{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:39:38Z","timestamp":1772933978050,"version":"3.50.1"},"reference-count":91,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402639","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"4333-4342","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Large Language Models (LLMs) for Cybersecurity: Opportunities and Directions"],"prefix":"10.1109","author":[{"given":"Md Abdur","family":"Rahman","sequence":"first","affiliation":[{"name":"University of West Florida,Dept. of Intelligent Systems and Robotics,Pensacola,FL,United States"}]},{"given":"Guillermo","family":"Francia","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, University of West Florida,Pensacola,FL,United States"}]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, University of West Florida,Pensacola,FL,United States"}]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[{"name":"iDEA Lab University of Calabria,Rende,Italy"}]},{"given":"Atef","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Georgia Southern University,GA,United States"}]},{"given":"Muhammad Umair","family":"Khan","sequence":"additional","affiliation":[{"name":"Alfaisal University,Software Engineering Department,Riyadh,Kingdom of Saudi Arabia"}]},{"given":"Sheikh Iqbal","family":"Ahamed","sequence":"additional","affiliation":[{"name":"Marquette University,Department of Computer Science,WI,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102385"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3071753"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2025.3570202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2023.3340744"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.03.060"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3151462"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.21742\/IJSH.2020.14.2.02"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT60459.2023.10441030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HONET59747.2023.10374747"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65522-7_40"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00280"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC61105.2024.00144"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112663"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0109-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011079199"},{"key":"ref19","first-page":"6","article-title":"A signature-based intrusion detection system for the internet of things","author":"Ioulianou","year":"2018","journal-title":"Information and Communication Technology Form"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2019.00038"},{"key":"ref22","article-title":"Neural machine translation by jointly learning to align and translate","author":"Bahdanau","year":"2014","journal-title":"arXiv preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref24","first-page":"4171","article-title":"Bert: Pretraining of deep bidirectional transformers for language understanding","volume-title":"Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, volume 1 (long and short papers)","author":"Devlin"},{"key":"ref25","author":"Radford","year":"2018","journal-title":"Improving language understanding by generative pre-training"},{"key":"ref26","article-title":"Llama: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102638"},{"key":"ref28","author":"Moskal","year":"2023","journal-title":"LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3617555.3617874"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"ref31","author":"Meng","year":"2023","journal-title":"Unlocking Hardware Security Assurance: The Potential of LLMs"},{"key":"ref32","author":"Labonne","year":"2023","journal-title":"Spam-T5: Benchmarking Large Language Models for Few-Shot Email Spam Detection"},{"key":"ref33","author":"Malul","year":"2024","journal-title":"GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128089"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301609"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/JSC.2023.0003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa56895.2022.10017800"},{"key":"ref39","author":"Ali","year":"2023","journal-title":"HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34433-6_10"},{"key":"ref41","author":"Aghaei","year":"2023","journal-title":"CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627196"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102638"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.472"},{"key":"ref46","author":"Bubeck","year":"2023","journal-title":"Sparks of Artificial General Intelligence: Early experiments with GPT-4"},{"key":"ref47","volume-title":"National vulnerability database","author":"Anon","year":"2022"},{"key":"ref48","author":"Chen","year":"2023","journal-title":"VulLibGen: Identifying Vulnerable Third-Party Libraries via Generative Pre-Trained Model"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607242"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/spw59333.2023.00027"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3664649"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623907"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CAI64502.2025.00173"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680397"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC65507.2025.00135"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/spw59333.2023.00027"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn52387.2021.9534192"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3375882"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3483905"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp53844.2022.00009"},{"key":"ref61","author":"Labonne","year":"2023","journal-title":"Spam-T5: Benchmarking Large Language Models for Few-Shot Email Spam Detection"},{"key":"ref62","author":"Cambiaso","year":"2023","journal-title":"Scamming the Scammers: Using ChatGPT to Reply Mails for Wasting Time and Resources"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC65507.2025.00134"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/AIBThings63359.2024.10863664"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/AIBThings66987.2025.11296217"},{"key":"ref66","author":"Rahman","journal-title":"SMOTEBERT: A Novel Transformer-based Approach to Handle Imbalanced Numerical Features for Improved Dynamic Analysis"},{"key":"ref67","author":"Rahman","year":"2025","journal-title":"A Explainable Artificial Intelligence Approach for Improved Dynamic Analysis with SHAP and LIME"},{"key":"ref68","author":"Rahman","year":"2025","journal-title":"Explaining Network Intrusion Detection System with SHAP and LIME"},{"key":"ref69","article-title":"Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey","author":"Tian","year":"2025","journal-title":"arXiv preprint"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671498"},{"key":"ref71","article-title":"Secqa: A concise question-answering dataset for evaluating large language models in computer security","author":"Liu","year":"2023","journal-title":"arXiv preprint"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679494"},{"key":"ref73","article-title":"Cyberbench: A multi-task benchmark for evaluating large language models in cybersecurity","volume-title":"AAAI-24 Workshop on Artificial Intelligence for Cyber Security (AICS)","author":"Liu"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00019"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00076"},{"key":"ref76","article-title":"Time for action: Automated analysis of cyber threat intelligence in the wild","author":"Siracusano","year":"2023","journal-title":"arXiv preprint"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223647"},{"issue":"01","key":"ref78","first-page":"84","article-title":"Enhancing Cyber Security: Comparing the Accuracy of the BERT Model with Other Common Deep Learning Models in Identifying Email Spam","volume":"4","author":"Xu","year":"2025","journal-title":"Advances in Engineering and Intelligence Systems"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT64582.2025.00017"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2024.056473"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/acit62805.2024.10877264"},{"issue":"10","key":"ref82","article-title":"Identification And Classification of Phishing Emails Based on Machine Learning Techniques To Improvise Cyber security","volume":"10","author":"Gopalsamy","year":"2024","journal-title":"IJSART"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-3180-0_40"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-10010-9"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568869"},{"key":"ref86","first-page":"35","article-title":"Modeling Adaptive Hypermedia with an Object-Oriented Approach and XML","author":"Cannataro","year":"2002","journal-title":"WebDyn@ WWW"},{"key":"ref87","first-page":"50","article-title":"A Probabilistic Approach to Model Adaptive Hypermedia Systems","author":"Cannataro","year":"2001","journal-title":"WebDyn@ ICDT"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-008-0065-4"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2003.1193935"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/s23208499"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.70470\/SHIFRA\/2024\/001"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402639.pdf?arnumber=11402639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:56:42Z","timestamp":1772866602000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402639","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}