"Expert Syst"},{"key":"11338_CR81","unstructured":"Dolhansky B, Bitton J, Pflaum B, Lu J, Howes R, Wang M, Ferrer CC (2020) The deepfake detection challenge (dfdc) dataset. arXiv preprint arXiv:2006.07397"},{"issue":"4","key":"11338_CR82","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.1109\/COMST.2024.3400011","volume":"26","author":"H Du","year":"2024","unstructured":"Du H, Zhang R, Liu Y, Wang J, Lin Y, Li Z, Niyato D, Kang J, Xiong Z, Cui S et al (2024) Enhancing deep reinforcement learning: a tutorial on generative diffusion models in network optimization. IEEE Commun Surv Tutor 26(4):2611\u20132646","journal-title":"IEEE Commun Surv Tutor"},{"key":"11338_CR83","doi-asserted-by":"publisher","first-page":"76071","DOI":"10.1109\/ACCESS.2023.3296707","volume":"11","author":"A Dunmore","year":"2023","unstructured":"Dunmore A, Jang-Jaccard J, Sabrina F, Kwak J (2023) A comprehensive survey of generative adversarial networks (gans) in cybersecurity intrusion detection. IEEE Access 11:76071\u201376094","journal-title":"IEEE Access"},{"key":"11338_CR84","doi-asserted-by":"crossref","unstructured":"Dutta IK, Ghosh B, Carlson A, Totaro M, Bayoumi M (2020) Generative adversarial networks in security: a survey. In: 2020 11th IEEE annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE, pp 0399\u20130405","DOI":"10.1109\/UEMCON51285.2020.9298135"},{"issue":"3","key":"11338_CR85","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1080\/07421222.2020.1790186","volume":"37","author":"M Ebrahimi","year":"2020","unstructured":"Ebrahimi M, Nunamaker JF Jr, Chen H (2020) Semi-supervised cyber threat identification in dark net markets: a transductive and deep learning approach. J Manag Inf Syst 37(3):694\u2013722","journal-title":"J Manag Inf Syst"},{"key":"11338_CR86","unstructured":"European Commission: regulatory framework proposal on artificial intelligence. Accessed: 2024-08-01 (2024). https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/regulatory-framework-ai"},{"key":"11338_CR87","unstructured":"Europol: facing reality: law enforcement and the challenge of deepfakes. https:\/\/www.europol.europa.eu\/publications-events\/publications\/facing-reality-law-enforcement-and-challenge-of-deepfakes. Accessed: 2024-05-26 (2022)"},{"key":"11338_CR88","doi-asserted-by":"crossref","unstructured":"Faiella M, Granadillo GG, Medeiros I, Azevedo R, Zarzosa SG (2019) Enriching threat intelligence platforms capabilities. In: ICETE (2), pp 37\u201348","DOI":"10.5220\/0007830400370048"},{"key":"11338_CR89","doi-asserted-by":"crossref","unstructured":"Falade PV (2023) Decoding the threat landscape: Chatgpt, fraudgpt, and wormgpt in social engineering attacks. arXiv preprint arXiv:2310.05595","DOI":"10.32628\/CSEIT2390533"},{"key":"11338_CR90","unstructured":"Feher DJ, Baranyai D (2018) Surveying it threats for server of small business in real-environment with honeypot. In: Proceedings of FIKUSZ symposium for young researchers. \u00d3buda University Keleti K\u00e1roly Faculty of Economics, pp 507\u2013514"},{"issue":"1","key":"11338_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-020-0490-z","volume":"2020","author":"J Fei","year":"2020","unstructured":"Fei J, Xia Z, Yu P, Xiao F (2020) Adversarial attacks on fingerprint liveness detection. EURASIP J Image Video Process 2020(1):1","journal-title":"EURASIP J Image Video Process"},{"key":"11338_CR92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3255101","author":"JR Feijoo","year":"2023","unstructured":"Feijoo JR, Guerrero-Curieses A, Gimeno Blanes FJ, Castro Fern\u00e1ndez MF, Rojo-\u00c1lvarez JL (2023) Cybersecurity alert prioritization in a critical high power grid with latent spaces. Instit Electr Electron Eng. https:\/\/doi.org\/10.1109\/ACCESS.2023.3255101","journal-title":"Instit Electr Electron Eng"},{"key":"11338_CR93","doi-asserted-by":"crossref","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D et al (2020) Codebert: A pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"issue":"11","key":"11338_CR94","doi-asserted-by":"publisher","first-page":"697","DOI":"10.3390\/info15110697","volume":"15","author":"G Feretzakis","year":"2024","unstructured":"Feretzakis G, Papaspyridis K, Gkoulalas-Divanis A, Verykios VS (2024) Privacy-preserving techniques in generative ai and large language models: a narrative review. Information 15(11):697","journal-title":"Information"},{"key":"11338_CR96","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Hamouda D, Debbah M, Maglaras L, Lakas A (2023) Generative adversarial networks-driven cyber threat intelligence detection framework for securing internet of things. In: 2023 19th International conference on distributed computing in smart systems and the internet of things (DCOSS-IoT). IEEE, pp 196\u2013200","DOI":"10.1109\/DCOSS-IoT58021.2023.00042"},{"key":"11338_CR95","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Alwahedi F, Battah A, Cherif B, Mechri A, Tihanyi N (2024a) Generative ai and large language models for cyber security: all insights you need. arXiv preprint arXiv:2405.12750","DOI":"10.2139\/ssrn.4853709"},{"key":"11338_CR97","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Ndhlovu M, Tihanyi N, Cordeiro LC, Debbah M, Lestable T, Thandi NS (2024b) Revolutionizing cyber threat detection with large language models: a privacy-preserving bert-based lightweight model for iot\/iiot devices. IEEE Access","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"11338_CR98","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107141","volume":"129","author":"D Fido","year":"2022","unstructured":"Fido D, Rao J, Harper CA (2022) Celebrity status, sex, and variation in psychopathy predicts judgements of and proclivity to generate and distribute deepfake pornography. Comput Hum Behav 129:107141","journal-title":"Comput Hum Behav"},{"key":"11338_CR99","doi-asserted-by":"crossref","unstructured":"Fieblinger R, Alam MT, Rastogi N (2024) Actionable cyber threat intelligence using knowledge graphs and large language models. arXiv preprint arXiv:2407.02528","DOI":"10.1109\/EuroSPW61312.2024.00018"},{"key":"11338_CR100","unstructured":"Financial services information sharing and analysis center: FS-ISAC. https:\/\/www.fsisac.com\/. Accessed: [d2024-05-19]"},{"key":"11338_CR101","unstructured":"Finklea KM (2015) Dark web. Congressional research service"},{"key":"11338_CR102","doi-asserted-by":"crossref","unstructured":"Floridi L, Cowls J (2022) A unified framework of five principles for ai in society. Applications in architecture and urban design, machine learning and the city, pp 535\u2013545","DOI":"10.1002\/9781119815075.ch45"},{"key":"11338_CR103","unstructured":"Forcepoint: generative AI data security. Accessed: 2025-04-09. https:\/\/www.forcepoint.com\/use-case\/generative-ai-data-security"},{"key":"11338_CR104","unstructured":"Forcepoint: risk-adaptive protection. Accessed: 2025-04-09. https:\/\/www.forcepoint.com\/product\/risk-adaptive-protection"},{"key":"11338_CR105","doi-asserted-by":"crossref","unstructured":"Fu M, Tantithamthavorn C, Le T, Nguyen V, Phung D (2022) Vulrepair: a t5-based automated software vulnerability repair. In: Proceedings of the 30th ACM joint European software engineering conference and symposium on the foundations of software engineering, pp 935\u2013947","DOI":"10.1145\/3540250.3549098"},{"key":"11338_CR106","doi-asserted-by":"crossref","unstructured":"Ganesh A, Ndulue C, Orji R (2023) Tailoring a persuasive game to promote secure smartphone behaviour. In: Proceedings of the 2023 CHI conference on human factors in computing systems, pp 1\u201318","DOI":"10.1145\/3544548.3581038"},{"key":"11338_CR107","doi-asserted-by":"crossref","unstructured":"Gao J, Lanchantin J, Soffa ML, Qi Y (2018) Black-box generation of adversarial text sequences to evade deep learning classifiers. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 50\u201356","DOI":"10.1109\/SPW.2018.00016"},{"key":"11338_CR108","doi-asserted-by":"crossref","unstructured":"Gautam AS, Gahlot Y, Kamat P (2020) Hacker forum exploit and classification for proactive cyber threat intelligence. In: Inventive computation technologies 4. Springer, pp 279\u2013285","DOI":"10.1007\/978-3-030-33846-6_32"},{"key":"11338_CR109","doi-asserted-by":"crossref","unstructured":"Gayathri R, Sajjanhar A, Xiang Y, Ma X (2021) Anomaly detection for scenario-based insider activities using cgan augmented data. In: 2021 IEEE 20th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 718\u2013725","DOI":"10.1109\/TrustCom53373.2021.00105"},{"key":"11338_CR110","doi-asserted-by":"crossref","unstructured":"Ghaisas S, Singhal A (2024) Dealing with data for re: mitigating challenges using nlp and generative ai. arXiv preprint arXiv:2402.16977","DOI":"10.1007\/978-3-031-73143-3_17"},{"key":"11338_CR111","doi-asserted-by":"crossref","unstructured":"Ghosal D, Majumder N, Mehrish A, Poria S (2023) Text-to-audio generation using instruction guided latent diffusion model. In: Proceedings of the 31st ACM international conference on multimedia, pp 3590\u20133598","DOI":"10.1145\/3581783.3612348"},{"key":"11338_CR112","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/OJVT.2023.3265363","volume":"4","author":"M Girdhar","year":"2023","unstructured":"Girdhar M, Hong J, Moore J (2023) Cybersecurity of autonomous vehicles: a systematic literature review of adversarial attacks and defense models. IEEE Open J Veh Technol 4:417\u2013437","journal-title":"IEEE Open J Veh Technol"},{"key":"11338_CR113","doi-asserted-by":"crossref","unstructured":"Glas M, Vielberth M, Pernul G (2023) Train as you fight: evaluating authentic cybersecurity training in cyber ranges. In: Proceedings of the 2023 CHI conference on human factors in computing systems, pp 1\u201319","DOI":"10.1145\/3544548.3581046"},{"key":"11338_CR114","doi-asserted-by":"crossref","unstructured":"Golda A, Mekonen K, Pandey A, Singh A, Hassija V, Chamola V, Sikdar B (2024) Privacy and security concerns in generative ai: a comprehensive survey. IEEE Access","DOI":"10.1109\/ACCESS.2024.3381611"},{"key":"11338_CR115","doi-asserted-by":"crossref","unstructured":"Gonzalez-Granadillo G, Gonzalez-Zarzosa S, Faiella M (2018) Towards an enhanced security data analytic platform. In: 15th International conference on security and cryptography (SECRYPT)","DOI":"10.5220\/0006831106190624"},{"key":"11338_CR116","unstructured":"Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"issue":"7","key":"11338_CR117","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"I Goodfellow","year":"2018","unstructured":"Goodfellow I, McDaniel P, Papernot N (2018) Making machine learning robust against adversarial inputs. Commun ACM 61(7):56\u201366","journal-title":"Commun ACM"},{"key":"11338_CR118","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Adv Neural Inf Process Syst 27"},{"key":"11338_CR119","unstructured":"Gopireddy RR (2020) Dark web monitoring: extracting and analyzing threat intelligence"},{"key":"11338_CR120","doi-asserted-by":"crossref","unstructured":"Gorment NZ, Selamat A, Krejcar O (2021) A recent research on malware detection using machine learning algorithm: current challenges and future works. In: Advances in visual informatics: 7th international visual informatics conference, IVIC 2021, Kajang, Malaysia, November 23\u201325, 2021, Proceedings 7. Springer, pp 469\u2013481","DOI":"10.1007\/978-3-030-90235-3_41"},{"key":"11338_CR121","unstructured":"Goyal Y, Mohapatra A, Parikh D, Batra D (2016) Towards transparent ai systems: interpreting visual question answering models. arXiv preprint arXiv:1608.08974"},{"key":"11338_CR122","doi-asserted-by":"crossref","unstructured":"Griffioen H, Booij T, Doerr C (2020) Quality evaluation of cyber threat intelligence feeds. In: Applied cryptography and network security: 18th international conference, ACNS 2020, Rome, Italy, October 19\u201322, 2020, Proceedings, Part II 18. Springer, pp 277\u2013296","DOI":"10.1007\/978-3-030-57878-7_14"},{"key":"11338_CR123","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102810","volume":"120","author":"JL Guerra","year":"2022","unstructured":"Guerra JL, Catania C, Veas E (2022) Datasets are not enough: challenges in labeling network traffic. Comput Secur 120:102810","journal-title":"Comput Secur"},{"issue":"4","key":"11338_CR124","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1109\/TKDE.2021.3130191","volume":"35","author":"J Gui","year":"2021","unstructured":"Gui J, Sun Z, Wen Y, Tao D, Ye J (2021) A review on generative adversarial networks: algorithms, theory, and applications. IEEE Trans Knowl Data Eng 35(4):3313\u20133332","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"11338_CR125","unstructured":"Guilloux, L.: FakeApp. https:\/\/www.malavida.com\/en\/soft\/fakeapp\/ (2024)"},{"key":"11338_CR126","unstructured":"Guo C (2023) Deep natural language processing model for phishing detection and target identification. PhD thesis, Imperial College London"},{"key":"11338_CR127","unstructured":"Guo X, Chen Y (2024) Generative ai for synthetic data generation: methods, challenges and the future. arXiv preprint arXiv:2403.04190"},{"key":"11338_CR128","unstructured":"Guo C, Gardner J, You Y, Wilson AG, Weinberger K (2019) Simple black-box adversarial attacks. In: International conference on machine learning. PMLR, pp 2484\u20132493"},{"key":"11338_CR129","unstructured":"Guo D, Ren S, Lu S, Feng Z, Tang D, Liu S, Zhou L, Duan N, Svyatkovskiy A, Fu S et al (2020) Graphcodebert: Pre-training code representations with data flow. arXiv preprint arXiv:2009.08366"},{"key":"11338_CR130","doi-asserted-by":"crossref","unstructured":"Gupta M, Akiri C, Aryal K, Parker E, Praharaj L (2023) From chatgpt to threatgpt: impact of generative ai in cybersecurity and privacy. IEEE Access","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"11338_CR131","unstructured":"Gupta I, Kumari S, Jha P, Ghosh M (2024) Leveraging LSTM and GAN for modern malware detection. arXiv:2405.04373"},{"key":"11338_CR132","first-page":"16761","volume":"33","author":"S Gur","year":"2020","unstructured":"Gur S, Benaim S, Wolf L (2020) Hierarchical patch vae-gan: generating diverse videos from a single sample. Adv Neural Inf Process Syst 33:16761\u201316772","journal-title":"Adv Neural Inf Process Syst"},{"key":"11338_CR133","unstructured":"Hassanin M, Moustafa N (2024) A comprehensive overview of large language models (llms) for cyber defences: opportunities and directions. arXiv preprint arXiv:2405.14487"},{"key":"11338_CR134","unstructured":"Health information sharing and analysis center: H-ISAC. https:\/\/h-isac.org\/. Accessed: [date you accessed the website]"},{"key":"11338_CR135","unstructured":"He P, Liu X, Gao J, Chen W (2020) Deberta: Decoding-enhanced bert with disentangled attention. arXiv preprint arXiv:2006.03654"},{"key":"11338_CR136","doi-asserted-by":"crossref","unstructured":"He X, Wang J, Xu Q, Minervini P, Stenetorp P, Rubinstein BI, Cohn T (2024) Transferring troubles: cross-lingual transferability of backdoor attacks in llms with instruction tuning. arXiv preprint arXiv:2404.19597","DOI":"10.18653\/v1\/2025.findings-acl.848"},{"key":"11338_CR137","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho J, Jain A, Abbeel P (2020) Denoising diffusion probabilistic models. Adv Neural Inf Process Syst 33:6840\u20136851","journal-title":"Adv Neural Inf Process Syst"},{"key":"11338_CR138","unstructured":"Hoque M (2023) A comprehensive overview of transformer-based models: encoders, decoders, and more. https:\/\/www.medium.com\/a-comprehensive-overview-of-transformer-based-models-encoders-decoders-and-more. Accessed: 2023-04-29"},{"key":"11338_CR139","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103999","volume":"145","author":"Y Hu","year":"2024","unstructured":"Hu Y, Zou F, Han J, Sun X, Wang Y (2024) Llm-tikg: Threat intelligence knowledge graph construction utilizing large language model. Comput Secur 145:103999","journal-title":"Comput Secur"},{"key":"11338_CR140","unstructured":"Hugging face: chapter 1: fine-tuning a transformer model. https:\/\/huggingface.co\/learn\/nlp-course\/en\/chapter1\/6. Accessed: 2024-08-13 (2024a)"},{"key":"11338_CR141","unstructured":"Hugging face: chapter 1: transformer models. https:\/\/huggingface.co\/learn\/nlp-course\/en\/chapter1\/5. Accessed: 2024-08-13 (2024b)"},{"key":"11338_CR142","unstructured":"Hugging face: encoder-decoder models documentation. https:\/\/huggingface.co\/docs\/transformers\/en\/model_doc\/encoder-decoder. Accessed: 2024-08-13 (2024c)"},{"key":"11338_CR143","unstructured":"Hu J, Liao X, Gao D, Tsutsui S, Wang Q, Qin Z, Shou MZ (2024) Delocate: detection and localization for deepfake videos with randomly-located tampered traces. arXiv:2401.13516"},{"key":"11338_CR144","unstructured":"IBM: IBM security X-force threat intelligence index 2024. Accessed: 2025-04-09. https:\/\/www.ibm.com\/reports\/threat-intelligence"},{"key":"11338_CR145","unstructured":"IBM: IBM threat detection and response services. Accessed: 2025-04-09. https:\/\/www.ibm.com\/services\/threat-detection-response"},{"issue":"2","key":"11338_CR146","first-page":"32","volume":"48","author":"N Idika","year":"2007","unstructured":"Idika N, Mathur AP (2007) A survey of malware detection techniques. Purdue University 48(2):32\u201346","journal-title":"Purdue University"},{"issue":"7","key":"11338_CR147","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3462477","volume":"54","author":"L Ignaczak","year":"2021","unstructured":"Ignaczak L, Goldschmidt G, Costa CAD, Righi RDR (2021) Text mining in cybersecurity: a systematic literature review. ACM Comput Surv (CSUR) 54(7):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"11338_CR148","unstructured":"Insider, B.: Deepfake video of Mark Zuckerberg goes viral on instagram. https:\/\/www.businessinsider.com\/deepfake-video-mark-zuckerberg-instagram-2019-6. Accessed: 2024-07-26 (2019)"},{"key":"11338_CR149","volume-title":"Generative AI, cybersecurity, and ethics","author":"MR Islam","year":"2024","unstructured":"Islam MR (2024) Generative AI, cybersecurity, and ethics. Wiley, Hoboken"},{"key":"11338_CR150","doi-asserted-by":"crossref","unstructured":"Islam R, Moushi OM (2024) Gpt-4o: The cutting-edge advancement in multimodal llm. Authorea Preprints","DOI":"10.36227\/techrxiv.171986596.65533294\/v1"},{"issue":"11","key":"11338_CR151","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"AK Jain","year":"2012","unstructured":"Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. Computer 45(11):87\u201392","journal-title":"Computer"},{"key":"11338_CR152","unstructured":"Jaiswal S (2020) T5: a detailed explanation. https:\/\/medium.com\/analytics-vidhya\/t5-a-detailed-explanation-a0ac9bc53e51. Accessed: 2024-08-07"},{"issue":"5","key":"11338_CR153","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1002\/spy2.402","volume":"75","author":"S Jamal","year":"2024","unstructured":"Jamal S, Wimmer H, Sarker IH (2024) An improved transformer-based model for detecting phishing, spam and ham emails: a large language model approach. Secur Privacy 75(5):402","journal-title":"Secur Privacy"},{"key":"11338_CR154","doi-asserted-by":"crossref","unstructured":"Jansen P, Fischbach F (2020) The social engineer: an immersive virtual reality educational game to raise social engineering awareness. In: Extended abstracts of the 2020 annual symposium on computer-human interaction in play, pp 59\u201363","DOI":"10.1145\/3383668.3419917"},{"key":"11338_CR155","doi-asserted-by":"crossref","unstructured":"Jes\u00fas DAR, Mandal P, Senjyu T, Kamalasadan S (2021) Unsupervised hybrid deep generative models for photovoltaic synthetic data generation. In: 2021 IEEE power & energy society general meeting (PESGM). IEEE, pp 1\u20135","DOI":"10.1109\/PESGM46819.2021.9637844"},{"key":"11338_CR156","unstructured":"Jiang J, Wang F, Shen J, Kim S, Kim S (2024) A survey on large language models for code generation. arXiv preprint arXiv:2406.00515"},{"key":"11338_CR157","unstructured":"Ji F, Lee K, Koo H, You W, Choo E, Kim H, Kim D (2024) Evaluating the effectiveness and robustness of visual similarity-based phishing detection models. arXiv:2405.19598"},{"key":"11338_CR158","unstructured":"Ji H, Yang J, Chai L, Wei C, Yang L, Duan Y, Wang Y, Sun T, Guo H, Li T et al (2024) Sevenllm: benchmarking, eliciting, and enhancing abilities of large language models in cyber threat intelligence. arXiv preprint arXiv:2405.03446"},{"key":"11338_CR159","unstructured":"Jonkhout B (2024) Evaluating large language models for automated cyber security analysis processes. B.S. thesis, University of Twente"},{"key":"11338_CR160","unstructured":"Joshi PD, Pocker S, Dandekar RA, Dandekar R, Panat S (2024) Hullmi: Human vs llm identification with explainability. arXiv preprint arXiv:2409.04808"},{"key":"11338_CR161","doi-asserted-by":"publisher","DOI":"10.13052\/2245-1439.732","author":"AFA Kadir","year":"2018","unstructured":"Kadir AFA, Stakhanova N, Ghorbani AA (2018) Understanding android financial malware attacks: taxonomy, characterization, and challenges. J Cyber Secur Mobil. https:\/\/doi.org\/10.13052\/2245-1439.732","journal-title":"J Cyber Secur Mobil"},{"key":"11338_CR162","unstructured":"Kaheh M, Kholgh DK, Kostakos P (2023) Cyber sentinel: exploring conversational agents in streamlining security tasks with gpt-4. arXiv preprint arXiv:2309.16422"},{"key":"11338_CR163","doi-asserted-by":"crossref","unstructured":"Kan KB, Mun H, Cao G, Lee Y (2024) Mobile-llama: instruction fine-tuning open-source llm for network analysis in 5g networks. IEEE Netw","DOI":"10.1109\/MNET.2024.3421306"},{"issue":"2","key":"11338_CR164","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1016\/j.asoc.2010.08.003","volume":"11","author":"M Karnan","year":"2011","unstructured":"Karnan M, Akila M, Krishnaraj N (2011) Biometric personal authentication using keystroke dynamics: a review. Appl Soft Comput 11(2):1565\u20131573","journal-title":"Appl Soft Comput"},{"key":"11338_CR165","unstructured":"Kaspersky: ransomware in healthcare: the growing threat. Accessed: 2025-04-08 (2020). https:\/\/www.kaspersky.com\/blog\/ransomware-vs-healthcare\/39635\/"},{"key":"11338_CR166","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1007\/s11277-020-07143-2","volume":"112","author":"S Kaur","year":"2020","unstructured":"Kaur S, Randhawa S (2020) Dark web: a web of crimes. Wirel Pers Commun 112:2131\u20132158","journal-title":"Wirel Pers Commun"},{"key":"11338_CR167","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804","volume":"97","author":"R Kaur","year":"2023","unstructured":"Kaur R, Gabrijel\u010di\u010d D, Klobu\u010dar T (2023) Artificial intelligence for cybersecurity: literature review and future research directions. Inform Fusion 97:101804","journal-title":"Inform Fusion"},{"issue":"8","key":"11338_CR168","first-page":"1","volume":"6","author":"O Kayode-Ajala","year":"2023","unstructured":"Kayode-Ajala O (2023) Applications of cyber threat intelligence (cti) in financial institutions and challenges in its adoption. Appl Res Artif Intell Cloud Comput 6(8):1\u201321","journal-title":"Appl Res Artif Intell Cloud Comput"},{"issue":"1","key":"11338_CR169","first-page":"521","volume":"14","author":"Y Keim","year":"2022","unstructured":"Keim Y, Mohapatra A (2022) Cyber threat intelligence framework using advanced malware forensics. Int J Inf Technol 14(1):521\u2013530","journal-title":"Int J Inf Technol"},{"key":"11338_CR170","doi-asserted-by":"crossref","unstructured":"Khalid H, Kim M, Tariq S, Woo SS (2021) Evaluation of an audio-video multimodal deepfake dataset using unimodal and multimodal detectors. In: Proceedings of the 1st workshop on synthetic multimedia-audiovisual deepfake generation and detection, pp 7\u201315","DOI":"10.1145\/3476099.3484315"},{"key":"11338_CR171","doi-asserted-by":"crossref","unstructured":"Khan FB, Durad MH, Khan A, Khan FA, Rizwan M, Ali A (2024) Design and performance analysis of an anti-malware system based on generative adversarial network framework. IEEE Access","DOI":"10.1109\/ACCESS.2024.3358454"},{"key":"11338_CR172","doi-asserted-by":"crossref","unstructured":"Khandpur RP, Ji T, Jan S, Wang G, Lu C-T, Ramakrishnan N (2017) Crowdsourcing cybersecurity: cyber attack detection using social media. In: Proceedings of the 2017 ACM on conference on information and knowledge management, pp 1049\u20131057","DOI":"10.1145\/3132847.3132866"},{"key":"11338_CR173","unstructured":"Kingma DP (2013) Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114"},{"key":"11338_CR174","unstructured":"Kokhlikyan N, Miglani V, Martin M, Wang E, Alsallakh B, Reynolds J, Melnikov A, Kliushkina N, Araya C, Yan S et al (2020) Captum: a unified and generic model interpretability library for pytorch. arXiv preprint arXiv:2009.07896"},{"issue":"3","key":"11338_CR175","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s13735-024-00334-8","volume":"13","author":"P Kumar","year":"2024","unstructured":"Kumar P (2024) Adversarial attacks and defenses for large language models (llms): methods, frameworks & challenges. Int J Multimed Inform Retrieval 13(3):26","journal-title":"Int J Multimed Inform Retrieval"},{"key":"11338_CR176","doi-asserted-by":"crossref","unstructured":"Kunwar P, Aryal K, Gupta M, Abdelsalam M, Bertino E (2024) Sok: Leveraging transformers for malware analysis. arXiv preprint arXiv:2405.17190","DOI":"10.1109\/TDSC.2025.3576708"},{"key":"11338_CR177","doi-asserted-by":"crossref","unstructured":"Lai C-I, Chen N, Villalba J, Dehak N (2019) Assert: Anti-spoofing with squeeze-excitation and residual networks. arXiv preprint arXiv:1904.01120","DOI":"10.21437\/Interspeech.2019-1794"},{"key":"11338_CR178","doi-asserted-by":"crossref","unstructured":"Lalande J-F, Tong VVT, Leslous M, Graux P (2018) Challenges for reliable and large scale evaluation of android malware analysis. In: 2018 International conference on high performance computing & simulation (HPCS). IEEE, pp 1068\u20131070","DOI":"10.1109\/HPCS.2018.00173"},{"key":"11338_CR179","unstructured":"Lamy-Poirier J (2021) Layered gradient accumulation and modular pipeline parallelism: fast and efficient training of large language models. arXiv preprint arXiv:2106.02679"},{"key":"11338_CR180","unstructured":"Larsen ABL, S\u00f8nderby SK, Larochelle H, Winther O (2016) Autoencoding beyond pixels using a learned similarity metric. In: International conference on machine learning. PMLR, pp 1558\u20131566"},{"key":"11338_CR181","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.neucom.2020.07.099","volume":"418","author":"M Lataifeh","year":"2020","unstructured":"Lataifeh M, Elnagar A, Shahin I, Nassif AB (2020) Arabic audio clips: identification and discrimination of authentic cantillations from imitations. Neurocomputing 418:162\u2013177","journal-title":"Neurocomputing"},{"key":"11338_CR182","unstructured":"LayerX Security: ChatGPT Security. Accessed: 2024-06-08 (2024). https:\/\/layerxsecurity.com\/learn\/chatgpt-security\/"},{"key":"11338_CR183","doi-asserted-by":"crossref","unstructured":"Lee H-W (2024) Malware attack indicators of compromise generation and sharing mechanism for cyber threat intelligence. In: Proceedings of the 2024 13th international conference on software and computer applications, pp 90\u201396","DOI":"10.1145\/3651781.3651795"},{"issue":"10","key":"11338_CR184","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.3390\/math11102320","volume":"11","author":"M Lee","year":"2023","unstructured":"Lee M (2023) A mathematical investigation of hallucination and creativity in GPT models. Mathematics 11(10):2320","journal-title":"Mathematics"},{"key":"11338_CR185","doi-asserted-by":"crossref","unstructured":"Lewis M, Liu Y, Goyal N, Ghazvininejad M, Mohamed A, Levy O, Stoyanov V, Zettlemoyer L (2019) Bart: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. arXiv preprint arXiv:1910.13461","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"11338_CR186","first-page":"1280","volume":"36","author":"C Li","year":"2022","unstructured":"Li C, Yao K, Wang J, Diao B, Xu Y, Zhang Q (2022) Interpretable generative adversarial networks. Proc AAAI Conf Artif Intell 36:1280\u20131288","journal-title":"Proc AAAI Conf Artif Intell"},{"issue":"1","key":"11338_CR187","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/TDSC.2023.3252523","volume":"21","author":"H Liang","year":"2023","unstructured":"Liang H, Li X, Xiao D, Liu J, Zhou Y, Wang A, Li J (2023) Generative pre-trained transformer-based reinforcement learning for testing web application firewalls. IEEE Trans Depend Secure Comput 21(1):309\u2013324","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"11338_CR191","unstructured":"Li J, Li D, Savarese S, Hoi S (2023a) Blip-2: Bootstrapping language-image pre-training with frozen image encoders and large language models. In: International conference on machine learning. PMLR, pp 19730\u201319742"},{"key":"11338_CR199","doi-asserted-by":"crossref","unstructured":"Li J, Yang Y, Wu Z, Vydiswaran V, Xiao C (2023b) Chatgpt as an attack tool: stealthy textual backdoor attack via blackbox generative model trigger. arXiv preprint arXiv:2304.14475","DOI":"10.18653\/v1\/2024.naacl-long.165"},{"key":"11338_CR188","unstructured":"Li H, Chen Y, Luo J, Kang Y, Zhang X, Hu Q, Chan C, Song Y (2023c) Privacy in large language models: attacks, defenses and future directions. arXiv preprint arXiv:2310.10383"},{"key":"11338_CR189","unstructured":"Li Y, Huang C, Deng S, Lock ML, Cao T, Oo N, Hooi B, Lim HW (2024) Knowphish: large language models meet multimodal knowledge graphs for enhancing reference-based phishing detection. arXiv preprint arXiv:2403.02253"},{"key":"11338_CR190","unstructured":"Likhareva D, Sankaran H, Thiyagarajan S (2024) Empowering interdisciplinary research with bert-based models: an approach through scibert-cnn with topic modeling. arXiv preprint arXiv:2404.13078"},{"key":"11338_CR192","doi-asserted-by":"crossref","unstructured":"Lim H-K, Kim J-B, Heo J-S, Kim K, Hong Y-G, Han Y-H (2019) Packet-based network traffic classification using deep learning. In: 2019 International conference on artificial intelligence in information and communication (ICAIIC). IEEE, pp 046\u2013051","DOI":"10.1109\/ICAIIC.2019.8669045"},{"key":"11338_CR193","doi-asserted-by":"crossref","unstructured":"Lira OG, Marroquin A, To MA (2024) Harnessing the advanced capabilities of llm for adaptive intrusion detection systems. In: International conference on advanced information networking and applications. Springer, pp 453\u2013464","DOI":"10.1007\/978-3-031-57942-4_44"},{"key":"11338_CR194","doi-asserted-by":"crossref","unstructured":"Liu Z (2024) A review of advancements and applications of pre-trained language models in cybersecurity. In: 2024 12th International symposium on digital forensics and security (ISDFS). IEEE, pp 1\u201310","DOI":"10.1109\/ISDFS60797.2024.10527236"},{"key":"11338_CR195","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: a robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692"},{"key":"11338_CR196","doi-asserted-by":"publisher","unstructured":"Liu B, Xiao B, Jiang X, Cen S, He X, Dou W (2023). Adversarial attacks on large language model-based system and mitigating strategies a case study on ChatGPT. https:\/\/doi.org\/10.1155\/2023\/8691095","DOI":"10.1155\/2023\/8691095"},{"key":"11338_CR197","doi-asserted-by":"crossref","unstructured":"Liu D, Yang M, Qu X, Zhou P, Hu W, Cheng Y (2024a) A survey of attacks on large vision-language models: resources, advances, and future trends. arXiv preprint arXiv:2407.07403","DOI":"10.1109\/TNNLS.2025.3592935"},{"key":"11338_CR198","doi-asserted-by":"crossref","unstructured":"Liu R, Zhou W, Zhang T, Chen K, Zhao J, Lam K-Y (2024b) Boosting black-box attack to deep neural networks with conditional diffusion models. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2024.3390609"},{"key":"11338_CR200","doi-asserted-by":"publisher","unstructured":"Lu G, Liu Y, Chen Y, Zhang C, Gao Y, Zhong G (2020) A comprehensive detection approach of wannacry: principles, rules and experiments. In: 2020 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC), pp 41\u201349. https:\/\/doi.org\/10.1109\/CyberC49757.2020.00017","DOI":"10.1109\/CyberC49757.2020.00017"},{"key":"11338_CR201","unstructured":"Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083"},{"key":"11338_CR202","doi-asserted-by":"crossref","unstructured":"Mahapatra J, Garain U (2024) Impact of model size on fine-tuned llm performance in data-to-text generation: a state-of-the-art investigation. arXiv preprint arXiv:2407.14088","DOI":"10.2139\/ssrn.4916435"},{"key":"11338_CR203","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104004","volume":"232","author":"A Mahboubi","year":"2024","unstructured":"Mahboubi A, Luong K, Aboutorab H, Bui HT, Jarrad G, Bahutair M, Camtepe S, Pogrebna G, Ahmed E, Barry B et al (2024) Evolving techniques in cyber threat hunting: a systematic review. J Netw Comput Appl 232:104004","journal-title":"J Netw Comput Appl"},{"key":"11338_CR204","doi-asserted-by":"crossref","unstructured":"Mahendru S, Pandit T (2024) SecureNet: a comparative study of DeBERTa and large language models for phishing detection. arXiv:2406.06663","DOI":"10.1109\/BDAI62182.2024.10692765"},{"key":"11338_CR205","unstructured":"Manduchi L, Pandey K, Bamler R, Cotterell R, D\u00e4ubener S, Fellenz S, Fischer A, G\u00e4rtner T, Kirchler M, Kloft M et al (2024) On the challenges and opportunities in generative ai. arXiv preprint arXiv:2403.00025"},{"key":"11338_CR206","doi-asserted-by":"crossref","unstructured":"Masala E, Servetti A, Basso S, De Martin JC (2014) Challenges and issues on collecting and analyzing large volumes of network data measurements. In: New trends in databases and information systems: 17th East European conference on advances in databases and information systems. Springer, pp 203\u2013212","DOI":"10.1007\/978-3-319-01863-8_23"},{"issue":"4","key":"11338_CR207","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1007\/s10489-022-03766-z","volume":"53","author":"M Masood","year":"2023","unstructured":"Masood M, Nawaz M, Malik KM, Javed A, Irtaza A, Malik H (2023) Deepfakes generation and detection: state-of-the-art, open challenges, countermeasures, and way forward. Appl Intell 53(4):3974\u20134026","journal-title":"Appl Intell"},{"key":"11338_CR208","doi-asserted-by":"crossref","unstructured":"Mavroeidis V, Bromander S (2017) Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European intelligence and security informatics conference (EISIC). IEEE, pp 91\u201398","DOI":"10.1109\/EISIC.2017.20"},{"key":"11338_CR209","doi-asserted-by":"crossref","unstructured":"Mavroeidis V, Hohimer R, Casey T, Jesang A (2021) Threat actor type inference and characterization within cyber threat intelligence. In: 2021 13th International conference on cyber conflict (CyCon). IEEE, pp 327\u2013352","DOI":"10.23919\/CyCon51939.2021.9468305"},{"key":"11338_CR210","doi-asserted-by":"crossref","unstructured":"Meier R, Scherrer C, Gugelmann D, Lenders V, Vanbever L (2018) Feedrank: a tamper-resistant method for the ranking of cyber threat intelligence feeds. In: 2018 10th International conference on cyber conflict (CyCon). IEEE, pp 321\u2013344","DOI":"10.23919\/CYCON.2018.8405024"},{"key":"11338_CR211","doi-asserted-by":"crossref","unstructured":"Merdovi\u0107 B, Jovanovi\u0107 B, Directorate BP (2024) Understanding identity theft and fraud. KULTURA POLISA","DOI":"10.51738\/Kpolisa2024.21.2r.17mj"},{"key":"11338_CR212","unstructured":"Metta S, Chang I, Parker J, Roman MP, Ehuan AF (2024) Generative ai in cybersecurity. arXiv preprint arXiv:2405.01674"},{"key":"11338_CR213","unstructured":"Microsoft: microsoft unveils microsoft security copilot agents and new protections for AI. Accessed: 2025-04-09. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/03\/24\/microsoft-unveils-microsoft-security-copilot-agents-and-new-protections-for-ai\/"},{"key":"11338_CR214","unstructured":"MidJourney: MidJourney. Accessed: 2024-07-25 (n.d.). https:\/\/www.midjourney.com"},{"key":"11338_CR215","unstructured":"Mink, J., Luo, L., Barbosa, N.M., Figueira, O., Wang, Y., Wang, G.: $$\\{$$DeepPhish$$\\}$$: Understanding user trust towards artificially generated profiles in online social networks. 1669\u20131686. Retrieved March 24, 2023 (2022)"},{"key":"11338_CR216","unstructured":"Mirsky Y (2022) Df-captcha: A deepfake captcha for preventing fake calls. arXiv preprint arXiv:2208.08524"},{"key":"11338_CR217","doi-asserted-by":"crossref","unstructured":"Mitra S, Neupane S, Chakraborty T, Mittal S, Piplai A, Gaur M, Rahimi S (2024) Localintel: generating organizational threat intelligence from global and local cyber knowledge. arXiv preprint arXiv:2401.10036","DOI":"10.1007\/978-3-031-87496-3_5"},{"key":"11338_CR218","unstructured":"Miyato T, Kataoka T, Koyama M, Yoshida Y (2018) Spectral normalization for generative adversarial networks. arXiv preprint arXiv:1802.05957"},{"key":"11338_CR219","doi-asserted-by":"crossref","unstructured":"Morariu C, Stiller B (2008) Dicap: Distributed packet capturing architecture for high-speed network links. In: 2008 33rd IEEE conference on local computer networks (LCN). IEEE, pp 168\u2013175","DOI":"10.1109\/LCN.2008.4664166"},{"key":"11338_CR220","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2022.113368","volume":"154","author":"M Mustak","year":"2023","unstructured":"Mustak M, Salminen J, M\u00e4ntym\u00e4ki M, Rahman A, Dwivedi YK (2023) Deepfakes: deceptions, mitigations, and opportunities. J Bus Res 154:113368","journal-title":"J Bus Res"},{"key":"11338_CR221","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103387","volume":"132","author":"B Naqvi","year":"2023","unstructured":"Naqvi B, Perova K, Farooq A, Makhdoom I, Oyedeji S, Porras J (2023) Mitigation strategies against the phishing attacks: a systematic literature review. Comput Secur 132:103387","journal-title":"Comput Secur"},{"key":"11338_CR222","unstructured":"National institute of standards and technology: publications. https:\/\/csrc.nist.gov\/publications. Accessed: [2024-05-19]"},{"key":"11338_CR223","doi-asserted-by":"crossref","unstructured":"Nayak AA, Venugopala P, Ashwini B (2024) A systematic review on generative adversarial network (gan): challenges and future directions. Arch Comput Methods Eng, 1\u201334","DOI":"10.1007\/s11831-024-10119-1"},{"key":"11338_CR224","doi-asserted-by":"publisher","first-page":"171796","DOI":"10.1109\/ACCESS.2020.3024198","volume":"8","author":"S Nazah","year":"2020","unstructured":"Nazah S, Huda S, Abawajy J, Hassan MM (2020) Evolution of dark web threat analysis and detection: a systematic approach. IEEE Access 8:171796\u2013171819","journal-title":"IEEE Access"},{"issue":"2","key":"11338_CR225","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10208-015-9296-2","volume":"17","author":"Y Nesterov","year":"2017","unstructured":"Nesterov Y, Spokoiny V (2017) Random gradient-free minimization of convex functions. Found Comput Math 17(2):527\u2013566","journal-title":"Found Comput Math"},{"key":"11338_CR226","unstructured":"Neupane S, Fernandez IA, Mittal S, Rahimi S (2023) Impacts and risk of generative ai technology on cyber defense. arXiv preprint arXiv:2306.13033"},{"key":"11338_CR227","unstructured":"Nguyen KNT, Zhang W, Lu K, Wu Y, Zheng X, Tan HL, Zhen L (2024) A survey and evaluation of adversarial attacks for object detection. arXiv preprint arXiv:2408.01934"},{"key":"11338_CR228","unstructured":"Nichol A, Dhariwal P, Ramesh A, Shyam P, Mishkin P, McGrew B, Sutskever I, Chen M (2021) Glide: towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741"},{"key":"11338_CR229","doi-asserted-by":"crossref","unstructured":"Nirkin Y, Masi I, Tuan AT, Hassner T, Medioni G (2018) On face segmentation, face swapping, and face perception. In: 2018 13th IEEE international conference on automatic face & gesture recognition (FG 2018). IEEE, pp 98\u2013105","DOI":"10.1109\/FG.2018.00024"},{"key":"11338_CR230","doi-asserted-by":"crossref","unstructured":"Nunes E, Diab A, Gunn A, Marin E, Mishra V, Paliath V, Robertson J, Shakarian J, Thart A, Shakarian P (2016) Darknet and deepnet mining for proactive cybersecurity threat intelligence. In: 2016 IEEE conference on intelligence and security informatics (ISI). IEEE, pp 7\u201312","DOI":"10.1109\/ISI.2016.7745435"},{"key":"11338_CR231","unstructured":"Ozden C (2023) Ai ethical consideration and cybersecurity. International studies in social, human and administrative sciences-I, p 85"},{"key":"11338_CR232","unstructured":"Palo alto networks: what is cdr (cloud detection and response)? (2025b). Accessed: 2025-04-07"},{"key":"11338_CR233","unstructured":"Palo Alto networks: what is cortex xsiam (extended security intelligence and automation management)? (2025a). Accessed: 2025-04-07"},{"issue":"3","key":"11338_CR234","first-page":"117","volume":"15","author":"H Pandey","year":"2020","unstructured":"Pandey H, Mittal EK (2020) Analogy between agent less monitoring and agent based monitoring. Reliab Theory Appl 15(3):117\u2013124","journal-title":"Reliab Theory Appl"},{"key":"11338_CR235","doi-asserted-by":"crossref","unstructured":"Pantelidis E, Bendiab G, Shiaeles S, Kolokotronis N (2021) Insider threat detection using deep autoencoder and variational autoencoder neural networks. In: 2021 IEEE international conference on cyber security and resilience (CSR). IEEE, pp 129\u2013134","DOI":"10.1109\/CSR51186.2021.9527925"},{"key":"11338_CR236","doi-asserted-by":"crossref","unstructured":"Park SH, Lee S-H, Lim MY, Hong PM, Lee YK (2024) A comprehensive risk analysis method for adversarial attacks on biometric authentication systems. IEEE Access","DOI":"10.1109\/ACCESS.2024.3439741"},{"key":"11338_CR237","unstructured":"Park T (2024) Enhancing anomaly detection in financial markets with an LLM-based multi-agent framework. arXiv:2403.19735"},{"key":"11338_CR238","doi-asserted-by":"crossref","unstructured":"Park C, Lee J, Kim Y, Park J-G, Kim H, Hong D (2023) An enhanced ai-based network intrusion detection system using generative adversarial networks. IEEE Internet Things J","DOI":"10.1109\/JIOT.2022.3211346"},{"key":"11338_CR239","doi-asserted-by":"crossref","unstructured":"Pasupuleti R, Vadapalli R, Mader C (2023) Cyber security issues and challenges related to generative ai and chatgpt. In: 2023 Tenth international conference on social networks analysis, management and security (SNAMS). IEEE, pp 1\u20135","DOI":"10.1109\/SNAMS60348.2023.10375472"},{"key":"11338_CR240","doi-asserted-by":"crossref","unstructured":"Patel D, Patel M, Parikh SM (2024) Dark web forensics. In: Advanced techniques and applications of cybersecurity and forensics. Chapman and Hall\/CRC, pp 277\u2013300","DOI":"10.1201\/9781003386926-15"},{"key":"11338_CR241","doi-asserted-by":"crossref","unstructured":"Patsakis C, Casino F, Lykousas N (2024) Assessing llms in malicious code deobfuscation of real-world malware campaigns. arXiv preprint arXiv:2404.19715","DOI":"10.1016\/j.eswa.2024.124912"},{"key":"11338_CR242","doi-asserted-by":"crossref","unstructured":"Peng W, Ding J, Wang W, Cui L, Cai W, Hao Z, Yun X (2024) Ctisum: A new benchmark dataset for cyber threat intelligence summarization. arXiv preprint arXiv:2408.06576","DOI":"10.2139\/ssrn.5340605"},{"key":"11338_CR243","doi-asserted-by":"publisher","first-page":"105872","DOI":"10.1109\/ACCESS.2023.3319436","volume":"11","author":"N Peppes","year":"2023","unstructured":"Peppes N, Alexakis T, Daskalakis E, Demestichas K, Adamopoulou E (2023) Malware image generation and detection method using dcgans and transfer learning. IEEE Access 11:105872\u2013105884","journal-title":"IEEE Access"},{"key":"11338_CR244","unstructured":"Peris.ai - Cybersecurity: cyber threat intelligence: identifying and mitigating. https:\/\/www.linkedin.com\/pulse\/cyber-threat-intelligence-identifying-mitigating-8strc\/. Accessed: May (2024)"},{"key":"11338_CR245","doi-asserted-by":"crossref","unstructured":"Pianese A, Cozzolino D, Poggi G, Verdoliva L (2022) Deepfake audio detection by speaker verification. In: 2022 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1\u20136","DOI":"10.1109\/WIFS55849.2022.9975428"},{"key":"11338_CR246","unstructured":"Potti S (2023) How google cloud plans to supercharge security with generative ai. Accessed: 2025-04-07"},{"issue":"3","key":"11338_CR247","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1049\/ise2.12106","volume":"17","author":"MK Prabakaran","year":"2023","unstructured":"Prabakaran MK, Meenakshi Sundaram P, Chandrasekar AD (2023) An enhanced deep learning-based phishing detection mechanism to effectively identify malicious urls using variational autoencoders. IET Inf Secur 17(3):423\u2013440","journal-title":"IET Inf Secur"},{"key":"11338_CR248","doi-asserted-by":"crossref","unstructured":"Prabha C, Mittal A (2023) Dark web: a review on the deeper side of the web. In: 2022 OPJU international technology conference on emerging technologies for sustainable development (OTCON). IEEE, pp 1\u20136","DOI":"10.1109\/OTCON56053.2023.10113989"},{"issue":"1","key":"11338_CR249","first-page":"1","volume":"1","author":"KJ Prabhod","year":"2021","unstructured":"Prabhod KJ (2021) Advanced machine learning techniques for predictive maintenance in industrial iot: integrating generative ai and deep learning for real-time monitoring. J AI-Assist Sci Discovery 1(1):1\u201329","journal-title":"J AI-Assist Sci Discovery"},{"key":"11338_CR250","unstructured":"Proofpoint: defend data: modern data protection solutions. Accessed: 2025-04-09. https:\/\/www.proofpoint.com\/au\/products\/defend-data"},{"key":"11338_CR251","unstructured":"Proofpoint: insider threat management. Accessed: 2025-04-09. https:\/\/www.proofpoint.com\/au\/products\/insider-threat-management"},{"key":"11338_CR253","doi-asserted-by":"crossref","unstructured":"Qi W, Yan Y, Gong Y, Liu D, Duan N, Chen J, Zhang R, Zhou M (2020) Prophetnet: Predicting future n-gram for sequence-to-sequence pre-training. arXiv preprint arXiv:2001.04063","DOI":"10.18653\/v1\/2020.findings-emnlp.217"},{"key":"11338_CR252","doi-asserted-by":"crossref","unstructured":"Qi X, Huang K, Panda A, Henderson P, Wang M, Mittal P (2023) Visual adversarial examples jailbreak aligned large language models. arXiv:2306.13213","DOI":"10.1609\/aaai.v38i19.30150"},{"key":"11338_CR254","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arxiv 2015. arXiv preprint arXiv:1511.06434"},{"key":"11338_CR255","unstructured":"Radford A, Narasimhan K, Salimans T, Sutskever I et al (2018) Improving language understanding by generative pre-training"},{"issue":"140","key":"11338_CR256","first-page":"1","volume":"21","author":"C Raffel","year":"2020","unstructured":"Raffel C, Shazeer N, Roberts A, Lee K, Narang S, Matena M, Zhou Y, Li W, Liu PJ (2020) Exploring the limits of transfer learning with a unified text-to-text transformer. J Mach Learn Res 21(140):1\u201367","journal-title":"J Mach Learn Res"},{"key":"11338_CR257","doi-asserted-by":"crossref","unstructured":"Rafiey P, Namadchian A (2024) Mapping vulnerability description to mitre att &ck framework by llm","DOI":"10.21203\/rs.3.rs-4341401\/v1"},{"key":"11338_CR258","unstructured":"Rahali A, Akhloufi M (2021) Malbert: Using transformers for cybersecurity and malicious software detection. arXiv preprint arXiv:2103.03806"},{"key":"11338_CR259","doi-asserted-by":"crossref","unstructured":"Rahman MR, Mahdavi-Hezaveh R, Williams L (2020) A literature review on mining cyberthreat intelligence from unstructured texts. In: 2020 International conference on data mining workshops (ICDMW). IEEE, pp 516\u2013525","DOI":"10.1109\/ICDMW51313.2020.00075"},{"issue":"4","key":"11338_CR260","doi-asserted-by":"publisher","first-page":"4800","DOI":"10.1109\/TCSS.2022.3201153","volume":"11","author":"AU Rahman","year":"2022","unstructured":"Rahman AU, Al-Obeidat F, Tubaishat A, Shah B, Anwar S, Halim Z (2022) Discovering the correlation between phishing susceptibility causing data biases and big five personality traits using c-gan. IEEE Trans Comput Soc Syst 11(4):4800\u20134808","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"11338_CR261","doi-asserted-by":"crossref","unstructured":"Ramachandran S, Nadimpalli AV, Rattani A (2021) An experimental evaluation on deepfake detection using deep face recognition. arXiv:2110.01640","DOI":"10.1109\/ICCST49569.2021.9717407"},{"key":"11338_CR263","unstructured":"Ramesh A, Pavlov M, Goh G, Gray S, Voss C, Radford A, Chen M, Sutskever I (2021) Zero-shot text-to-image generation. In: International conference on machine learning. Pmlr, pp 8821\u20138831"},{"key":"11338_CR262","unstructured":"Ramesh A, Dhariwal P, Nichol A, Chu C, Chen M (2022) Hierarchical text-conditional image generation with clip latents. 1(2), 3. arXiv preprint arXiv:2204.06125"},{"key":"11338_CR264","doi-asserted-by":"crossref","unstructured":"Ranade P, Piplai A, Mittal S, Joshi A, Finin T (2021) Generating fake cyber threat intelligence using transformer-based models. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1\u20139","DOI":"10.1109\/IJCNN52387.2021.9534192"},{"key":"11338_CR265","doi-asserted-by":"publisher","first-page":"78276","DOI":"10.1109\/ACCESS.2021.3083421","volume":"9","author":"RH Randhawa","year":"2021","unstructured":"Randhawa RH, Aslam N, Alauthman M, Rafiq H, Comeau F (2021) Security hardening of botnet detectors using generative adversarial networks. IEEE Access 9:78276\u201378292","journal-title":"IEEE Access"},{"issue":"19","key":"11338_CR266","doi-asserted-by":"publisher","first-page":"9820","DOI":"10.3390\/app12199820","volume":"12","author":"A Raza","year":"2022","unstructured":"Raza A, Munir K, Almutairi M (2022) A novel deep learning approach for deepfake image detection. Appl Sci 12(19):9820","journal-title":"Appl Sci"},{"key":"11338_CR267","unstructured":"Recorded future: recorded future launches enterprise AI for intelligence. Accessed: 2025-04-09. http:\/\/recordedfuture.com\/press-releases\/recorded-future-launches-enterprise-ai-for-intelligence"},{"key":"11338_CR268","unstructured":"Recorded Future: the next evolution of recorded future AI: powering the future of threat intelligence. Accessed: 2025-04-09. https:\/\/www.recordedfuture.com\/blog\/next-evolution-recorded-future-ai-powering-threat-intelligence"},{"key":"11338_CR269","unstructured":"Reed S, Zolna K, Parisotto E, Colmenarejo SG, Novikov A, Barth-Maron G, Gimenez M, Sulsky Y, Kay J, Springenberg JT et al (2022) A generalist agent. arXiv preprint arXiv:2205.06175"},{"key":"11338_CR270","doi-asserted-by":"crossref","unstructured":"Ren L, Wang H, Tang Y, Yang C (2024) Aigc for industrial time series: from deep generative models to large generative models. arXiv preprint arXiv:2407.11480","DOI":"10.1109\/TSMC.2025.3598252"},{"key":"11338_CR271","volume-title":"Hands-on dark web analysis: learn what goes on in the dark web, and how to work with it","author":"S Retzkin","year":"2018","unstructured":"Retzkin S (2018) Hands-on dark web analysis: learn what goes on in the dark web, and how to work with it. Packt Publishing Ltd, Birmingham"},{"key":"11338_CR272","doi-asserted-by":"crossref","unstructured":"Rifat N, Ahsan M, Chowdhury M, Gomes R (2022) Bert against social engineering attack: phishing text detection. In: 2022 IEEE International conference on electro information technology (eIT). IEEE, pp 1\u20136","DOI":"10.1109\/eIT53891.2022.9813922"},{"key":"11338_CR273","doi-asserted-by":"crossref","unstructured":"Rombach R, Blattmann A, Lorenz D, Esser P, Ommer B (2022) High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10684\u201310695","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"11338_CR274","unstructured":"Rossi S, Michel AM, Mukkamala RR, Thatcher JB (2024) An early categorization of prompt injection attacks on large language models. arXiv:2402.00898"},{"issue":"5","key":"11338_CR275","doi-asserted-by":"publisher","first-page":"4495","DOI":"10.1109\/TDSC.2024.3353929","volume":"21","author":"KC Roy","year":"2024","unstructured":"Roy KC, Chen G (2024) Graphch: a deep framework for assessing cyber-human aspects in insider threat detection. IEEE Trans Depend Secure Comput 21(5):4495\u20134509","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"11338_CR276","unstructured":"Rudman L, Irwin B (2016) A sharing platform for indicators of compromise. In: Fancourt, George, Southern Africa telecommunication networks and applications conference (SATNAC)"},{"key":"11338_CR277","unstructured":"SabrePC: GANs Vs. diffusion models: understanding the differences. [Accessed: Aug. 18, 2024]. https:\/\/www.sabrepc.com\/blog\/Deep-Learning-and-AI\/gans-vs-diffusion-models"},{"key":"11338_CR278","doi-asserted-by":"crossref","unstructured":"Sabuhi M, Zhou M, Bezemer C-P, Musilek P (2021) Applications of generative adversarial networks in anomaly detection: a systematic literature review. IEEE Access","DOI":"10.1109\/ACCESS.2021.3131949"},{"key":"11338_CR279","doi-asserted-by":"crossref","unstructured":"Saddi VR, Gopal SK, Mohammed AS, Dhanasekaran S, Naruka MS (2024) Examine the role of generative ai in enhancing threat intelligence and cyber security measures. In: 2024 2nd International conference on disruptive technologies (ICDT)","DOI":"10.1109\/ICDT61202.2024.10489766"},{"key":"11338_CR280","unstructured":"\u015eahin N (2021) Malware detection using transformers-based model gpt-2. Master\u2019s thesis, Middle East Technical University"},{"key":"11338_CR281","doi-asserted-by":"crossref","unstructured":"Sai S, Yashvardhan U, Chamola V, Sikdar B (2024) Generative ai for cyber security: analyzing the potential of chatgpt, dall-e and other models for enhancing the security space. IEEE Access","DOI":"10.1109\/ACCESS.2024.3385107"},{"key":"11338_CR282","doi-asserted-by":"publisher","first-page":"33628","DOI":"10.1109\/ACCESS.2022.3161547","volume":"10","author":"J Saleem","year":"2022","unstructured":"Saleem J, Islam R, Kabir MA (2022) The anonymity of the dark web: a survey. IEEE Access 10:33628\u201333660","journal-title":"IEEE Access"},{"key":"11338_CR283","doi-asserted-by":"crossref","unstructured":"Saleem J, Islam R, Islam Z (2024) Darknet traffic analysis: a systematic literature review. IEEE Access","DOI":"10.1109\/ACCESS.2024.3373769"},{"key":"11338_CR284","doi-asserted-by":"crossref","unstructured":"Salko M, Firc A, Malinka K (2024) Security implications of deepfakes in face authentication. In: Proceedings of the 39th ACM\/SIGAPP symposium on applied computing, pp 1376\u20131384","DOI":"10.1145\/3605098.3635953"},{"key":"11338_CR285","doi-asserted-by":"crossref","unstructured":"Samarakoon C, Shukla RM, Das T (2024) A comprehensive study of exploiting gpt models with pos enhanced adversarial techniques. Authorea Preprints","DOI":"10.36227\/techrxiv.172114634.46273345\/v1"},{"key":"11338_CR286","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez PMS, Celdr\u00e1n AH, Bovet G, P\u00e9rez GM (2024) Transfer learning in pre-trained large language models for malware detection based on system calls. arXiv preprint arXiv:2405.09318","DOI":"10.1109\/MILCOM61039.2024.10773857"},{"issue":"6","key":"11338_CR287","first-page":"349","volume":"14","author":"K Sangher","year":"2023","unstructured":"Sangher K, Singh A, Pandey HM, Kumar V (2023) Towards safe cyber practices: developing proactive cyber threat intelligence system for dark web forums content by employing deep learning approaches. Inf Syst 14(6):349","journal-title":"Inf Syst"},{"key":"11338_CR288","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T (2019) Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter. arXiv preprint arXiv:1910.01108"},{"key":"11338_CR289","doi-asserted-by":"crossref","unstructured":"Sarker IH (2024a) Generative ai and large language modeling in cybersecurity. In: AI-driven cybersecurity and threat intelligence: cyber automation, intelligent decision-making and explainability. Springer, pp 79\u201399","DOI":"10.1007\/978-3-031-54497-2_5"},{"key":"11338_CR290","doi-asserted-by":"publisher","unstructured":"Sarker IH (2024b) Learning technologies: toward machine learning and deep learning for cybersecurity. Springer, Cham, pp 43\u201359. https:\/\/doi.org\/10.1007\/978-3-031-54497-2_3","DOI":"10.1007\/978-3-031-54497-2_3"},{"key":"11338_CR291","doi-asserted-by":"crossref","unstructured":"Schmitt M, Flechais I (2023) Digital deception: generative artificial intelligence in social engineering and phishing. arXiv preprint arXiv:2310.13715","DOI":"10.2139\/ssrn.4602790"},{"key":"11338_CR292","doi-asserted-by":"crossref","unstructured":"Schneider P, Klettner M, Simperl E, Matthes F (2024) A comparative analysis of conversational large language models in knowledge-based text generation. arXiv preprint arXiv:2402.01495","DOI":"10.18653\/v1\/2024.eacl-short.31"},{"key":"11338_CR293","unstructured":"SentinelOne: Purple ai: empowering cybersecurity analysts with ai-driven threat hunting, analysis & response (2023). Accessed: 2025-04-07"},{"key":"11338_CR294","doi-asserted-by":"crossref","unstructured":"Shafee S, Bessani A, Ferreira PM (2024) Evaluation of llm chatbots for osint-based cyberthreat awareness. arXiv preprint arXiv:2401.15127","DOI":"10.2139\/ssrn.4703135"},{"key":"11338_CR295","unstructured":"Shayegani E, Mamun MAA, Fu Y, Zaree P, Dong Y, Abu-Ghazaleh N (2023) Survey of vulnerabilities in large language models revealed by adversarial attacks. arXiv preprint arXiv:2310.10844"},{"issue":"4\u20132","key":"11338_CR296","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.18517\/ijaseit.8.4-2.6827","volume":"8","author":"R Sihwail","year":"2018","unstructured":"Sihwail R, Omar K, Ariffin KZ (2018) A survey on malware analysis techniques: static, dynamic, hybrid and memory analysis. Int J Adv Sci Eng Inf Technol 8(4\u20132):1662\u20131671","journal-title":"Int J Adv Sci Eng Inf Technol"},{"key":"11338_CR297","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101861","volume":"112","author":"J Singh","year":"2021","unstructured":"Singh J, Singh J (2021) A survey on machine learning-based malware detection in executable files. J Syst Architect 112:101861","journal-title":"J Syst Architect"},{"key":"11338_CR298","unstructured":"Singh S, SI H, Singla YK, Baths V, Shah RR, Chen C, Krishnamurthy B (2024) Llava finds free lunch: teaching human behavior improves content understanding abilities of llms. arXiv preprint arXiv:2405.00942"},{"key":"11338_CR299","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110616","volume":"251","author":"N Sivaroopan","year":"2024","unstructured":"Sivaroopan N, Bandara D, Madarasingha C, Jourjon G, Jayasumana AP, Thilakarathna K (2024) Netdiffus: network traffic generation by diffusion models through time-series imaging. Comput Netw 251:110616","journal-title":"Comput Netw"},{"key":"11338_CR301","unstructured":"SlashNext: SlashNext website homepage. Accessed: 2024-07-29. https:\/\/slashnext.com\/"},{"key":"11338_CR300","unstructured":"SlashNext: cloud email security. Accessed: 2025-04-09. https:\/\/slashnext.com\/email-protection\/"},{"key":"11338_CR302","unstructured":"Sohl-Dickstein J, Weiss E, Maheswaranathan N, Ganguli S (2015) Deep unsupervised learning using nonequilibrium thermodynamics. In: International conference on machine learning. PMLR, pp 2256\u20132265"},{"key":"11338_CR303","unstructured":"So-In C (2009) A survey of network traffic monitoring and analysis tools. Cse 576m computer system analysis project, Washington University in St. Louis"},{"key":"11338_CR305","unstructured":"Song Y, Sohl-Dickstein J, Kingma DP, Kumar A, Ermon S, Poole B (2020) Score-based generative modeling through stochastic differential equations. arXiv preprint arXiv:2011.13456"},{"key":"11338_CR306","doi-asserted-by":"crossref","unstructured":"Song Z, Tian Y, Zhang J, Hao Y (2023) Generating fake cyber threat intelligence using the gpt-neo model. In: 2023 8th International conference on intelligent computing and signal processing (ICSP). IEEE, pp 920\u2013924","DOI":"10.1109\/ICSP58490.2023.10248596"},{"key":"11338_CR304","unstructured":"Song C, Ma L, Zheng J, Liao J, Kuang H, Yang L (2024) Audit-llm: multi-agent collaboration for log-based insider threat detection. arXiv preprint arXiv:2408.08902"},{"key":"11338_CR307","doi-asserted-by":"crossref","unstructured":"Sonwani H, Divya M, Dhawan A, Mantri A, Kumar H et al (2022) A comprehensive study on threat intelligence platform. In: 2022 International conference on communication, computing and internet of things (IC3IoT). IEEE, pp 1\u20135","DOI":"10.1109\/IC3IOT53935.2022.9767985"},{"key":"11338_CR308","unstructured":"Staff AN (2023) Fact focus: trump didn\u2019t send NYPD officers to help stormy daniels investigation. https:\/\/apnews.com\/article\/fact-check-trump-nypd-stormy-daniels-539393517762. Accessed: 2024-05-27"},{"issue":"5","key":"11338_CR309","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.3390\/electronics12051242","volume":"12","author":"F Sufi","year":"2023","unstructured":"Sufi F (2023) A new social media-driven cyber threat intelligence. Electronics 12(5):1242","journal-title":"Electronics"},{"key":"11338_CR310","doi-asserted-by":"crossref","unstructured":"Sultana J, Jilani AK (2021) Exploring and analysing surface, deep, dark web and attacks. Security incidents & response against cyber attacks, 85\u201396","DOI":"10.1007\/978-3-030-69174-5_5"},{"key":"11338_CR311","doi-asserted-by":"crossref","unstructured":"Sun YS, Chen Z-K, Huang Y-T, Chen MC (2024) Unleashing malware analysis and understanding with generative ai. IEEE Secur Privacy","DOI":"10.1109\/MSEC.2024.3384415"},{"issue":"3","key":"11338_CR312","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4236\/jcc.2019.73004","volume":"7","author":"A Susuri","year":"2019","unstructured":"Susuri A et al (2019) Dark web and its impact in online anonymity and privacy: a critical analysis and review. J Comput Commun 7(3):30\u201343","journal-title":"J Comput Commun"},{"key":"11338_CR313","doi-asserted-by":"crossref","unstructured":"Takaaki S, Atsuo I (2019) Dark web content analysis and visualization. In: Proceedings of the ACM international workshop on security and privacy analytics, pp 53\u201359","DOI":"10.1145\/3309182.3309189"},{"key":"11338_CR314","doi-asserted-by":"crossref","unstructured":"Tang B, Lu Y, Li Q, Bai Y, Yu J, Yu X (2023) A diffusion model based on network intrusion detection method for industrial cyber-physical systems. Sensors","DOI":"10.3390\/s23031141"},{"key":"11338_CR315","unstructured":"Tang F, Wang X, Yuan X, Luo L, Zhao M, Kato N (2024) Large language model (llm) assisted end-to-end network health management based on multi-scale semanticization. arXiv preprint arXiv:2406.08305"},{"key":"11338_CR316","doi-asserted-by":"crossref","unstructured":"Taylor T, Eleyan A (2021) Using variational autoencoders to increase the performance of malware classification. In: 2021 International symposium on networks, computers and communications (ISNCC). IEEE, pp 1\u20136","DOI":"10.1109\/ISNCC52172.2021.9615643"},{"issue":"4","key":"11338_CR317","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1365\/s43439-023-00094-x","volume":"4","author":"F Teichmann","year":"2023","unstructured":"Teichmann F (2023) Ransomware attacks in the context of generative artificial intelligence\u2013an experimental study. Int Cybersecur Law Rev 4(4):399\u2013414","journal-title":"Int Cybersecur Law Rev"},{"issue":"4","key":"11338_CR318","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3197517.3201350","volume":"37","author":"J Thies","year":"2018","unstructured":"Thies J, Zollh\u00f6fer M, Theobalt C, Stamminger M, Nie\u00dfner M (2018) Headon: real-time reenactment of human portrait videos. ACM Trans Graph (TOG) 37(4):1\u201313","journal-title":"ACM Trans Graph (TOG)"},{"key":"11338_CR319","unstructured":"Titcomb J (2019) Manager at energy firm loses \u00a3200,000 after fraudsters use ai to impersonate his boss\u2019s voice. The Telegraph"},{"key":"11338_CR320","unstructured":"Tomassi A (2024) Data security and privacy concerns for generative ai platforms. PhD thesis, Politecnico di Torino"},{"key":"11338_CR321","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P (2017) Ensemble adversarial training: attacks and defenses. arXiv preprint arXiv:1705.07204"},{"key":"11338_CR322","unstructured":"Truong VT, Dang LB, Le LB (2024) Attacks and defenses for generative diffusion models: a comprehensive survey. arXiv preprint arXiv:2408.03400"},{"key":"11338_CR323","doi-asserted-by":"crossref","unstructured":"Tshimula JM, Nkashama DK, Muabila JT, Galekwa RM, Kanda H, Dialufuma MV, Didier MM, Kalonji K, Mundele S, Lenye PK et al (2024) Psychological profiling in cybersecurity: a look at llms and psycholinguistic features. arXiv preprint arXiv:2406.18783","DOI":"10.1007\/978-981-96-1483-7_31"},{"key":"11338_CR324","first-page":"200","volume":"34","author":"M Tsimpoukelli","year":"2021","unstructured":"Tsimpoukelli M, Menick JL, Cabi S, Eslami S, Vinyals O, Hill F (2021) Multimodal few-shot learning with frozen language models. Adv Neural Inf Process Syst 34:200\u2013212","journal-title":"Adv Neural Inf Process Syst"},{"key":"11338_CR325","doi-asserted-by":"crossref","unstructured":"Ullah I, Mahmoud QH (2021) A framework for anomaly detection in iot networks using conditional generative adversarial networks. IEEE Access","DOI":"10.1109\/ACCESS.2021.3132127"},{"key":"11338_CR326","doi-asserted-by":"crossref","unstructured":"Uric\u00e1r M, Krizek P, Hurych D, Sobh I, Yogamani S, Denny P (2019) Yes, we gan: applying adversarial techniques for autonomous driving. arXiv preprint arXiv:1902.03442","DOI":"10.2352\/ISSN.2470-1173.2019.15.AVM-048"},{"key":"11338_CR327","unstructured":"Vaswani A (2017) Attention is all you need. Adv Neural Inf Process Syst"},{"key":"11338_CR328","unstructured":"Vig J (2019) Bertviz: A tool for visualizing multihead self-attention in the bert model. In: ICLR workshop: debugging machine learning models, 3"},{"key":"11338_CR329","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589","volume":"87","author":"TD Wagner","year":"2019","unstructured":"Wagner TD, Mahbub K, Palomar E, Abdallah AE (2019) Cyber threat intelligence sharing: survey and research directions. Comput Secur 87:101589","journal-title":"Comput Secur"},{"key":"11338_CR332","unstructured":"Wang H, Hooi B (2024) Automated phishing detection using urls and webpages. arXiv preprint arXiv:2408.01667"},{"key":"11338_CR333","doi-asserted-by":"crossref","unstructured":"Wang R, Juefei-Xu F, Huang Y, Guo Q, Xie X, Ma L, Liu Y (2020) Deepsonar: Towards effective and robust detection of ai-synthesized fake voices. In: Proceedings of the 28th ACM international conference on multimedia, pp 1207\u20131216","DOI":"10.1145\/3394171.3413716"},{"key":"11338_CR331","doi-asserted-by":"crossref","unstructured":"Wang F, Al Hamadi H, Damiani E (2022) A visualized malware detection framework with cnn and conditional gan. In: 2022 IEEE international conference on big data (Big Data). IEEE, pp 6540\u20136546","DOI":"10.1109\/BigData55660.2022.10020534"},{"key":"11338_CR330","unstructured":"Wang ZQ, Wang H, El Saddik A (2024) Feditd: A federated parameter-efficient tuning with pre-trained large language models and transfer learning framework for insider threat detection. IEEE Access"},{"key":"11338_CR334","doi-asserted-by":"crossref","unstructured":"Westerlund M (2019) The emergence of deepfake technology: a review. Technol Innov Manag Rev 9(11)","DOI":"10.22215\/timreview\/1282"},{"key":"11338_CR335","doi-asserted-by":"crossref","unstructured":"Wijethunga R, Matheesha D, Al Noman A, De Silva K, Tissera M, Rupasinghe L (2020) Deepfake audio detection: a deep learning based solution for group conversations. In: 2020 2nd International conference on advancements in computing (ICAC). IEEE, pp 192\u2013197","DOI":"10.1109\/ICAC51239.2020.9357161"},{"key":"11338_CR336","unstructured":"Wikipedia contributors: artificial intelligence act. Accessed: 2024-07-29 (2024b). https:\/\/en.wikipedia.org\/wiki\/Artificial_Intelligence_Act"},{"key":"11338_CR337","unstructured":"Wikipedia contributors: regulation of artificial intelligence. Accessed: 2024-08-01 (2024a). https:\/\/en.wikipedia.org\/wiki\/Regulation_of_artificial_intelligence"},{"key":"11338_CR338","doi-asserted-by":"crossref","unstructured":"Wiratunga N, Abeyratne R, Jayawardena L, Martin K, Massie S, Nkisi-Orji I, Weerasinghe R, Liret A, Fleisch B (2024) Cbr-rag: case-based reasoning for retrieval augmented generation in llms for legal question answering. In: International conference on case-based reasoning. Springer, pp 445\u2013460","DOI":"10.1007\/978-3-031-63646-2_29"},{"key":"11338_CR339","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","volume":"2","author":"W Wong","year":"2006","unstructured":"Wong W, Stamp M (2006) Hunting for metamorphic engines. J Comput Virol 2:211\u2013229","journal-title":"J Comput Virol"},{"key":"11338_CR343","doi-asserted-by":"crossref","unstructured":"Wu J, Hooi B (2023) Fake news in sheep\u2019s clothing: robust fake news detection against LLM-empowered style attacks","DOI":"10.1145\/3637528.3671977"},{"issue":"2","key":"11338_CR340","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.1109\/TSMC.2020.3016821","volume":"52","author":"J Wu","year":"2020","unstructured":"Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z (2020) Who are the phishers? Phishing scam detection on ethereum via network embedding. IEEE Trans Syst Man Cybern Syst 52(2):1156\u20131166","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"4","key":"11338_CR341","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2021.3112159","volume":"10","author":"Y Wu","year":"2021","unstructured":"Wu Y, Nie L, Wang S, Ning Z, Li S (2021a) Intelligent intrusion detection for internet of things security: a deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J 10(4):3094\u20133106","journal-title":"IEEE Internet Things J"},{"key":"11338_CR344","unstructured":"Wu Y, Liu Q, Liao X, Ji S, Wang P, Wang X, Wu C, Li Z (2021b) Price tag: towards semi-automatically discovery tactics, techniques and procedures of e-commerce cyber threat intelligence. IEEE Trans Depend Secure Comput"},{"key":"11338_CR342","doi-asserted-by":"crossref","unstructured":"Wu X, Duan R, Ni J (2023) Unveiling security, privacy, and ethical concerns of ChatGPT. arXiv:2307.14192","DOI":"10.1016\/j.jiixd.2023.10.007"},{"key":"11338_CR345","unstructured":"Wu T, Luo L, Li Y-F, Pan S, Vu T-T, Haffari G (2024a) Continual learning for large language models: a survey. arXiv preprint arXiv:2402.01364"},{"key":"11338_CR346","unstructured":"Wu X, Zhao H, Zhu Y, Shi Y, Yang F, Liu T, Zhai X, Yao W, Li J, Du M et al (2024b) Usable xai: 10 strategies towards exploiting explainability in the llm era. arXiv preprint arXiv:2403.08946"},{"key":"11338_CR347","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102046","volume":"99","author":"M Xue","year":"2020","unstructured":"Xue M, He C, Wang J, Liu W (2020) Lopa: a linear offset based poisoning attack method against adaptive fingerprint authentication system. Comput Secur 99:102046","journal-title":"Comput Secur"},{"key":"11338_CR348","doi-asserted-by":"crossref","unstructured":"Xue Y, Wang D, Zhang L (2013) Traffic classification: issues and challenges. In: 2013 International conference on computing, networking and communications (ICNC). IEEE, pp 545\u2013549","DOI":"10.1109\/ICCNC.2013.6504144"},{"key":"11338_CR349","doi-asserted-by":"crossref","unstructured":"Xu H, Wang S, Li N, Zhao Y, Chen K, Wang K, Liu Y, Yu T, Wang H (2024) Large language models for cyber security: a systematic literature review. arXiv preprint arXiv:2405.04760","DOI":"10.1145\/3769676"},{"key":"11338_CR350","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109743","author":"T Yan","year":"2022","unstructured":"Yan T, Zhou T, Zhan Y, Xia Y (2022) Tfdpm: Attack detection for cyber\u2013physical systems with diffusion probabilistic models. Knowl-Based Syst. https:\/\/doi.org\/10.1016\/j.knosys.2022.109743","journal-title":"Knowl-Based Syst"},{"key":"11338_CR351","doi-asserted-by":"crossref","unstructured":"Yang Y, Yu H, Yang L, Yang M, Chen L, Zhu G, Wen L (2019) Hadoop-based dark web threat intelligence analysis framework. In: 2019 IEEE 3rd advanced information management, communicates, electronic and automation control conference (IMCEC). IEEE, pp 1088\u20131091","DOI":"10.1109\/IMCEC46724.2019.8984106"},{"key":"11338_CR352","unstructured":"Yigit Y, Buchanan WJ, Tehrani MG, Maglaras L (2024) Review of generative ai methods in cybersecurity. arXiv preprint arXiv:2403.08701"},{"key":"11338_CR353","unstructured":"Yong Z-X, Menghini C, Bach SH (2023) Low-resource languages jailbreak gpt-4. arXiv preprint arXiv:2310.02446"},{"key":"11338_CR354","doi-asserted-by":"crossref","unstructured":"You I, Yim K (2010) Malware obfuscation techniques: a brief survey. In: 2010 International conference on broadband, wireless computing, communication and applications. IEEE, pp 297\u2013300","DOI":"10.1109\/BWCCA.2010.85"},{"issue":"10","key":"11338_CR355","doi-asserted-by":"publisher","first-page":"4633","DOI":"10.1109\/TNNLS.2017.2771947","volume":"29","author":"H Yu","year":"2017","unstructured":"Yu H, Tan Z-H, Ma Z, Martin R, Guo J (2017) Spoofing detection in automatic speaker verification systems using dnn classifiers and dynamic acoustic features. IEEE Trans Neural Netw Learn Syst 29(10):4633\u20134644","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"11338_CR356","doi-asserted-by":"crossref","unstructured":"Yuan F, Shang Y, Liu Y, Cao Y, Tan J (2020) Data augmentation for insider threat detection with gan. In: 2020 IEEE 32nd international conference on tools with artificial intelligence (ICTAI)","DOI":"10.1109\/ICTAI50040.2020.00102"},{"key":"11338_CR357","doi-asserted-by":"crossref","unstructured":"Zabihimayvan M, Sadeghi R, Doran D (2024) Security, information, and structure characterization of tor: a survey. Telecommun Syst 1\u201317","DOI":"10.1007\/s11235-024-01149-y"},{"key":"11338_CR358","doi-asserted-by":"crossref","unstructured":"Zhang J, Bu H, Wen H, Chen Y, Li L, Zhu H (2024) When llms meet cybersecurity: a systematic literature review. arXiv preprint arXiv:2405.03644","DOI":"10.1186\/s42400-025-00361-w"},{"key":"11338_CR359","doi-asserted-by":"crossref","unstructured":"Zhang Y, Colman B, Guo X, Shahriyari A, Bharaj G (2025) Common sense reasoning for deepfake detection. In: European conference on computer vision. Springer, pp 399\u2013415","DOI":"10.1007\/978-3-031-73223-2_22"},{"key":"11338_CR360","doi-asserted-by":"crossref","unstructured":"Zhang Q, Fang C, Yu B, Sun W, Zhang T, Chen Z (2023) Pre-trained model-based automated software vulnerability repair: how far are we? IEEE transactions on dependable and secure computing","DOI":"10.1109\/TDSC.2023.3308897"},{"key":"11338_CR361","unstructured":"Zhang J, Zhao Y, Saleh M, Liu P (2020) Pegasus: Pre-training with extracted gap-sentences for abstractive summarization. In: International conference on machine learning. PMLR, pp 11328\u201311339"},{"key":"11338_CR362","unstructured":"Zhang B, Zhou JP, Shumailov I, Papernot N (2020) On attribution of deepfakes. arXiv preprint arXiv:2008.09194"},{"key":"11338_CR363","doi-asserted-by":"crossref","unstructured":"Zhang H, Zou F (2020) A survey of the dark web and dark market research. In: 2020 IEEE 6th international conference on computer and communications (ICCC). IEEE, pp 1694\u20131705","DOI":"10.1109\/ICCC51575.2020.9345271"},{"key":"11338_CR364","unstructured":"Zhao WX, Zhou K, Li J, Tang T, Wang X, Hou Y, Min Y, Zhang B, Zhang J, Dong Z et al (2023) A survey of large language models. arXiv preprint arXiv:2303.18223"},{"key":"11338_CR365","doi-asserted-by":"crossref","unstructured":"Zhao Q, Wei X, Dong C, Jin B, Yu Z, Gao F, Xu H, Meng H, Zheng L, Chen C (2024) Malware detection and analysis based on ai algorithm. In: 2024 International conference on distributed computing and optimization techniques (ICDCOT)","DOI":"10.1109\/ICDCOT61034.2024.10515944"},{"key":"11338_CR366","unstructured":"Zhong Z, Fan W (2023) A honey-imprint enabled approach for resisting social engineering attacks. In: 2023 24st Asia-Pacific network operations and management symposium (APNOMS)"},{"key":"11338_CR367","doi-asserted-by":"crossref","unstructured":"Zhou H, Hu C, Yuan Y, Cui Y, Jin Y, Chen C, Wu H, Yuan D, Jiang L, Wu D et al (2024) Large language model (llm) for telecommunications: a comprehensive survey on principles, key techniques, and opportunities. arXiv preprint arXiv:2405.10825","DOI":"10.1109\/COMST.2024.3465447"},{"key":"11338_CR368","doi-asserted-by":"crossref","unstructured":"Zhou P, Wang L, Liu Z, Hao Y, Hui P, Tarkoma S, Kangasharju J (2024) A survey on generative ai and llm for video generation, understanding, and streaming. arXiv preprint arXiv:2404.16038","DOI":"10.36227\/techrxiv.171172801.19993069\/v1"},{"key":"11338_CR369","doi-asserted-by":"crossref","unstructured":"Ziems N, Wu S (2021) Security vulnerability detection using deep learning natural language processing. In: IEEE INFOCOM 2021 - IEEE conference on computer communications workshops (INFOCOM WKSHPS)","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484500"},{"key":"11338_CR370","doi-asserted-by":"publisher","first-page":"18499","DOI":"10.1109\/ACCESS.2023.3247135","volume":"11","author":"R Zieni","year":"2023","unstructured":"Zieni R, Massari L, Calzarossa MC (2023) Phishing or not phishing? A survey on the detection of phishing websites. IEEE Access 11:18499\u201318519","journal-title":"IEEE Access"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-025-11338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-025-11338-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-025-11338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T02:05:16Z","timestamp":1761357916000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-025-11338-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,20]]},"references-count":370,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["11338"],"URL":"https:\/\/doi.org\/10.1007\/s10462-025-11338-z","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,20]]},"assertion":[{"value":"22 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"336"}}