{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:27Z","timestamp":1756273227228,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130010","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"267-274","source":"Crossref","is-referenced-by-count":0,"title":["RuleXploit: A Framework for Generating Suricata Rules from Exploits Using Generative AI"],"prefix":"10.1109","author":[{"given":"Angelos","family":"Papoutsis","sequence":"first","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Athanasios","family":"Dimitriadis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Ilias","family":"Koritsas","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Dimitrios","family":"Kavallieros","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH,Thessaloniki,Greece"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1186\/s42400-019-0038-7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/IDEA49133.2020.9170674"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TR.2021.3061297"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3664476.3670902"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2021.3129336"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3643794.3648281"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.7717\/peerj-cs.900"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.jisa.2024.103736"},{"year":"2024","journal-title":"Openai.com","article-title":"Hello gpt-4o","key":"ref9"},{"key":"ref10","article-title":"Gpt-4 technical report","volume-title":"arXiv preprint arXiv:2303.08774","author":"Achiam","year":"2023"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/app14052074"},{"volume-title":"NVD-General \u2014 nvd.nist.gov","year":"2024","key":"ref12"},{"volume-title":"National Vulnerability Database-cve-2023-28432","year":"2024","key":"ref13"},{"volume-title":"Exploit database website","year":"2024","author":"Database","key":"ref14"},{"volume-title":"vulhub-minio information disclosure in cluster deployment (cve-2023-28432)","year":"2024","key":"ref15"},{"volume-title":"vulhub-minio information disclosure in cluster deployment (cve-2023-28432)","year":"2024","key":"ref16"},{"volume-title":"Suricata User Guide 2014; Suricata 8.0.0-dev documentation \u2014 docs.suricata.io","year":"2024","key":"ref17"},{"key":"ref18","article-title":"Challenges and applications of large language models","author":"Kaddour","year":"2023","journal-title":"arXiv preprint arXiv:2307.10169"},{"key":"ref19","article-title":"Language models are few-shot learners","author":"Brown","year":"2020","journal-title":"arXiv preprint arXiv:2005.14165"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1609\/aaai.v38i1.27798"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.54654\/isj.v2i14.203"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.54692\/lgurjcsit.2020.0403100"},{"year":"2024","journal-title":"platform.openai.com","article-title":"Openai api","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-1-4842-4501-9_23"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130010.pdf?arnumber=11130010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:15:44Z","timestamp":1756271744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130010","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}