{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:41Z","timestamp":1778605841787,"version":"3.51.4"},"reference-count":148,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100023674","name":"King Khalid University Deanship of Scientific Research","doi-asserted-by":"publisher","award":["GRP.2\/663\/46"],"award-info":[{"award-number":["GRP.2\/663\/46"]}],"id":[{"id":"10.13039\/501100023674","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111184","type":"journal-article","created":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:28:37Z","timestamp":1776781717000},"page":"111184","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Secure autonomous cyber defense with LLM agents: A systematic review of autonomy, tool-augmented reasoning, and governance constraints"],"prefix":"10.1016","volume":"135","author":[{"given":"Hamed","family":"Alqahtani","sequence":"first","affiliation":[]},{"given":"Paras","family":"Ahuja","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111184_b1","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1109\/TIFS.2022.3191493","article-title":"Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111184_b2","doi-asserted-by":"crossref","first-page":"2299","DOI":"10.1109\/COMST.2023.3299519","article-title":"A survey on threat hunting in enterprise networks","volume":"25","author":"Nour","year":"2023","journal-title":"IEEE Commun Surv & Tutorials"},{"key":"10.1016\/j.compeleceng.2026.111184_b3","doi-asserted-by":"crossref","DOI":"10.1109\/TII.2025.3534443","article-title":"Self-supervised and interpretable anomaly detection using network transformers","author":"Marino","year":"2025","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b4","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40537-024-00957-y","article-title":"Advancing cybersecurity: a comprehensive review of AI-driven detection techniques","volume":"11","author":"Salem","year":"2024","journal-title":"J Big Data"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111184_b5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.54097\/7ysr5k17","article-title":"Large language models for cybersecurity intelligence, threat hunting, and decision support","volume":"13","author":"Ren","year":"2025","journal-title":"Comput Life"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b6","first-page":"1","article-title":"Accelerating the SOC: Achieve greater efficiency with AI-driven automation","volume":"12","author":"Yaseen","year":"2022","journal-title":"Int J Responsible Artif Intell"},{"key":"10.1016\/j.compeleceng.2026.111184_b7","doi-asserted-by":"crossref","unstructured":"Yu M, Meng F, Zhou X, Wang S, Mao J, Pan L, Chen T, Wang K, Li X, Zhang Y, et al. A survey on trustworthy llm agents: Threats and countermeasures. In: Proceedings of the 31st ACM SIGKDD conference on knowledge discovery and data mining v. 2. 2025, p. 6216\u201326.","DOI":"10.1145\/3711896.3736561"},{"key":"10.1016\/j.compeleceng.2026.111184_b8","series-title":"2026 IEEE 5th international conference on AI in cybersecurity","first-page":"1","article-title":"Ragsec: Retrieval-augmented generation for cybersecurity threat intelligence in enterprise networks","author":"Bussari","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b9","article-title":"RALLRec+: Retrieval augmented large language model recommendation with reasoning","author":"Luo","year":"2025","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.compeleceng.2026.111184_b10","series-title":"2025 IEEE international conference on big data (bigData)","first-page":"3161","article-title":"Ontology-aware rag for improved question-answering in cybersecurity education","author":"Zhao","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b11","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jocs.2017.03.025","article-title":"Simulation platform for cyber-security and vulnerability analysis of critical infrastructures","volume":"22","author":"Ficco","year":"2017","journal-title":"J Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111184_b12","doi-asserted-by":"crossref","unstructured":"Mohammadi M, Li Y, Lo J, Yip W. Evaluation and benchmarking of llm agents: A survey. In: Proceedings of the 31st ACM SIGKDD conference on knowledge discovery and data mining v. 2. 2025, p. 6129\u201339.","DOI":"10.1145\/3711896.3736570"},{"key":"10.1016\/j.compeleceng.2026.111184_b13","first-page":"1","article-title":"Targeted algorithmic purpose-driven cyber attacks in distributed multi-agent optimization","author":"Fard","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b14","doi-asserted-by":"crossref","DOI":"10.3389\/fcomp.2025.1683495","article-title":"Targeted injection attack toward the semantic layer of large language models","volume":"7","author":"Zhang","year":"2025","journal-title":"Front Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111184_b15","series-title":"2024 IEEE international conference on unmanned systems","first-page":"1840","article-title":"Adversarial and cooperation tasks in multi-agent system with large language models","author":"Jia","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b16","doi-asserted-by":"crossref","DOI":"10.1109\/MNET.2025.3605319","article-title":"LLM-driven multi-agent architectures for intelligent self-organizing networks","author":"Qayyum","year":"2025","journal-title":"IEEE Netw"},{"key":"10.1016\/j.compeleceng.2026.111184_b17","doi-asserted-by":"crossref","DOI":"10.1109\/TVCG.2025.3575694","article-title":"Jailbreaklens: Visual analysis of jailbreak attacks against large language models","author":"Feng","year":"2025","journal-title":"IEEE Trans Vis Comput Graphics"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111184_b18","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1111\/risa.14351","article-title":"How good are large language models at product risk assessment?","volume":"45","author":"Collier","year":"2025","journal-title":"Risk Anal"},{"key":"10.1016\/j.compeleceng.2026.111184_b19","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/OJITS.2026.3665677","article-title":"LLM and AI agents for autonomous systems: A survey of applications, datasets, and security challenges","volume":"7","author":"Ferrag","year":"2026","journal-title":"IEEE Open J Intell Transp Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b20","series-title":"2026 IEEE 16th annual computing and communication workshop and conference","first-page":"1424","article-title":"Authenticated and offline-verifiable agent-to-agent messaging for llm agents","author":"Alshammari","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b21","doi-asserted-by":"crossref","DOI":"10.1145\/3769676","article-title":"Large language models for cyber security: A systematic literature review","author":"Xu","year":"2025","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111184_b22","doi-asserted-by":"crossref","first-page":"216","DOI":"10.3390\/ai6090216","article-title":"Large language models in cybersecurity: A survey of applications, vulnerabilities, and defense techniques","volume":"6","author":"Jaffal","year":"2025","journal-title":"AI"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b23","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s44336-024-00009-2","article-title":"A survey on LLM-based multi-agent systems: workflow, infrastructure, and challenges","volume":"1","author":"Li","year":"2024","journal-title":"Vicinagearth"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111184_b24","doi-asserted-by":"crossref","first-page":"118","DOI":"10.3390\/fi14040118","article-title":"Deep learning for vulnerability and attack detection on web applications: A systematic literature review","volume":"14","author":"Alaoui","year":"2022","journal-title":"Futur Internet"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b25","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1007\/s43681-024-00427-4","article-title":"Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI","volume":"5","author":"Malatji","year":"2025","journal-title":"AI Ethics"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111184_b26","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.3390\/s25061666","article-title":"Generative AI and LLMs for critical infrastructure protection: evaluation benchmarks, agentic AI, challenges, and opportunities","volume":"25","author":"Yigit","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2026.111184_b27","series-title":"International conference on cyberspace simulation and evaluation","first-page":"454","article-title":"Language game for evading privacy disclosure risks via LLM-based multi-agent simulation","author":"Yan","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b28","series-title":"2026 IEEE 5th international conference on AI in cybersecurity","first-page":"1","article-title":"LLM-powered autonomous security agents for next-generation cyber defence","author":"Sardar","year":"2026"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b29","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s12559-026-10568-9","article-title":"LLM alignment should go beyond harmlessness\u2013helpfulness and incorporate human agency","volume":"18","author":"Naseem","year":"2026","journal-title":"Cogn Comput"},{"key":"10.1016\/j.compeleceng.2026.111184_b30","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2025.3578383","article-title":"Llm-attacker: Enhancing closed-loop adversarial scenario generation for autonomous driving with large language models","author":"Mei","year":"2025"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111184_b31","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1080\/09700161.2023.2288994","article-title":"Trustworthy artificial intelligence: design of AI governance framework","volume":"47","author":"Sharma","year":"2023","journal-title":"Strat Anal"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111184_b32","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3390\/bdcc9060147","article-title":"The importance of AI data governance in large language models","volume":"9","author":"Pahune","year":"2025","journal-title":"Big Data Cogn Comput"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111184_b33","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-024-40231-1","article-title":"A survey on large language model based autonomous agents","volume":"18","author":"Wang","year":"2024","journal-title":"Front Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111184_b34","first-page":"103","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"Bmj"},{"key":"10.1016\/j.compeleceng.2026.111184_b35","doi-asserted-by":"crossref","first-page":"19162","DOI":"10.1109\/ACCESS.2025.3532951","article-title":"Empowering security operation center with artificial intelligence and machine learning\u2014A systematic literature review","volume":"13","author":"Khayat","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111184_b36","doi-asserted-by":"crossref","unstructured":"Fan W, Ding Y, Ning L, Wang S, Li H, Yin D, Chua T-S, Li Q. A survey on rag meeting llms: Towards retrieval-augmented large language models. In: Proceedings of the 30th ACM SIGKDD conference on knowledge discovery and data mining. 2024, p. 6491\u2013501.","DOI":"10.1145\/3637528.3671470"},{"key":"10.1016\/j.compeleceng.2026.111184_b37","series-title":"European conference on information retrieval","first-page":"239","article-title":"Poison-rag: Adversarial data poisoning attacks on retrieval-augmented generation in recommender systems","author":"Nazary","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b38","series-title":"2024 8th international symposium on multidisciplinary studies and innovative technologies","first-page":"1","article-title":"Harnessing LLMs for IoT malware detection: A comparative analysis of BERT and GPT-2","author":"Omar","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b39","doi-asserted-by":"crossref","first-page":"30","DOI":"10.3390\/computation13020030","article-title":"From vulnerability to defense: The role of large language models in enhancing cybersecurity","volume":"13","author":"Kasri","year":"2025","journal-title":"Computation"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b40","doi-asserted-by":"crossref","first-page":"171","DOI":"10.30871\/jaic.v10i1.11900","article-title":"Multi-agent retrieval augmented generation for clinical decision support: A systematic review and integrative conceptual framework","volume":"10","author":"Mugambiwa","year":"2026","journal-title":"J Appl Inform Comput"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b41","first-page":"75","article-title":"AI-enhanced SOC operations: Real-time compliance and threat management for the US defense sector","volume":"5","author":"Marapu","year":"2024","journal-title":"Int J Artif Intell Data Sci Mach Learn"},{"key":"10.1016\/j.compeleceng.2026.111184_b42","series-title":"Findings of the association for computational linguistics: ACL 2025","first-page":"6726","article-title":"Red-teaming llm multi-agent systems via communication attacks","author":"He","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b43","doi-asserted-by":"crossref","unstructured":"Tuck BE. LLMs Under Attack: Understanding the Adversarial Mindset. In: Proceedings of the 2025 ACM international workshop on security and privacy analytics. 2025, p. 34\u20135.","DOI":"10.1145\/3716815.3729018"},{"key":"10.1016\/j.compeleceng.2026.111184_b44","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.arcontrol.2023.02.004","article-title":"A critical review of cyber-physical security for building automation systems","volume":"55","author":"Li","year":"2023","journal-title":"Annu Rev Control"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111184_b45","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1038\/s42256-021-00370-7","article-title":"Governing AI safety through independent audits","volume":"3","author":"Falco","year":"2021","journal-title":"Nat Mach Intell"},{"key":"10.1016\/j.compeleceng.2026.111184_b46","series-title":"2024 27th international conference on computer supported cooperative work in design","first-page":"1716","article-title":"Generating valid and natural adversarial examples with large language models","author":"Wang","year":"2024"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111184_b47","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3390\/jcp5040095","article-title":"AI-augmented SOC: A survey of LLMs and agents for security automation","volume":"5","author":"Srinivas","year":"2025","journal-title":"J Cybersecur Priv"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111184_b48","doi-asserted-by":"crossref","first-page":"388","DOI":"10.3390\/jcp4030020","article-title":"Humans and automation: Augmenting security operation centers","volume":"4","author":"Tilbury","year":"2024","journal-title":"J Cybersecur Priv"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b49","doi-asserted-by":"crossref","first-page":"3019","DOI":"10.1109\/LRA.2020.2974707","article-title":"Rlbench: The robot learning benchmark & learning environment","volume":"5","author":"James","year":"2020","journal-title":"IEEE Robot Autom Lett"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111184_b50","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.70213","article-title":"A review of trism frameworks in artificial intelligence systems: Fundamentals, taxonomy, use cases, key challenges and future directions","volume":"43","author":"Ray","year":"2026","journal-title":"Expert Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b51","series-title":"IFIP international conference on ICT systems security and privacy protection","first-page":"166","article-title":"LSAST: Enhancing cybersecurity through LLM-supported static application security testing","author":"Keltek","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b52","series-title":"Findings of the association for computational linguistics: ACL 2025","first-page":"4998","article-title":"MegaAgent: A large-scale autonomous LLM-based multi-agent system without predefined SOPs","author":"Wang","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b53","doi-asserted-by":"crossref","unstructured":"Ma Z, Liu J, Luo X, Huang Z, Zhu Q, Che W. Advancing tool-augmented large language models via meta-verification and reflection learning. In: Proceedings of the 31st ACM SIGKDD conference on knowledge discovery and data mining v. 2. 2025, p. 2078\u201389.","DOI":"10.1145\/3711896.3736835"},{"issue":"21","key":"10.1016\/j.compeleceng.2026.111184_b54","doi-asserted-by":"crossref","first-page":"11515","DOI":"10.3390\/app152111515","article-title":"Toward autonomous LLM-based AI agents for predictive maintenance: State of the art, challenges, and future perspectives","volume":"15","author":"Di Maggio","year":"2025","journal-title":"Appl Sci"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111184_b55","doi-asserted-by":"crossref","first-page":"499","DOI":"10.3390\/a18080499","article-title":"A research landscape of agentic ai and large language models: Applications, challenges and future directions","volume":"18","author":"Brohi","year":"2025","journal-title":"Algorithms"},{"issue":"12","key":"10.1016\/j.compeleceng.2026.111184_b56","doi-asserted-by":"crossref","first-page":"2722","DOI":"10.3390\/electronics12122722","article-title":"Emergent cooperation and strategy adaptation in multi-agent systems: An extended coevolutionary theory with llms","volume":"12","author":"De Zarz\u00e0","year":"2023","journal-title":"Electronics"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111184_b57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3712003","article-title":"Llm-based multi-agent systems for software engineering: Literature review, vision, and the road ahead","volume":"34","author":"He","year":"2025","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10.1016\/j.compeleceng.2026.111184_b58","unstructured":"Wang S, Long Z, Fan Z, Huang X-J, Wei Z. Benchmark self-evolving: A multi-agent framework for dynamic llm evaluation. In: Proceedings of the 31st international conference on computational linguistics. 2025, p. 3310\u201328."},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111184_b59","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s13735-024-00334-8","article-title":"Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges","volume":"13","author":"Kumar","year":"2024","journal-title":"Int J Multimed Inf Retr"},{"key":"10.1016\/j.compeleceng.2026.111184_b60","series-title":"International conference on knowledge science, engineering and management","first-page":"85","article-title":"Adversarial attacks on large language models","author":"Zou","year":"2024"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b61","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1186\/s42400-025-00361-w","article-title":"When llms meet cybersecurity: A systematic literature review","volume":"8","author":"Zhang","year":"2025","journal-title":"Cybersecurity"},{"key":"10.1016\/j.compeleceng.2026.111184_b62","series-title":"2024 IEEE power & energy society general meeting","first-page":"1","article-title":"Chatgpt and other large language models for cybersecurity of smart grid applications","author":"Zaboli","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b63","doi-asserted-by":"crossref","DOI":"10.3389\/frobt.2025.1605405","article-title":"Agentic LLM-based robotic systems for real-world applications: a review on their agenticness and ethics","volume":"12","author":"Raptis","year":"2025","journal-title":"Front Robot AI"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111184_b64","doi-asserted-by":"crossref","first-page":"184","DOI":"10.3390\/bdcc9070184","article-title":"Llms in cyber security: Bridging practice and education","volume":"9","author":"Atlam","year":"2025","journal-title":"Big Data Cogn Comput"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b65","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s12083-023-01595-6","article-title":"Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection","volume":"17","author":"Li","year":"2024","journal-title":"Peer-To-Peer Netw Appl"},{"key":"10.1016\/j.compeleceng.2026.111184_b66","series-title":"2025 IEEE 49th annual computers, software, and applications conference","first-page":"523","article-title":"The application of transformer-based models for predicting consequences of cyber attacks","author":"Chhetri","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b67","first-page":"27","article-title":"Multi-agent reinforcement learning for autonomous vehicles: A survey","volume":"2","author":"Dinneweth","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111184_b68","series-title":"AI-driven security systems and intelligent threat response using autonomous cyber defense","first-page":"35","article-title":"AI-driven security systems and intelligence threat response using autonomous cyber defense","author":"Al E\u2019mari","year":"2025"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b69","doi-asserted-by":"crossref","first-page":"951","DOI":"10.3390\/app15020951","article-title":"ARCS: Adaptive reinforcement learning framework for automated cybersecurity incident response strategy optimization","volume":"15","author":"Ren","year":"2025","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.111184_b70","unstructured":"Dongre V, Yang X, Acikgoz EC, Dey S, Tur G, Hakkani-Tur D. Respact: Harmonizing reasoning, speaking, and acting towards building large language model-based conversational ai agents. In: Proceedings of the 15th international workshop on spoken dialogue systems technology. 2025, p. 72\u2013102."},{"key":"10.1016\/j.compeleceng.2026.111184_b71","first-page":"11809","article-title":"Tree of thoughts: Deliberate problem solving with large language models","volume":"36","author":"Yao","year":"2023","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b72","first-page":"1","article-title":"A survey on the optimization of large language model-based agents","volume":"58","author":"Du","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b73","series-title":"Handbook of research on quantum computing for smart environments","first-page":"299","article-title":"Cyber security: New realities for industry 4.0 and society 5.0","author":"Deshmukh","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111184_b74","first-page":"51991","article-title":"Camel: Communicative agents for\u201d mind\u201d exploration of large language model society","volume":"36","author":"Li","year":"2023","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b75","series-title":"2023 IEEE symposium on security and privacy","first-page":"327","article-title":"Sok: Let the privacy games begin! a unified treatment of data inference privacy in machine learning","author":"Salem","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111184_b76","series-title":"Proceedings on","first-page":"103","article-title":"Adversarial attacks and defenses in large language models: Old and new threats","author":"Schwinn","year":"2023"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b77","first-page":"228","article-title":"AI data governance for large language models: Frameworks, best practices, and future directions","volume":"7","author":"Tulli","year":"2024","journal-title":"Int J Mod Comput"},{"key":"10.1016\/j.compeleceng.2026.111184_b78","series-title":"Next-generation cybersecurity: AI, ML, and blockchain","first-page":"437","article-title":"Ethical considerations in AI-based cybersecurity","author":"Kaushik","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b79","series-title":"International conference on distributed computer and communication networks","first-page":"404","article-title":"Prompt injection attacks in defended systems","author":"Khomsky","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b80","doi-asserted-by":"crossref","unstructured":"Chen J, Zhong Q, Wang Y, Ning K, Liu Y, Xu Z, Zhao Z, Chen T, Zheng Z. Rmcbench: Benchmarking large language models\u2019 resistance to malicious code. In: Proceedings of the 39th IEEE\/ACM international conference on automated software engineering. 2024, p. 995\u20131006.","DOI":"10.1145\/3691620.3695480"},{"key":"10.1016\/j.compeleceng.2026.111184_b81","series-title":"2024 IEEE 6th international conference on trust, privacy and security in intelligent systems, and applications","first-page":"341","article-title":"Leveraging multimodal retrieval-augmented generation for cyber attack detection in transit systems","author":"Munir","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b82","doi-asserted-by":"crossref","unstructured":"Nazary F, Deldjoo Y, Di Noia T, Di Sciascio E. Stealthy LLM-driven data poisoning attacks against embedding-based retrieval-augmented recommender systems. In: Adjunct proceedings of the 33rd ACM conference on user modeling, adaptation and personalization. 2025, p. 98\u2013102.","DOI":"10.1145\/3708319.3733675"},{"key":"10.1016\/j.compeleceng.2026.111184_b83","series-title":"2025 IEEE\/ACM international conference on automation of software test","first-page":"125","article-title":"A taxonomy of failures in tool-augmented llms","author":"Winston","year":"2025"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b84","doi-asserted-by":"crossref","first-page":"2025","DOI":"10.1007\/s10957-024-02464-9","article-title":"On risk evaluation and control of distributed multi-agent systems","volume":"203","author":"Almen","year":"2024","journal-title":"J Optim Theory Appl"},{"key":"10.1016\/j.compeleceng.2026.111184_b85","first-page":"181071","article-title":"Transformers: A security perspective","volume":"12","author":"Latibari","year":"2024"},{"issue":"11","key":"10.1016\/j.compeleceng.2026.111184_b86","doi-asserted-by":"crossref","first-page":"957","DOI":"10.3390\/info16110957","article-title":"LLMs for cybersecurity in the big data era: A comprehensive review of applications, challenges, and future directions","volume":"16","author":"Karras","year":"2025","journal-title":"Information"},{"key":"10.1016\/j.compeleceng.2026.111184_b87","doi-asserted-by":"crossref","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","article-title":"Deep learning-based intrusion detection systems: a systematic review","volume":"9","author":"Lansky","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111184_b88","article-title":"RedAgent: an autonomous agent for context-aware red teaming of llm jailbreaks","author":"Xu","year":"2026","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"02","key":"10.1016\/j.compeleceng.2026.111184_b89","first-page":"62","article-title":"Next-generation security operations center (SOC) resilience: Autonomous detection and adaptive incident response using cognitive AI agents","volume":"10","author":"Sugumar","year":"2024","journal-title":"Int J Technol Manag Humanit"},{"key":"10.1016\/j.compeleceng.2026.111184_b90","doi-asserted-by":"crossref","unstructured":"Ma Y, Gou Z, Hao J, Xu R, Wang S, Pan L, Yang Y, Cao Y, Sun A. Sciagent: Tool-augmented language models for scientific reasoning. In: Proceedings of the 2024 conference on empirical methods in natural language processing. 2024, p. 15701\u201336.","DOI":"10.18653\/v1\/2024.emnlp-main.880"},{"key":"10.1016\/j.compeleceng.2026.111184_b91","first-page":"93104","article-title":"Explainable artificial intelligence applications in cyber security: State-of-the-art in research","volume":"10","author":"Zhang","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111184_b92","series-title":"2025 9th international conference on computing, communication, control and automation","first-page":"1","article-title":"Decentralized agentic AI security framework using blockchain and reinforcement learning with explainable AI","author":"Ghadekar","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b93","first-page":"74325","article-title":"Agentboard: An analytical evaluation board of multi-turn llm agents","volume":"37","author":"Ma","year":"2024","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b94","series-title":"2026 IEEE 5th international conference on AI in cybersecurity","first-page":"1","article-title":"The evolution of agentic AI in cybersecurity: From single LLM reasoners to multi-agent systems and autonomous pipelines","author":"Vinay","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b95","article-title":"Cyber security: State of the art, challenges and future directions","volume":"2","author":"Admass","year":"2024","journal-title":"Cyber Secur Appl"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b96","first-page":"405","article-title":"Large language models for effective detection of algorithmically generated domains: A comprehensive review","volume":"144","author":"Alqahtani","year":"2025","journal-title":"Comput Model Eng Sci (CMES)"},{"key":"10.1016\/j.compeleceng.2026.111184_b97","series-title":"Constitutional ai: Harmlessness from ai feedback","author":"Bai","year":"2022"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111184_b98","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3716628","article-title":"Ai agents under threat: A survey of key security challenges and future pathways","volume":"57","author":"Deng","year":"2025","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2026.111184_b99","series-title":"Findings of the association for computational linguistics: EMNLP 2024","first-page":"10000","article-title":"Trustagent: Towards safe and trustworthy llm-based agents","author":"Hua","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b100","unstructured":"Carlini N, Tramer F, Wallace E, Jagielski M, Herbert-Voss A, Lee K, Roberts A, Brown T, Song D, Erlingsson U, et al. Extracting training data from large language models. In: 30th USeNIX security symposium. 2021, p. 2633\u201350."},{"key":"10.1016\/j.compeleceng.2026.111184_b101","first-page":"1","article-title":"Jailguard: A universal detection framework for prompt-based attacks on llm systems","author":"Zhang","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b102","series-title":"Evaluating large language models trained on code","author":"Chen","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111184_b103","series-title":"International conference on human-computer interaction","first-page":"263","article-title":"Benchmarking robots by inducing failures in competition scenarios","author":"Thoduka","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111184_b104","series-title":"2023 international conference on human-centered cognitive systems","first-page":"1","article-title":"LLM-based vulnerability detection","author":"Li","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111184_b105","series-title":"Advancements in multi-agent large language model systems for next-generation AI","first-page":"225","article-title":"Security and privacy in multi-agent LLM networks: Addressing vulnerabilities","author":"Goel","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111184_b106","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.future.2020.12.001","article-title":"Artificial intelligence for securing industrial-based cyber\u2013physical systems","volume":"117","author":"Lv","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.compeleceng.2026.111184_b107","series-title":"2025 27th international multitopic conference","first-page":"1","article-title":"Multi-agent systems in software testing: From planning to reporting","author":"Usman","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b108","series-title":"2025 IEEE 7th international conference on cognitive machine intelligence","first-page":"449","article-title":"Automated threat emulation framework with LLMs for cyber physical systems","author":"Gowdanakatte","year":"2025"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111184_b109","doi-asserted-by":"crossref","first-page":"6969","DOI":"10.1007\/s10115-025-02429-y","article-title":"Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms","volume":"67","author":"Mohamed","year":"2025","journal-title":"Knowl Inf Syst"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111184_b110","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3638552","article-title":"Malware detection with artificial intelligence: A systematic literature review","volume":"56","author":"Gaber","year":"2024","journal-title":"ACM Comput Surv"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111184_b111","doi-asserted-by":"crossref","first-page":"624","DOI":"10.32996\/jcsts.2025.7.3.71","article-title":"Securing the automated enterprise: A framework for mitigating security and privacy risks in AI-driven workflow automation","volume":"7","author":"Chennupati","year":"2025","journal-title":"J Comput Sci Technol Stud"},{"key":"10.1016\/j.compeleceng.2026.111184_b112","doi-asserted-by":"crossref","unstructured":"Cao D, Yu B. Survey of Emerging Trends in LLM Agent Benchmarking. In: Proceedings of the 2025 2nd symposium on big data, neural networks, and deep learning. 2025, p. 31\u20135.","DOI":"10.1145\/3784013.3784018"},{"key":"10.1016\/j.compeleceng.2026.111184_b113","first-page":"1","article-title":"Enhancing devsecops practice with large language models and security chaos engineering","author":"Bedoya","year":"2024","journal-title":"Int J Inf Secur"},{"key":"10.1016\/j.compeleceng.2026.111184_b114","series-title":"MILCOM 2024-2024 IEEE military communications conference","first-page":"176","article-title":"Hierarchical multi-agent reinforcement learning for autonomous cyber defense in coalition networks","author":"Hurten","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b115","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2025.111343","article-title":"Generative agent-based modeling with large language models for insider threat detection","volume":"157","author":"Ferraro","year":"2025","journal-title":"Eng Appl Artif Intell"},{"key":"10.1016\/j.compeleceng.2026.111184_b116","doi-asserted-by":"crossref","unstructured":"Ben abdel ouahab I, Elaachak L, Bouhorma M. Enhancing malware classification with vision transformers: a comparative study with traditional CNN models. In: Proceedings of the 6th international conference on networking, intelligent systems & security. 2023, p. 1\u20135.","DOI":"10.1145\/3607720.3607781"},{"key":"10.1016\/j.compeleceng.2026.111184_b117","doi-asserted-by":"crossref","unstructured":"Zheng Y, Hu Y, Yu T, Quinn A. AgentSight: System-Level Observability for AI Agents Using eBPF. In: Proceedings of the 4th workshop on practical adoption challenges of ML for systems. 2025, p. 110\u20135.","DOI":"10.1145\/3766882.3767169"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b118","doi-asserted-by":"crossref","DOI":"10.32604\/iasc.2021.016240","article-title":"AI\/ML in security orchestration, automation and response: Future research directions","volume":"28","author":"Kinyua","year":"2021","journal-title":"Intell Autom & Soft Comput"},{"key":"10.1016\/j.compeleceng.2026.111184_b119","series-title":"Emerging technologies and international security","first-page":"173","article-title":"Cyber autonomy: Automating the hacker\u2013self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security","author":"Ko","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111184_b120","first-page":"2987","article-title":"Automated generation of cybersecurity response playbooks via large language models","volume":"270","author":"Paduraru","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b121","series-title":"2025 IEEE\/aCIS 29th international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing","first-page":"864","article-title":"Hybrid LLM-enhanced intrusion detection for zero-day threats in IoT networks","author":"Al-Hammouri","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b122","series-title":"Embodied multi-agent systems: perception, action, and learning","first-page":"61","article-title":"Perception-action loop in embodied multi-agent system","author":"Liu","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b123","doi-asserted-by":"crossref","DOI":"10.1016\/j.aiopen.2026.02.006","article-title":"Trism for agentic ai: A review of trust, risk, and security management in llm-based agentic multi-agent systems","author":"Raza","year":"2026","journal-title":"AI Open"},{"key":"10.1016\/j.compeleceng.2026.111184_b124","series-title":"2025 3rd international conference on artificial intelligence, blockchain, and internet of things","first-page":"1","article-title":"LLM deployment in regulated enterprise AI systems: A privacy-preserving and compliant architectural approach","author":"Devarajulu","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b125","doi-asserted-by":"crossref","unstructured":"Liu S, Chen J, Ruan S, Su H, Yin Z. Exploring the robustness of decision-level through adversarial attacks on llm-based embodied models. In: Proceedings of the 32nd ACM international conference on multimedia. 2024, p. 8120\u20138.","DOI":"10.1145\/3664647.3680616"},{"key":"10.1016\/j.compeleceng.2026.111184_b126","doi-asserted-by":"crossref","unstructured":"Zhu K, Wang J, Zhou J, Wang Z, Chen H, Wang Y, Yang L, Ye W, Zhang Y, Gong N, et al. Promptrobust: Towards evaluating the robustness of large language models on adversarial prompts. In: Proceedings of the 1st ACM workshop on large AI systems and models with privacy and safety analysis. 2023, p. 57\u201368.","DOI":"10.1145\/3689217.3690621"},{"key":"10.1016\/j.compeleceng.2026.111184_b127","series-title":"CCL 2024\u201323rd Chinese natl conf comput linguist","first-page":"141","article-title":"A survey on large language model based autonomous agents","volume":"vol. 2","author":"Chen","year":"2024"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b128","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/JAS.2021.1003820","article-title":"Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"10.1016\/j.compeleceng.2026.111184_b129","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1016\/j.procs.2024.09.653","article-title":"The three sides of the moon LLMs in cybersecurity: guardians, enablers and targets","volume":"246","author":"Marulli","year":"2024","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111184_b130","series-title":"AI-driven cybersecurity and threat intelligence: cyber automation, intelligent decision-making and explainability","first-page":"3","article-title":"Introduction to AI-driven cybersecurity and threat intelligence","author":"Sarker","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b131","series-title":"2025 20th international joint symposium on artificial intelligence and natural language processing","first-page":"1","article-title":"AI-enhanced automated incident response in SIEM with explainability for SOC analysts","author":"Charla","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b132","series-title":"2025 IEEE 64th conference on decision and control","first-page":"5041","article-title":"Safety-aware multi-agent learning for dynamic network bridging","author":"Galliera","year":"2025"},{"issue":"Supplement_1","key":"10.1016\/j.compeleceng.2026.111184_b133","doi-asserted-by":"crossref","first-page":"i119","DOI":"10.1093\/bioinformatics\/btae238","article-title":"Improving medical reasoning through retrieval and self-reflection with retrieval-augmented large language models","volume":"40","author":"Jeong","year":"2024","journal-title":"Bioinformatics"},{"key":"10.1016\/j.compeleceng.2026.111184_b134","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2025.3597319","article-title":"Advanced smart contract vulnerability detection via llm-powered multi-agent systems","author":"Wei","year":"2025","journal-title":"IEEE Trans Softw Eng"},{"key":"10.1016\/j.compeleceng.2026.111184_b135","series-title":"Cyber security: the lifeline of information and communication technology","first-page":"231","article-title":"Artificial intelligence and machine learning in cyber security","author":"Prasad","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111184_b136","series-title":"AI-driven cybersecurity and threat intelligence: cyber automation, intelligent decision-making and explainability","first-page":"79","article-title":"Generative AI and large language modeling in cybersecurity","author":"Sarker","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b137","series-title":"MILCOM 2024-2024 IEEE military communications conference","first-page":"152","article-title":"Towards robust and secure autonomous cyber defense agents in coalition networks","author":"Loevenich","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111184_b138","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.eswa.2017.01.047","article-title":"Diagnosing resource usage failures in multi-agent systems","volume":"77","author":"Elimelech","year":"2017","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.compeleceng.2026.111184_b139","series-title":"2025 6th international conference on ioT based control networks and intelligent systems","first-page":"1471","article-title":"AutoOptiCode-LLM: An autonomous large language model framework for intelligent code generation and optimization","author":"Endla","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b140","series-title":"Securing AI agents: foundations, frameworks, and real-world deployment","first-page":"17","article-title":"Agentic AI threat modeling","author":"Huang","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111184_b141","series-title":"MILCOM 2024-2024 IEEE military communications conference","first-page":"158","article-title":"Training autonomous cyber defense agents: Challenges & opportunities in military networks","author":"Loevenich","year":"2024"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111184_b142","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3773080","article-title":"The emerged security and privacy of llm agent: A survey with case studies","volume":"58","author":"He","year":"2025","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2026.111184_b143","article-title":"Enhanced threat intelligence framework for advanced cybersecurity resilience","volume":"27","author":"Alazab","year":"2024","journal-title":"Egypt Inform J"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111184_b144","first-page":"589","article-title":"Deep reinforcement learning in the advanced cybersecurity threat detection and protection","volume":"25","author":"Sewak","year":"2023","journal-title":"Inf Syst Front"},{"key":"10.1016\/j.compeleceng.2026.111184_b145","doi-asserted-by":"crossref","first-page":"143806","DOI":"10.1109\/ACCESS.2024.3468914","article-title":"Applications of llms for generating cyber security exercise scenarios","volume":"12","author":"Yamin","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111184_b146","series-title":"International conference on machine learning for cyber security","first-page":"409","article-title":"Adversarial attack and defense on natural language processing in deep learning: A survey and perspective","author":"Dong","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111184_b147","series-title":"Leveraging large language models for quantum-aware cybersecurity","first-page":"277","article-title":"Large language models in cybersecurity: From automation to intelligence","author":"Zangana","year":"2025"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111184_b148","first-page":"57","article-title":"Machine learning in cybersecurity: a comprehensive survey","volume":"19","author":"Dasgupta","year":"2022","journal-title":"J D\u00e9f Model Simul"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002569?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002569?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:32:54Z","timestamp":1778603574000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002569"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":148,"alternative-id":["S0045790626002569"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111184","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure autonomous cyber defense with LLM agents: A systematic review of autonomy, tool-augmented reasoning, and governance constraints","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111184","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111184"}}