{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:10:33Z","timestamp":1778346633250,"version":"3.51.4"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3659205","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T20:45:19Z","timestamp":1770065119000},"page":"18595-18610","source":"Crossref","is-referenced-by-count":1,"title":["ChatNVD: Advancing Cybersecurity Vulnerability Assessment With Large Language Models"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4001-5610","authenticated-orcid":false,"given":"Shivansh","family":"Chopra","sequence":"first","affiliation":[{"name":"The University of Adelaide, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-7587","authenticated-orcid":false,"given":"Hussain","family":"Ahmad","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8212-8793","authenticated-orcid":false,"given":"Diksha","family":"Goel","sequence":"additional","affiliation":[{"name":"CSIRO&#x2019;s Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2501-1155","authenticated-orcid":false,"given":"Claudia","family":"Szabo","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, SA, Australia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Impacts and risk of generative AI technology on cyber defense","author":"Neupane","year":"2023","journal-title":"arXiv:2306.13033"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36336-8_83"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.13370"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-023-12146-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.nlp4convai-1.11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.231"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3624822"},{"key":"ref8","article-title":"3S-trader: A multi-LLM framework for adaptive stock scoring, strategy, and selection in portfolio optimization","author":"Chen","year":"2025","journal-title":"arXiv:2510.17393"},{"key":"ref9","article-title":"Automating customer service using LangChain: Building custom open-source GPT chatbot for organizations","author":"Pandya","year":"2023","journal-title":"arXiv:2310.05421"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2023.2281663"},{"key":"ref11","article-title":"Evaluating ChatGPT as an adjunct for radiologic decision-making","author":"Rao","year":"2023","journal-title":"MedRxiv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.acra.2023.08.020"},{"key":"ref13","article-title":"CPLLM: Clinical prediction with large language models","author":"Ben Shoham","year":"2023","journal-title":"arXiv:2309.11295"},{"key":"ref14","article-title":"\u2018I think this is the most disruptive technology\u2019: Exploring sentiments of ChatGPT early adopters using Twitter data","author":"Ul Haque","year":"2022","journal-title":"arXiv:2212.05856"},{"key":"ref15","article-title":"Co-evolutionary defence of active directory attack graphs via GNN-approximated dynamic programming","author":"Goel","year":"2025","journal-title":"arXiv:2505.11710"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9780429424878-10"},{"key":"ref17","article-title":"A survey of large language models in cybersecurity","author":"de Jesus Coelho da Silva","year":"2024","journal-title":"arXiv:2402.16968"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3481374"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.54060\/a2zjournals.jase.42"},{"key":"ref20","article-title":"Towards deep learning enabled cybersecurity risk assessment for microservice architectures","author":"Abdulsatar","year":"2024","journal-title":"arXiv:2403.15169"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1365\/s43439-023-00100-2"},{"key":"ref22","article-title":"Enhancing network resilience through machine learning-powered graph combinatorial optimization: Applications in cyber defense and information diffusion","author":"Goel","year":"2023","journal-title":"arXiv:2310.10667"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70879-4_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.60087\/jaigs.vol03.issue01.p234"},{"key":"ref25","volume-title":"The global risks report 2021 16th edition","author":"McLennan","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.11.007"},{"key":"ref27","article-title":"Automated software vulnerability detection with machine learning","author":"Harer","year":"2018","journal-title":"arXiv:1803.04497"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.020598"},{"key":"ref29","volume-title":"GPT-4 Turbo: Advancing Cost-Efficient Intelligence","year":"2024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73143-3_16"},{"key":"ref31","article-title":"GPT-4 vs. GPT-3.5: A concise showdown","author":"Koubaa","year":"2023"},{"key":"ref32","article-title":"An in-depth look at Gemini\u2019s language abilities","author":"Akter","year":"2023","journal-title":"arXiv:2312.11444"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365742"},{"key":"ref34","article-title":"Large language models: A comprehensive survey of its applications, challenges, limitations, and future prospects","author":"Hadi","year":"2023","journal-title":"Authorea Preprints"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3641289"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.021430"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-024-04778-y"},{"key":"ref39","article-title":"Large language models in cybersecurity: Digital defense and ethical challenge","author":"Cimmino","year":"2024","journal-title":"Authorea Preprints"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095111"},{"key":"ref41","volume-title":"GPT-4o mini technical overview","year":"2024"},{"issue":"2","key":"ref42","first-page":"123","article-title":"The foundation model landscape 2024: Capabilities, risks, and governance","volume":"17","author":"Bommasani","year":"2024","journal-title":"Found. Trends Mach. Learn."},{"key":"ref43","article-title":"Measuring massive multitask language understanding","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Hendrycks"},{"key":"ref44","article-title":"Training verifiers to solve math word problems","author":"Cobbe","year":"2021","journal-title":"arXiv:2110.14168"},{"key":"ref45","volume-title":"Openai evals","year":"2024"},{"key":"ref46","volume-title":"Openai safety and alignment practices","year":"2024"},{"key":"ref47","volume-title":"Openai api pricing","year":"2024"},{"key":"ref48","article-title":"ChatGPT vs. bard: A comparative study","author":"Ahmed","year":"2023","journal-title":"Authorea Preprints"},{"key":"ref49","article-title":"Llama 3 model card","author":"Grattafiori","year":"2024"},{"key":"ref50","volume-title":"Gemini 1.5 pro model card","year":"2024"},{"key":"ref51","volume-title":"Gemini technical overview","year":"2024"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.52202\/079017-0491"},{"key":"ref53","volume-title":"Compute requirements for gemini models","year":"2024"},{"key":"ref54","first-page":"29","article-title":"Using TF-IDF to determine word relevance in document queries","volume-title":"Proc. 1st Instructional Conf. Mach. Learn.","volume":"242","author":"Ramos"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.066"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.05.008"},{"key":"ref57","article-title":"Language models are few-shot learners","author":"Brown","year":"2020","journal-title":"arXiv:2005.14165"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123247"},{"key":"ref59","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"key":"ref60","article-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023","journal-title":"arXiv:2307.09288"},{"key":"ref61","article-title":"Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context","author":"Team","year":"2024","journal-title":"arXiv:2403.05530"},{"key":"ref62","article-title":"CultureLLM: Incorporating cultural differences into large language models","author":"Li","year":"2024","journal-title":"arXiv:2402.10946"},{"key":"ref63","article-title":"Learning to compute word embeddings on the fly","author":"Bahdanau","year":"2017","journal-title":"arXiv:1706.00286"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3652594"},{"key":"ref67","volume-title":"Seceval: A Comprehensive Benchmark for Evaluating Cybersecurity Knowledge of Foundation Models","author":"Li","year":"2023"},{"key":"ref68","volume-title":"GPT-4o Mini: Advancing Cost-Efficient Intelligence","year":"2024"},{"key":"ref69","article-title":"How well it works: Benchmarking performance of gpt models on medical natural language processing tasks","author":"Rough","year":"2024","journal-title":"medRxiv"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9178-8"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1245-5"},{"key":"ref72","volume-title":"React.js Essentials","author":"Fedosejev","year":"2015"},{"key":"ref73","article-title":"Self-consistency improves chain of thought reasoning in language models","author":"Wang","year":"2022","journal-title":"arXiv:2203.11171"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.229"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-4927672\/v1","article-title":"Comparing pruned llama 3 and llama 2 models for on-device AI assistants","author":"Liu","year":"2024"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3571730"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00638"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11369932.pdf?arnumber=11369932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T06:04:41Z","timestamp":1770703481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11369932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3659205","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}