{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:49:18Z","timestamp":1772725758992,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/bigdata59044.2023.10386976","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:47Z","timestamp":1705948127000},"page":"3590-3599","source":"Crossref","is-referenced-by-count":16,"title":["Transformer-based LLMs in Cybersecurity: An in-depth Study on Log Anomaly Detection and Conversational Defense Mechanisms"],"prefix":"10.1109","author":[{"given":"Prasasthy","family":"Balasubramanian","sequence":"first","affiliation":[{"name":"University of Oulu,Center for Ubiquitous Computing"}]},{"given":"Justin","family":"Seby","sequence":"additional","affiliation":[{"name":"University of Oulu,Biomimetics and Intelligent Systems Group"}]},{"given":"Panos","family":"Kostakos","sequence":"additional","affiliation":[{"name":"University of Oulu,Center for Ubiquitous Computing"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21928\/uhdjst.v6n2y2022.pp77-84"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.43"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IS48319.2020.9199976"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322600"},{"key":"ref5","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv preprint arXiv:1810.04805"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138871"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref8","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"He","year":"2020","journal-title":"arXiv preprint arXiv:2008.06448"},{"key":"ref9","article-title":"Albert: A lite bert for self-supervised learning of language representations","author":"Lan","year":"2019","journal-title":"arXiv preprint arXiv:1909.11942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.009"},{"key":"ref11","article-title":"DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter","author":"Sanh","year":"2019","journal-title":"arXiv preprint arXiv:1910.01108"},{"key":"ref12","article-title":"On the power of special-purpose GPT models to create and evaluate new poetry in old styles","author":"Sawicki","year":"2023"},{"key":"ref13","first-page":"2582","article-title":"IoT Dynamic Log File Analysis: Security Approach for Anomaly Detection In Multi Sensor Environment","volume":"3","author":"Saxena","year":"2021","journal-title":"International research journal of modernization in engineering technology & Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3492723"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795458"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.12726\/table-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.79"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"}],"event":{"name":"2023 IEEE International Conference on Big Data (BigData)","location":"Sorrento, Italy","start":{"date-parts":[[2023,12,15]]},"end":{"date-parts":[[2023,12,18]]}},"container-title":["2023 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385234\/10386078\/10386976.pdf?arnumber=10386976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:29:06Z","timestamp":1706754546000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/bigdata59044.2023.10386976","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]}}}