{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:06:51Z","timestamp":1775246811035,"version":"3.50.1"},"reference-count":180,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3355547","type":"journal-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T18:34:01Z","timestamp":1705602841000},"page":"12229-12256","source":"Crossref","is-referenced-by-count":158,"title":["A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1071-2541","authenticated-orcid":false,"given":"Merve","family":"Ozkan-Okay","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Ankara University, G&#x00F6;lba&#x015F;&#x0131;, Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2223-3927","authenticated-orcid":false,"given":"Erdal","family":"Akin","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bitlis Eren University, Merkez, Bitlis, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0737-1966","authenticated-orcid":false,"given":"\u00d6MER","family":"Aslan","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Band&#x0131;rma Onyedi Eyl&#x00FC;l University, Band&#x0131;rma, Bal&#x0131;kesir, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2899-4679","authenticated-orcid":false,"given":"Selahattin","family":"Kosunalp","sequence":"additional","affiliation":[{"name":"Department of Computer Technologies, G&#x00F6;nen Vocational School, Band&#x0131;rma Onyedi Eyl&#x00FC;l University, Band&#x0131;rma, Bal&#x0131;kesir, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2214-8092","authenticated-orcid":false,"given":"Teodor","family":"Iliev","sequence":"additional","affiliation":[{"name":"Department of Telecommunication, University of Ruse, Ruse, Bulgaria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9824-1504","authenticated-orcid":false,"given":"Ivaylo","family":"Stoyanov","sequence":"additional","affiliation":[{"name":"Department of Electrical and Power Engineering, University of Ruse, Ruse, Bulgaria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2014-1970","authenticated-orcid":false,"given":"Ivan","family":"Beloev","sequence":"additional","affiliation":[{"name":"Department of Transport, University of Ruse, Ruse, Bulgaria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.71"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.48009\/3_iis_2018_150-159"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8702049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3571823.3571829"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME52200.2021.9590895"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT51525.2021.9579611"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2022.103329"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/14043858.2015.1046640"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-07-2019-0122"},{"key":"ref13","first-page":"5228","article-title":"Trust and vulnerability in the cybersecurity context","volume-title":"Proc. HICSS","author":"Searle"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2018.00520"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/9781119795667.ch12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s22052017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258167"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1706-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00535-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1201\/9781351006620"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09478-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GUCON.2018.8675097"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31703-4_16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.02.056"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-13057-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3121870"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10333-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56991-8_32"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105116"},{"key":"ref33","article-title":"Deep learning and artificial intelligence framework to improve the cyber security","author":"Ghillani","year":"2022","journal-title":"Authorea Preprints"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IEC52205.2021.9476132"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041951"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE.2017.8526232"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800573"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1306"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v14i16.16953"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-323-85209-8.00007-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/1548512920951275"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.54"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2894358"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.091"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923640"},{"key":"ref48","first-page":"1","article-title":"Applications of machine learning in cyber security","volume-title":"Proc. 27th Int. Conf. Comput. Appl. Ind. Eng.","volume":"118","author":"Ford"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2216-2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2020.106904"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.58"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0101280"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050754"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWS48432.2020.9292388"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s12065-019-00310-w"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129600"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685643"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107716"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.004"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6662"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.030188"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref63","volume-title":"Deep Learning to the Rescue","author":"Bernard","year":"2019"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089586"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"ref66","article-title":"An analysis of deep neural network models for practical applications","author":"Canziani","year":"2016","journal-title":"arXiv:1605.07678"},{"key":"ref67","volume-title":"Deep Learning With Keras","author":"Gulli","year":"2017"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33275-3_2"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.10.013"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107610"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05933-8"},{"key":"ref74","first-page":"2234","article-title":"Improved techniques for training GANs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Salimans"},{"key":"ref75","first-page":"4565","article-title":"Generative adversarial imitation learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Ho"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106421"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.103764"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-019-10049-1"},{"key":"ref79","first-page":"129","article-title":"Parsing natural scenes and natural language with recursive neural networks","volume-title":"Proc. ICML","author":"Socher"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102748"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.135"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3390\/s22010360"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3433174.3433614"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081861"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963724"},{"key":"ref87","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2008.08.003"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1561\/2200000071"},{"key":"ref91","article-title":"Learning from delayed rewards","author":"Watkins","year":"1989"},{"issue":"3","key":"ref92","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF00992698","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-031219-041220"},{"key":"ref94","article-title":"Deep reinforcement learning: An overview","author":"Li","year":"2017","journal-title":"arXiv:1701.07274"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1126\/science.aar6404"},{"key":"ref96","first-page":"9190","article-title":"Model-based reinforcement learning via latent-space collocation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Rybkin"},{"key":"ref97","article-title":"Dream to control: Learning behaviors by latent imagination","author":"Hafner","year":"2019","journal-title":"arXiv:1912.01603"},{"key":"ref98","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"12","author":"Sutton"},{"key":"ref99","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mnih"},{"key":"ref100","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref101","article-title":"Playing Atari with deep reinforcement learning","author":"Mnih","year":"2013","journal-title":"arXiv:1312.5602"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974926"},{"key":"ref104","article-title":"Prioritized experience replay","author":"Schaul","year":"2015","journal-title":"arXiv:1511.05952"},{"key":"ref105","first-page":"387","article-title":"Deterministic policy gradient algorithms","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Silver"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3387168.3387199"},{"key":"ref107","first-page":"1889","article-title":"Trust region policy optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Schulman"},{"key":"ref108","first-page":"1861","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Haarnoja"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8285-7_11"},{"key":"ref110","article-title":"AWAC: Accelerating online reinforcement learning with offline datasets","author":"Nair","year":"2020","journal-title":"arXiv:2006.09359"},{"key":"ref111","article-title":"Sample efficient actor-critic with experience replay","author":"Wang","year":"2016","journal-title":"arXiv:1611.01224"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1609\/aiide.v4i1.18700"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTCC50638.2020.9259716"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872674"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.17775\/CSEEJPES.2019.00920"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/math8101640"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12397"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2957778"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3043109"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647714"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224023"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.010"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2872784"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685636"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.021113"},{"key":"ref129","article-title":"Toward deep supervised anomaly detection: Reinforcement learning from partially labeled anomaly data","author":"Pang","year":"2020","journal-title":"arXiv:2009.06847"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA48434.2019.8966795"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00086"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3360322.3361011"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013223"},{"key":"ref134","article-title":"Deep reinforcement learning for cyber system defense under dynamic adversarial uncertainties","author":"Dutta","year":"2023","journal-title":"arXiv:2302.01595"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.5220\/0011684500003393"},{"key":"ref136","article-title":"Distributed reinforcement learning for network intrusion response","author":"Malialis","year":"2014"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC55026.2022.9894298"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2018.8514971"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2861834"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841922"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"ref144","article-title":"Intelligent anti-jamming based on deep-reinforcement learning and transfer learning","author":"Janiar","year":"2023"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925694"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3212966"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2958-x"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422831"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2021.126379"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927946"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5301-8_54"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52988-8_7"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101968"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66626-2_4"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5919"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179231"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2826011"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.5220\/0006197105590566"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269092"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486877"},{"key":"ref163","article-title":"Learning to evade static PE machine learning malware models via reinforcement learning","author":"Anderson","year":"2018","journal-title":"arXiv:1801.08917"},{"key":"ref164","first-page":"364","article-title":"QFlip: An adaptive reinforcement learning strategy for the security game","volume-title":"Proc. Int. Conf. Decis. Game Theory Secur.","author":"Oakley"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2808475.2808482"},{"key":"ref166","article-title":"Autonomous penetration testing using reinforcement learning","author":"Schwartz","year":"2019","journal-title":"arXiv:1905.05965"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615542"},{"key":"ref168","article-title":"CybORG: An autonomous cyber operations research gym","author":"Baillie","year":"2020","journal-title":"arXiv:2002.10667"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91625-1_6"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659882"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/DS-RT50469.2020.9213690"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110426"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/eIT57321.2023.10187355"},{"issue":"3","key":"ref174","first-page":"1","article-title":"Study and analysis of chat gpt and its impact on different fields of study","volume":"8","author":"Kalla","year":"2023","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_33"},{"key":"ref176","article-title":"Generating secure hardware using ChatGPT resistant to CWEs","author":"Nair","year":"2023","journal-title":"Cryptol. ePrint Arch."},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/I3CS58314.2023.10127411"},{"key":"ref178","article-title":"Maximizing penetration testing success with effective reconnaissance techniques using ChatGPT","author":"Temara","year":"2023"},{"key":"ref179","volume-title":"From ChatGPT to HackGPT: Meeting Cybersecurity Threat Generative AI","author":"Renaud","year":"2023"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04124-5"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10403908.pdf?arnumber=10403908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:57:45Z","timestamp":1722362265000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10403908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":180,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3355547","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}