{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:20:58Z","timestamp":1760574058170,"version":"build-2065373602"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1109\/blackseacom65655.2025.11193960","type":"proceedings-article","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T17:38:34Z","timestamp":1760463514000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Large Language Models for Anomaly Detection with Cost-Efficient Sampling: A Generalized Framework"],"prefix":"10.1109","author":[{"given":"Duy Anh","family":"Pham","sequence":"first","affiliation":[{"name":"King&#x2019;s College London,Department of Informatics,London,UK"}]},{"given":"Ievgeniia","family":"Kuzminykh","sequence":"additional","affiliation":[{"name":"King&#x2019;s College London,London,UK"}]},{"given":"Andrii","family":"Astrakhantsev","sequence":"additional","affiliation":[{"name":"Igor Sikorsky Kyiv Polytechnic Institute,Kyiv,Ukraine"}]},{"given":"Bogdan","family":"Ghita","sequence":"additional","affiliation":[{"name":"University of Plymouth,School of Engineering, Computing, and Mathematics,Plymouth,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref2","article-title":"Language models are few-shot learners","volume-title":"Advances in Neural Information Processing Systems","author":"Brown","year":"2020"},{"article-title":"Llama: Open and efficient foundation language models","year":"2023","author":"Touvron","key":"ref3"},{"key":"ref4","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP)","author":"Sharafaldin"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"article-title":"Kdd cup 1999 data","year":"1999","author":"Heckerman","key":"ref7"},{"article-title":"Application of convolutional neural network to intrusion type recognition","volume-title":"Proceedings of the 2017 International Workshop on Big Data and Information Security","author":"Upadhyay","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65726-0_21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3389096"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/CISDA.2009.5356528","article-title":"A Detailed Analysis of the KDD CUP 99 Data Set","volume-title":"Second IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","author":"Tavallaee"},{"article-title":"CSE-CIC-IDS2018 dataset","year":"2018","author":"for Cybersecurity","key":"ref13"},{"article-title":"Large language models for forecasting and anomaly detection: A systematic literature review","year":"2024","author":"Su","key":"ref14"},{"issue":"1","key":"ref15","first-page":"3344","article-title":"Efficient anomaly detection in tabular cybersecurity data using large language models","volume-title":"Scientific Reports","volume":"15","author":"Zhao","year":"2025"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/BigData62323.2024.10825679","article-title":"Aad-llm: Adaptive anomaly detection using large language models","author":"Russell-Gilbert","year":"2024"},{"key":"ref17","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","volume-title":"2015 Military Communications and Information Systems Conference (MilCIS)","author":"Moustafa"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.5220\/0010774000003120","article-title":"Network intrusion detection: A comprehensive analysis of cic-ids2017","volume-title":"International Conference on Information Systems Security and Privacy","author":"Rosay"},{"key":"ref19","first-page":"8026","article-title":"Pytorch: an imperative style, high-performance deep learning library","volume-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems","author":"Paszke"}],"event":{"name":"2025 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","start":{"date-parts":[[2025,6,23]]},"location":"Chisinau, Moldova, Republic of","end":{"date-parts":[[2025,6,26]]}},"container-title":["2025 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11193888\/11193890\/11193960.pdf?arnumber=11193960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T06:03:50Z","timestamp":1760508230000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11193960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/blackseacom65655.2025.11193960","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]}}}