{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:50Z","timestamp":1774541690375,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1109\/iccma63715.2024.10843938","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:41:59Z","timestamp":1737398519000},"page":"272-279","source":"Crossref","is-referenced-by-count":12,"title":["Generative AI for Cyber Threat Simulation and Defense"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Vadisetty","sequence":"first","affiliation":[{"name":"Wayne State University,Electrical Engineering,Detroit,USA"}]},{"given":"Anand","family":"Polamarasetti","sequence":"additional","affiliation":[{"name":"Anandra University,ComputerScience,Visakhapatnam,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT61202.2024.10489766"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54497-2_5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3385107"},{"key":"ref4","author":"Yigit","year":"2024","journal-title":"Review of generative AI methods in cybersecurity"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmat.2023.05.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.30574\/ijsra.2024.11.1.0313"},{"key":"ref7","author":"Yigit","year":"2024","journal-title":"Critical infrastructure protection: Generative AI, challenges, and opportunities"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"ref9","volume-title":"Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE | IEEE Journals & Magazine | IEEE Xplore","author":"Liu","year":"2022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05073-x"},{"key":"ref11","first-page":"35","article-title":"Enhancing Cyber Security Enhancement Through Generative AI","volume":"9","author":"Krishnamurthy","year":"2023","journal-title":"International Journal of Universal Science and Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11098-024-02259-8"},{"key":"ref13","author":"Nahmias","year":"2024","journal-title":"Prompted contextual vectors for spear-phishing detection"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7872-4_20"},{"key":"ref15","author":"Bethany","year":"2024","journal-title":"Large language model lateral spear phishing: A comparative study in large-scale organizational settings"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679510"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25759-9_18"},{"key":"ref18","first-page":"129","article-title":"Insider threat detection using deep autoencoder and variational autoencoder neural networks","volume-title":"2021 IEEE International Conference on Cyber security and resilience (CSR)","author":"Pantelidis"},{"key":"ref19","first-page":"01","article-title":"Variational Autoencoders using Convolutional neural network for highly advanced cyber threats","volume-title":"2024 IEEE Integrated STEM Education Conference (ISEC)","author":"Durai pandian"},{"issue":"11","key":"ref20","first-page":"2528","article-title":"Improving the classification effectiveness of intrusion detection using an improved conditional variational autoencoder and deep neural network","volume-title":"Sensors","volume":"19","author":"Yang","year":"2019"},{"key":"ref21","volume-title":"The Role and Applications of Airport Digital Twin in Cyberattack Protection during the Generative AI Era","author":"Weinberg","year":"2024"},{"key":"ref22","first-page":"64428","article-title":"From ChatGPT to HackGPT: Meeting the cybersecurity threat of generative AI","volume-title":"MIT Sloan Management Review","author":"Renaud","year":"2023"},{"key":"ref23","first-page":"97","article-title":"Cybersecurity issues in generative AI","volume-title":"2023 International Conference on Platform Technology and Service (PlatCon)","author":"Oh"},{"key":"ref24","first-page":"77","article-title":"Generative AI in Network Security and Intrusion Detection","volume-title":"Reshaping CyberSecurity With Generative AI Techniques","author":"Sindiramutty","year":"2025"},{"issue":"3","key":"ref25","first-page":"703","article-title":"Cybersecurity challenges in the age of AI: theoretical approaches and practical solutions","volume-title":"Computer Science & IT Research Journal","volume":"5","author":"Familoni","year":"2024"},{"issue":"12","key":"ref26","first-page":"25","article-title":"AI-driven threat detection and response: A paradigm shift in cybersecurity","volume-title":"International Journal of Information and Cybersecurity","volume":"7","author":"Yaseen","year":"2023"},{"key":"ref27","first-page":"332","article-title":"AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction","volume-title":"Nanotechnology Perceptions","author":"Prince","year":"2024"},{"issue":"3","key":"ref28","first-page":"35","article-title":"AI-driven solutions for cybersecurity: comparative analysis and ethical aspects","volume-title":"Romanian Journal of Information Technology and Automatic Control","volume":"34","author":"DINU","year":"2024"}],"event":{"name":"2024 12th International Conference on Control, Mechatronics and Automation (ICCMA)","location":"London, United Kingdom","start":{"date-parts":[[2024,11,11]]},"end":{"date-parts":[[2024,11,13]]}},"container-title":["2024 12th International Conference on Control, Mechatronics and Automation (ICCMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10843870\/10843809\/10843938.pdf?arnumber=10843938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:57:21Z","timestamp":1737442641000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10843938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iccma63715.2024.10843938","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]}}}