{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:12:21Z","timestamp":1776834741322,"version":"3.51.2"},"reference-count":167,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>Large Language Models (LLMs) have emerged as powerful tools in cyber security, enabling automation, threat detection, and adaptive learning. Their ability to process unstructured data and generate context-aware outputs supports both operational tasks and educational initiatives. Despite their growing adoption, current research often focuses on isolated applications, lacking a systematic understanding of how LLMs align with domain-specific requirements and pedagogical effectiveness. This highlights a pressing need for comprehensive evaluations that address the challenges of integration, generalization, and ethical deployment in both operational and educational cyber security environments. Therefore, this paper provides a comprehensive and State-of-the-Art review of the significant role of LLMs in cyber security, addressing both operational and educational dimensions. It introduces a holistic framework that categorizes LLM applications into six key cyber security domains, examining each in depth to demonstrate their impact on automation, context-aware reasoning, and adaptability to emerging threats. The paper highlights the potential of LLMs to enhance operational performance and educational effectiveness while also exploring emerging technical, ethical, and security challenges. The paper also uniquely addresses the underexamined area of LLMs in cyber security education by reviewing recent studies and illustrating how these models support personalized learning, hands-on training, and awareness initiatives. The key findings reveal that while LLMs offer significant potential in automating tasks and enabling personalized learning, challenges remain in model generalization, ethical deployment, and production readiness. Finally, the paper discusses open issues and future research directions for the application of LLMs in both operational and educational contexts. This paper serves as a valuable reference for researchers, educators, and practitioners aiming to develop intelligent, adaptive, scalable, and ethically responsible LLM-based cyber security solutions.<\/jats:p>","DOI":"10.3390\/bdcc9070184","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T02:25:53Z","timestamp":1751941553000},"page":"184","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["LLMs in Cyber Security: Bridging Practice and Education"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4142-6377","authenticated-orcid":false,"given":"Hany F.","family":"Atlam","sequence":"first","affiliation":[{"name":"Cyber Security Centre, WMG, University of Warwick, Coventry CV4 7AL, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Scanlon, M., Breitinger, F., Hargreaves, C., Hilgert, J.-N., and Sheppard, J. (2023). ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown. arXiv.","DOI":"10.20944\/preprints202307.0766.v1"},{"key":"ref_2","first-page":"139","article-title":"Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis","volume":"Volume 15397","author":"Kouliaridis","year":"2025","journal-title":"Attacks and Defenses for the Internet-of-Things"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Jin, J., Tang, B., Ma, M., Liu, X., Wang, Y., Lai, Q., Yang, J., and Zhou, C. (2024). Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models. arXiv.","DOI":"10.1109\/ICCBD-AI65562.2024.00011"},{"key":"ref_4","first-page":"100063","article-title":"The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review","volume":"8","author":"Jada","year":"2024","journal-title":"Data Inf. Manag."},{"key":"ref_5","unstructured":"Gandhi, P.A., Wudali, P.N., Amaru, Y., Elovici, Y., and Shabtai, A. (2025). SHIELD: APT Detection and Intelligent Explanation Using LLM. arXiv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Shafee, S., Bessani, A., and Ferreira, P.M. (2024). Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness. arXiv.","DOI":"10.2139\/ssrn.4703135"},{"key":"ref_7","unstructured":"Sheng, Z., Chen, Z., Gu, S., Huang, H., Gu, G., and Huang, J. (2025). LLMs in Software Security: A Survey of Vulnerability Detection Techniques and Insights. arXiv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"143806","DOI":"10.1109\/ACCESS.2024.3468914","article-title":"Applications of LLMs for Generating Cyber Security Exercise Scenarios","volume":"12","author":"Hashmi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_9","unstructured":"Agrawal, G. (2023, January 27\u201329). AISecKG: Knowledge Graph Dataset for Cybersecurity Education. Proceedings of the AAAI-MAKE 2023: Challenges Requiring the Combination of Machine Learning 2023, San Francisco, CA, USA. Available online: https:\/\/par.nsf.gov\/biblio\/10401616-aiseckg-knowledge-graph-dataset-cybersecurity-education."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/s10462-024-10888-y","article-title":"Large language models (LLMs): Survey, technical frameworks, and future challenges","volume":"57","author":"Kumar","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100211","DOI":"10.1016\/j.hcc.2024.100211","article-title":"A survey on large language model (LLM) security and privacy: The Good, The Bad, and The Ugly","volume":"4","author":"Yao","year":"2024","journal-title":"High-Confid. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"26839","DOI":"10.1109\/ACCESS.2024.3365742","article-title":"A Review on Large Language Models: Architectures, Applications, Taxonomies, Open Issues and Challenges","volume":"12","author":"Raiaan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Naveed, H., Khan, A.U., Qiu, S., Saqib, M., Anwar, S., Usman, M., Akhtar, N., Barnes, N., and Mian, A. (2024). A Comprehensive Overview of Large Language Models. arXiv.","DOI":"10.1145\/3744746"},{"key":"ref_14","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L., and Polosukhin, I. (2023). Attention Is All You Need. arXiv."},{"key":"ref_15","unstructured":"Schmid, L., Hey, T., Armbruster, M., Corallo, S., Fuch\u00df, D., Keim, J., Liu, H., and Koziolek, A. (2025). Software Architecture Meets LLMs: A Systematic Literature Review. arXiv."},{"key":"ref_16","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K. (2019). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv."},{"key":"ref_17","unstructured":"Fedus, W., Zoph, B., and Shazeer, N. (2021). Switch Transformers: Scaling to Trillion Parameter Models with Simple and Efficient Sparsity. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3641289","article-title":"A Survey on Evaluation of Large Language Models","volume":"15","author":"Chang","year":"2024","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_19","unstructured":"Brown, T.B., Mann, B., Ryder, N., Subbiah, M., Kaplan, J., Dhariwal, P., Neelakantan, A., Shyam, P., Sastry, G., and Askell, A. (2020). Language Models are Few-Shot Learners. arXiv."},{"key":"ref_20","unstructured":"Shoeybi, M., Patwary, M., Puri, R., LeGresley, P., Casper, J., and Catanzaro, B. (2020). Megatron-LM: Training Multi-Billion Parameter Language Models Using Model Parallelism. arXiv."},{"key":"ref_21","unstructured":"Sahami, M., Dumais, S., Heckerman, D., and Horvitz, E. (2025, April 22). A Bayesian Approach to Filtering Junk Email. AAAI Technical Report; 1998; pp. 55\u201362. Available online: https:\/\/aaai.org\/papers\/055-ws98-05-009\/."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Roli, F., and Vitulano, S. (2005). Learning Intrusion Detection: Supervised or Unsupervised?. Image Analysis and Processing\u2014ICIAP 2005, Springer.","DOI":"10.1007\/11553595"},{"key":"ref_23","unstructured":"Barbar\u00e1, D., and Jajodia, S. (2002). A Geometric Framework for Unsupervised Anomaly Detection, Springer US."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","article-title":"A novel hybrid intrusion detection method integrating anomaly detection with misuse detection","volume":"41","author":"Kim","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Saxe, J., and Berlin, K. (2015, January 20\u201322). Deep neural network based malware detection using two dimensional binary program features. Proceedings of the 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA.","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: Ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_27","unstructured":"Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., and Nicholas, C. (2017). Malware Detection by Eating a Whole EXE. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","article-title":"Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset","volume":"18","author":"Kolias","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sommer, R., and Paxson, V. (2010, January 16\u201319). Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2010.25"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges","volume":"28","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_31","unstructured":"Liu, X., Yu, Z., Zhang, Y., Zhang, N., and Xiao, C. (2024). Automatic and Universal Prompt Injection Attacks against Large Language Models. arXiv."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Uddin, M.A., and Sarker, I.H. (2024). An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach. arXiv.","DOI":"10.2139\/ssrn.4785953"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"100300","DOI":"10.1016\/j.hcc.2025.100300","article-title":"On protecting the data privacy of Large Language Models (LLMs) and LLM agents: A literature review","volume":"5","author":"Yan","year":"2025","journal-title":"High-Confid. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.30574\/gscarr.2024.21.2.0408","article-title":"Leveraging Generative Artificial Intelligence (AI) for cybersecurity: Analyzing diffusion models in detecting and mitigating cyber threats","volume":"21","author":"Akinyele","year":"2024","journal-title":"GSC Adv. Res. Rev."},{"key":"ref_35","first-page":"100066","article-title":"Generative AI: A systematic review using topic modelling techniques","volume":"8","author":"Gupta","year":"2024","journal-title":"Data Inf. Manag."},{"key":"ref_36","unstructured":"European Commission (2025, April 20). Proposal for a Regulation Laying Down Harmonised Rules on Artificial Intelligence|Shaping Europe\u2019s Digital Future. Available online: https:\/\/digital-strategy.ec.europa.eu\/en\/library\/proposal-regulation-laying-down-harmonised-rules-artificial-intelligence."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Noever, D. (2023). Can Large Language Models Find And Fix Vulnerable Software?. arXiv.","DOI":"10.5121\/ijaia.2023.14301"},{"key":"ref_38","unstructured":"Nahmias, D., Engelberg, G., Klein, D., and Shabtai, A. (2024). Prompted Contextual Vectors for Spear-Phishing Detection. arXiv."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"FSE041","DOI":"10.1145\/3715758","article-title":"Large Language Models for In-File Vulnerability Localization Can Be \u201cLost in the End\u201d","volume":"2","author":"Sovrano","year":"2025","journal-title":"Proc. ACM Softw. Eng."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Isozaki, I., Shrestha, M., Console, R., and Kim, E. (2025). Towards Automated Penetration Testing: Introducing LLM Benchmark, Analysis, and Improvements. arXiv.","DOI":"10.1145\/3708319.3733804"},{"key":"ref_41","unstructured":"Happe, A., Kaplan, A., and Cito, J. (2025). LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks. arXiv."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhang, C., Liu, H., Zeng, J., Yang, K., Li, Y., and Li, H. (2024, January 14\u201320). Prompt-Enhanced Software Vulnerability Detection Using ChatGPT. Proceedings of the 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings, Lisbon, Portugal.","DOI":"10.1145\/3639478.3643065"},{"key":"ref_43","unstructured":"Zhou, X., Cao, S., Sun, X., and Lo, D. (2024). Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. arXiv."},{"key":"ref_44","unstructured":"Zhou, X., Tran, D.-M., Le-Cong, T., Zhang, T., Irsan, I.C., Sumarlin, J., Le, B., and Lo, D. (2024). Comparison of Static Application Security Testing Tools and Large Language Models for Repo-level Vulnerability Detection. arXiv."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"29698","DOI":"10.1109\/ACCESS.2025.3541146","article-title":"Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study","volume":"13","author":"Tamberg","year":"2025","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Mahyari, A.A. (2024). Harnessing the Power of LLMs in Source Code Vulnerability Detection. arXiv.","DOI":"10.1109\/MILCOM61039.2024.10774025"},{"key":"ref_47","unstructured":"Mao, Q., Li, Z., Hu, X., Liu, K., Xia, X., and Sun, J. (2025). Towards Explainable Vulnerability Detection with Large Language Models. arXiv."},{"key":"ref_48","unstructured":"Cheshkov, A., Zadorozhny, P., and Levichev, R. (2023). Evaluation of ChatGPT Model for Vulnerability Detection. arXiv."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Purba, M.D., Ghosh, A., Radford, B.J., and Chu, B. (2023, January 9\u201312). Software Vulnerability Detection using Large Language Models. Proceedings of the 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW), Florence, Italy.","DOI":"10.1109\/ISSREW60843.2023.00058"},{"key":"ref_50","unstructured":"Dozono, K., Gasiba, T.E., and Stocco, A. (2024). Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study. arXiv."},{"key":"ref_51","unstructured":"Berabi, B., Gronskiy, A., Raychev, V., Sivanrupan, G., Chibotaru, V., and Vechev, M. (2024). DeepCode AI Fix: Fixing Security Vulnerabilities with Large Language Models. arXiv."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Sheng, Z., Wu, F., Zuo, X., Li, C., Qiao, Y., and Hang, L. (2024). LProtector: An LLM-driven Vulnerability Detection System. arXiv.","DOI":"10.1109\/ICDSCA63855.2024.10859408"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Khare, A., Dutta, S., Li, Z., Solko-Breslin, A., Alur, R., and Naik, M. (2024). Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities. arXiv.","DOI":"10.1109\/ICST62969.2025.10988968"},{"key":"ref_54","unstructured":"Jensen, R.I.T., Tawosi, V., and Alamir, S. (2024). Software Vulnerability and Functionality Assessment using LLMs. arXiv."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Shestov, A., Levichev, R., Mussabayev, R., Maslov, E., Cheshkov, A., and Zadorozhny, P. (2024). Finetuning Large Language Models for Vulnerability Detection. arXiv.","DOI":"10.1109\/ACCESS.2025.3546700"},{"key":"ref_56","unstructured":"Li, H., Hao, Y., Zhai, Y., and Qian, Z. (2023). The Hitchhiker\u2019s Guide to Program Analysis: A Journey with Large Language Models. arXiv."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Guo, Y., Patsakis, C., Hu, Q., Tang, Q., and Casino, F. (2024). Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. Computer Security\u2014ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, 16\u201320 September 2024, Proceedings, Part I, Springer.","DOI":"10.1007\/978-3-031-70879-4_14"},{"key":"ref_58","unstructured":"Wang, J., Huang, Z., Liu, H., Yang, N., and Xiao, Y. (2023). DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism. arXiv."},{"key":"ref_59","unstructured":"Bakhshandeh, A., Keramatfar, A., Norouzi, A., and Chekidehkhoun, M.M. (2023). Using ChatGPT as a Static Application Security Testing Tool. arXiv."},{"key":"ref_60","unstructured":"Mathews, N.S., Brus, Y., Aafer, Y., Nagappan, M., and McIntosh, S. (2024). LLbezpeky: Leveraging Large Language Models for Vulnerability Detection. arXiv."},{"key":"ref_61","unstructured":"Lin, Y.-Z., Mamun, M., Chowdhury, M.A., Cai, S., Zhu, M., Latibari, B.S., Gubbi, K.I., Bavarsad, N.N., Caputo, A., and Sasan, A. (2023). HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion. arXiv."},{"key":"ref_62","unstructured":"Kaheh, M., Kholgh, D.K., and Kostakos, P. (2023). Cyber Sentinel: Exploring Conversational Agents in Streamlining Security Tasks with GPT-4. arXiv."},{"key":"ref_63","unstructured":"Dolcetti, G., Arceri, V., Iotti, E., Maffeis, S., Cortesi, A., and Zaffanella, E. (2025). Helping LLMs Improve Code Generation Using Feedback from Testing and Static Analysis. arXiv."},{"key":"ref_64","unstructured":"Feng, R., Pearce, H., Liguori, P., and Sui, Y. (2025). CGP-Tuning: Structure-Aware Soft Prompt Tuning for Code Vulnerability Detection. arXiv."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Lin, J., and Mohaisen, D. (2025). Evaluating Large Language Models in Vulnerability Detection Under Variable Context Windows. arXiv.","DOI":"10.1109\/ICMLA61862.2024.00173"},{"key":"ref_66","unstructured":"Torkamani, M.J., NG, J., Mehrotra, N., Chandramohan, M., Krishnan, P., and Purandare, R. (2025). Streamlining Security Vulnerability Triage with Large Language Models. arXiv."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Ghosh, R., von Stockhausen, H.-M., Schmitt, M., Vasile, G.M., Karn, S.K., and Farri, O. (2025). CVE-LLM: Ontology-Assisted Automatic Vulnerability Evaluation Using Large Language Models. arXiv.","DOI":"10.1609\/aaai.v39i28.35139"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Liu, Y., Tao, S., Meng, W., Wang, J., Ma, W., Chen, Y., Zhao, Y., Yang, H., and Jiang, Y. (2024, January 15\u201316). Interpretable Online Log Analysis Using Large Language Models with Prompt Strategies. Proceedings of the 32nd IEEE\/ACM International Conference on Program Comprehension, Lisbon, Portugal.","DOI":"10.1145\/3643916.3644408"},{"key":"ref_69","unstructured":"Zhang, W., Guan, X., Yunhong, L., Zhang, J., Song, S., Cheng, X., Wu, Z., and Li, Z. (2025). Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging. arXiv."},{"key":"ref_70","unstructured":"Liu, J., Huang, J., Huo, Y., Jiang, Z., Gu, J., Chen, Z., Feng, C., Yan, M., and Lyu, M.R. (2023). Log-based Anomaly Detection based on EVT Theory with feedback. arXiv."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Qi, J., Huang, S., Luan, Z., Yang, S., Fung, C., Yang, H., Qian, D., Shang, J., Xiao, Z., and Wu, Z. (2023, January 13\u201315). LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection. Proceedings of the 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), Melbourne, Australia.","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00045"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Han, X., Yuan, S., and Trabelsi, M. (2023, January 5\u201318). LogGPT: Log Anomaly Detection via GPT. Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy.","DOI":"10.1109\/BigData59044.2023.10386543"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Jamal, S., and Wimmer, H. (2023). An Improved Transformer-based Model for Detecting Phishing, Spam, and Ham: A Large Language Model Approach. arXiv.","DOI":"10.21203\/rs.3.rs-3608294\/v1"},{"key":"ref_74","unstructured":"Si, S., Wu, Y., Tang, L., Zhang, Y., Wosik, J., and Su, Q. (2025). Evaluating the Performance of ChatGPT for Spam Email Detection. arXiv."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Heiding, F., Schneier, B., Vishwanath, A., Bernstein, J., and Park, P.S. (2023). Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models. arXiv.","DOI":"10.1109\/ACCESS.2024.3375882"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"V\u00f6r\u00f6s, T., Bergeron, S.P., and Berlin, K. (2023, January 26\u201329). Web Content Filtering Through Knowledge Distillation of Large Language Models. Proceedings of the 2023 IEEE\/WIC International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), Venice, Italy.","DOI":"10.1109\/WI-IAT59888.2023.00058"},{"key":"ref_77","unstructured":"Chen, Y., Lin, C.-W., Chen, B., and Zhu, Q. (2024). Application of Large Language Models to DDoS Attack Detection. Security and Privacy in Cyber-Physical Systems and Smart Vehicles, Springer Nature Switzerland."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Alnegheimish, S., Nguyen, L., Berti-Equille, L., and Veeramachaneni, K. (2024). Large language models can be zero-shot anomaly detectors for time series?. arXiv.","DOI":"10.1109\/DSAA61799.2024.10722786"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Gu, Z., Zhu, B., Zhu, G., Chen, Y., Tang, M., and Wang, J. (2023). AnomalyGPT: Detecting Industrial Anomalies Using Large Vision-Language Models. arXiv.","DOI":"10.1609\/aaai.v38i3.27963"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Elhafsi, A., Sinha, R., Agia, C., Schmerling, E., Nesnas, I., and Pavone, M. (2023). Semantic Anomaly Detection with Large Language Models. arXiv.","DOI":"10.1007\/s10514-023-10132-6"},{"key":"ref_81","unstructured":"Li, A., Zhao, Y., Qiu, C., Kloft, M., Smyth, P., Rudolph, M., and Mandt, S. (2024). Anomaly Detection of Tabular Data Using LLMs. arXiv."},{"key":"ref_82","unstructured":"Guan, W., Cao, J., Qian, S., Gao, J., and Ouyang, C. (2025). LogLLM: Log-based Anomaly Detection Using Large Language Models. arXiv."},{"key":"ref_83","unstructured":"Su, J., Jiang, C., Jin, X., Qiao, Y., Xiao, T., Ma, H., Wei, R., Jing, Z., Xu, J., and Lin, J. (2024). Large Language Models for Forecasting and Anomaly Detection: A Systematic Literature Review. arXiv."},{"key":"ref_84","unstructured":"Ali, T., and Kostakos, P. (2023). HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs). arXiv."},{"key":"ref_85","unstructured":"Liu, X., Liang, J., Yan, Q., Jang, J., Mao, S., Ye, M., Jia, J., and Xi, Z. (2025). Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots. arXiv."},{"key":"ref_86","unstructured":"Wang, Y., and Yang, X. (2025). Design and implementation of a distributed security threat detection system integrating federated learning and multimodal LLM. arXiv."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Qian, X., Zheng, X., He, Y., Yang, S., and Cavallaro, L. (2025). LAMD: Context-driven Android Malware Detection and Classification with LLMs. arXiv.","DOI":"10.1109\/SPW67851.2025.00017"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Benabderrahmane, S., Valtchev, P., Cheney, J., and Rahwan, T. (2025). APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models. arXiv.","DOI":"10.1109\/ISDFS65363.2025.11011912"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Meguro, R., and Chong, N.S.T. (2025, January 5\u20137). AdaPhish: AI-Powered Adaptive Defense and Education Resource Against Deceptive Emails. Proceedings of the 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA.","DOI":"10.1109\/ICAIC63015.2025.10848878"},{"key":"ref_90","unstructured":"Akhtar, S., Khan, S., and Parkinson, S. (2025). LLM-based event log analysis techniques: A survey. arXiv."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Walton, B.J., Khatun, M.E., Ghawaly, J.M., and Ali-Gombe, A. (2025). Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware. arXiv.","DOI":"10.1109\/ACSACW65225.2024.00035"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Mitra, S., Neupane, S., Chakraborty, T., Mittal, S., Piplai, A., Gaur, M., and Rahimi, S. (2025). LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. arXiv.","DOI":"10.1007\/978-3-031-87496-3_5"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Perrina, F., Marchiori, F., Conti, M., and Verde, N.V. (2023, January 15\u201318). AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy.","DOI":"10.1109\/BigData59044.2023.10386116"},{"key":"ref_94","unstructured":"Fayyazi, R., and Yang, S.J. (2023). On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions. arXiv."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Schwartz, Y., Benshimol, L., Mimran, D., Elovici, Y., and Shabtai, A. (2024). LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. arXiv.","DOI":"10.1145\/3696410.3714798"},{"key":"ref_96","unstructured":"Clairoux-Trepanier, V., Beauchamp, I.-M., Ruellan, E., Paquet-Clouston, M., Paquette, S.-O., and Clay, E. (2024). The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums. arXiv."},{"key":"ref_97","unstructured":"Siracusano, G., Sanvito, D., Gonzalez, R., Srinivasan, M., Kamatchi, S., Takahashi, W., Kawakita, M., Kakumaru, T., and Bifulco, R. (2023). Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild. arXiv."},{"key":"ref_98","unstructured":"Hu, E.J., Shen, Y., Wallis, P., Allen-Zhu, Z., Li, Y., Wang, S., Wang, L., and Chen, W. LoRA: Low-Rank Adaptation of Large Language Models\u2019, presented at the International Conference on Learning Representations. Available online: https:\/\/openreview.net\/forum?id=nZeVKeeFYf9."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Du, T., Ma, Y., Wang, X., Xie, Y., Yang, G., Lu, Y., and Chang, E.-C. (2024). AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models. arXiv.","DOI":"10.1016\/j.cose.2024.104220"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Fieblinger, R., Alam, M.T., and Rastogi, N. (2024). Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models. arXiv.","DOI":"10.1109\/EuroSPW61312.2024.00018"},{"key":"ref_101","unstructured":"Wang, M., and Zitouni, I. (2023, January 6\u201310). A Pretrained Language Model for Cyber Threat Intelligence. Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: Industry Track, Singapore."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Gao, P., Liu, X., Choi, E., Ma, S., Yang, X., and Song, D. (2024). ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management. arXiv.","DOI":"10.1145\/3689217.3690613"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Sorokoletova, O., Antonioni, E., and Col\u00f2, G. (2025). Towards a scalable AI-driven framework for data-independent Cyber Threat Intelligence Information Extraction. arXiv.","DOI":"10.1109\/FLLM63129.2024.10852465"},{"key":"ref_104","unstructured":"Wu, Z., Tang, F., Zhao, M., and Li, Y. (2024). KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment. arXiv."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Fayyazi, R., Taghdimi, R., and Yang, S.J. (2024). Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation. arXiv.","DOI":"10.1109\/ACSACW65225.2024.00036"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Singla, T., Anandayuvaraj, D., Kalu, K.G., Schorlemmer, T.R., and Davis, J.C. (2023, January 30). An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures. Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, Copenhagen, Denmark.","DOI":"10.1145\/3605770.3625214"},{"key":"ref_107","unstructured":"Zhang, T., Irsan, I.C., Thung, F., and Lo, D. (2024). CUPID: Leveraging ChatGPT for More Accurate Duplicate Bug Report Detection. arXiv."},{"key":"ref_108","unstructured":"Tseng, P., Yeh, Z., Dai, X., and Liu, P. (2024). Using LLMs to Automate Threat Intelligence Analysis Workflows in Security Operation Centers. arXiv."},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Rajapaksha, S., Rani, R., and Karafili, E. (2024). A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution. arXiv.","DOI":"10.1007\/978-3-031-82362-6_15"},{"key":"ref_110","unstructured":"Shah, S., and Parast, F.K. (2024). AI-Driven Cyber Threat Intelligence Automation. arXiv."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Alevizos, L., and Dekker, M. (2024). Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. Electronics, 13.","DOI":"10.3390\/electronics13112021"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Daniel, N., Kaiser, F.K., Giladi, S., Sharabi, S., Moyal, R., Shpolyansky, S., Murillo, A., Elyashar, A., and Puzis, R. (2024). Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models. arXiv.","DOI":"10.3390\/bdcc9020023"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Alturkistani, H., and Chuprat, S. (2024). Artificial Intelligence and Large Language Models in Advancing Cyber Threat Intelligence: A Systematic Literature Review. Res. Sq., 1\u201349.","DOI":"10.2139\/ssrn.4903071"},{"key":"ref_114","unstructured":"Paul, S., Alemi, F., and Macwan, R. (2025). LLM-Assisted Proactive Threat Intelligence for Automated Reasoning. arXiv."},{"key":"ref_115","first-page":"3702973","article-title":"When ChatGPT Meets Smart Contract Vulnerability Detection: How Far Are We?","volume":"34","author":"Chen","year":"2024","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref_116","unstructured":"David, I., Zhou, L., Qin, K., Song, D., Cavallaro, L., and Gervais, A. (2023). Do you still need a manual smart contract audit?. arXiv."},{"key":"ref_117","unstructured":"Gai, Y., Zhou, L., Qin, K., Song, D., and Gervais, A. (2023). Blockchain Large Language Models. arXiv."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Hu, S., Huang, T., \u0130lhan, F., Tekin, S.F., and Liu, L. (2023). Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives. arXiv.","DOI":"10.1109\/TPS-ISA58951.2023.00044"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wu, D., Xue, Y., Liu, H., Wang, H., Xu, Z., Xie, X., and Liu, Y. (2024, January 14\u201320). GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, Lisbon, Portugal.","DOI":"10.1145\/3597503.3639117"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Hossain, S.M.M., Altarawneh, A., and Roberts, J. (2025, January 6\u20138). Leveraging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection. Proceedings of the 2025 IEEE 15th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC62904.2025.10903869"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Yu, L., Chen, S., Yuan, H., Wang, P., Huang, Z., Zhang, J., Shen, C., Zhang, F., Yang, L., and Ma, J. (2024). Smart-LLaMA: Two-Stage Post-Training of Large Language Models for Smart Contract Vulnerability Detection and Explanation. arXiv.","DOI":"10.1145\/3728878"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"126","DOI":"10.57019\/jmv.1489060","article-title":"SmartLLMSentry: A Comprehensive LLM Based Smart Contract Vulnerability Detection Framework","volume":"4","author":"Zaazaa","year":"2024","journal-title":"J. Metaverse"},{"key":"ref_123","unstructured":"Wei, Z., Sun, J., Zhang, Z., Zhang, X., Li, M., and Hou, Z. (2024). LLM-SmartAudit: Advanced Smart Contract Vulnerability Detection. arXiv."},{"key":"ref_124","unstructured":"He, Z., Li, Z., Yang, S., Ye, H., Qiao, A., Zhang, X., Luo, X., and Chen, T. (2025). Large Language Models for Blockchain Security: A Systematic Literature Review. arXiv."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"126479","DOI":"10.1016\/j.eswa.2025.126479","article-title":"SmartGuard: An LLM-enhanced framework for smart contract vulnerability detection","volume":"269","author":"Ding","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Ma, W., Wu, D., Sun, Y., Wang, T., Liu, S., Zhang, J., Xue, Y., and Liu, Y. (2024). Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications. arXiv.","DOI":"10.1109\/ICSE55347.2025.00027"},{"key":"ref_127","unstructured":"Bu, J., Li, W., Li, Z., Zhang, Z., and Li, X. (2025). Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM. arXiv."},{"key":"ref_128","unstructured":"Deng, G., Liu, Y., Mayoral-Vilches, V., Liu, P., Li, Y., Xu, Y., Zhang, T., Liu, Y., Pinzger, M., and Rass, S. (2024). PentestGPT: An LLM-empowered Automatic Penetration Testing Tool. arXiv."},{"key":"ref_129","unstructured":"Fang, R., Bindu, R., Gupta, A., and Kang, D. (2024). LLM Agents can Autonomously Exploit One-day Vulnerabilities. arXiv."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Temara, S. (2023). Maximizing Penetration Testing Success with Effective Reconnaissance Techniques using ChatGPT. arXiv.","DOI":"10.22541\/au.167947026.68710739\/v1"},{"key":"ref_131","unstructured":"Deng, G., Liu, Y., Robotics, A., Klagenfurt, A.-A.-U., Liu, P., Li, Y., Zhang, T., Liu, Y., Klagenfurt, A.-A.-U., and Rass, S. (2024). PentestGPt: Evaluating and Harnessing Large Language Models for Automated Penetration Testing. arXiv."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Happe, A., and Cito, J. (2023, January 3\u20139). Getting pwn\u2019d by AI: Penetration Testing with Large Language Models. Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, San Francisco, CA, USA.","DOI":"10.1145\/3611643.3613083"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Bianou, S.G., and Batogna, R.G. (2024, January 2\u20134). PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack. Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK.","DOI":"10.1109\/CSR61664.2024.10679480"},{"key":"ref_134","unstructured":"Yin, Z., Wang, Z., Xu, W., Zhuang, J., Mozumder, P., Smith, A., and Zhang, W. (2025). Digital Forensics in the Age of Large Language Models. arXiv."},{"key":"ref_135","first-page":"301859","article-title":"Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency","volume":"52","author":"Wickramasekara","year":"2025","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_136","first-page":"301756","article-title":"volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model","volume":"49","author":"Oh","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_137","first-page":"301805","article-title":"Re-imagen: Generating coherent background activity in synthetic scenario-based forensic datasets using large language models","volume":"50","author":"Voigt","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_138","first-page":"301683","article-title":"ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models","volume":"48","author":"Michelet","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_139","unstructured":"Bhandarkar, A., Wilson, R., Swarup, A., Zhu, M., and Woodard, D. (2024). Is the Digital Forensics and Incident Response Pipeline Ready for Text-Based Threats in LLM Era?. arXiv."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Loumachi, F.Y., Ghanem, M.C., and Ferrag, M.A. (2024). GenDFIR: Advancing Cyber Incident Timeline Analysis Through Retrieval Augmented Generation and Large Language Models. arXiv.","DOI":"10.20944\/preprints202412.2516.v1"},{"key":"ref_141","unstructured":"Zhou, H., Xu, W., Dehlinger, J., Chakraborty, S., and Deng, L. (2024, January 11\u201313). An LLM-driven Approach to Gain Cybercrime Insights with Evidence Networks. Proceedings of the 2024 USENIX Symposium on Usable Privacy and Security (SOUPS), Philadelphia, PA, USA."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Kim, K., Lee, C., Bae, S., Choi, J., and Kang, W. (2025). Digital Forensics in Law Enforcement: A Case Study of Llm-Driven Evidence Analysis, Social Science Research Network.","DOI":"10.2139\/ssrn.5110258"},{"key":"ref_143","first-page":"301872","article-title":"ForensicLLM: A local large language model for digital forensics","volume":"52","author":"Sharma","year":"2025","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Xu, E., Zhang, W., and Xu, W. (2024, January 22\u201325). Transforming Digital Forensics with Large Language Models: Unlocking Automation, Insights, and Justice. Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, Boise, IH, USA.","DOI":"10.1145\/3627673.3679091"},{"key":"ref_145","first-page":"301814","article-title":"Exploring the potential of large language models for author profiling tasks in digital text forensics","volume":"50","author":"Cho","year":"2024","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Rahali, A., and Akhloufi, M.A. (2023). MalBERTv2: Code Aware BERT-Based Model for Malware Identification. Big Data Cogn. Comput., 7.","DOI":"10.3390\/bdcc7020060"},{"key":"ref_147","unstructured":"Rondanini, C., Carminati, B., Ferrari, E., Gaudiano, A., and Kundu, A. (2025). Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation. arXiv."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Pearce, H., Ahmad, B., Tan, B., Dolan-Gavitt, B., and Karri, R. (2021). Asleep at the Keyboard? Assessing the Security of GitHub Copilot\u2019s Code Contributions. arXiv.","DOI":"10.1109\/SP46214.2022.9833571"},{"key":"ref_149","unstructured":"Zeng, J., Huang, R., Malik, W., Yin, L., Babic, B., Shacham, D., Yan, X., Yang, J., and He, Q. (2024). Large Language Models for Social Networks: Applications, Challenges, and Solutions. arXiv."},{"key":"ref_150","unstructured":"Wudali, P.N., Kravchik, M., Malul, E., Gandhi, P.A., Elovici, Y., and Shabtai, A. (2025). Rule-ATT&CK Mapper (RAM): Mapping SIEM Rules to TTPs Using LLMs. arXiv."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., Tihanyi, N., Bisztray, T., and Debbah, M. (2025). Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities. arXiv.","DOI":"10.1016\/j.iotcps.2025.01.001"},{"key":"ref_152","unstructured":"(2025, April 23). General Data Protection Regulation (GDPR)\u2014Legal Text. General Data Protection Regulation (GDPR). Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_153","unstructured":"(2025, April 20). Cyber Security Skills in the UK Labour Market 2023, Available online: https:\/\/www.gov.uk\/government\/publications\/cyber-security-skills-in-the-uk-labour-market-2023."},{"key":"ref_154","unstructured":"(2025, April 20). CyBOK\u2014The Cyber Security Body of Knowledge. Available online: https:\/\/www.cybok.org\/."},{"key":"ref_155","unstructured":"(2025, April 20). National Cyber Security Centre NCSC-Certified Degrees, Available online: https:\/\/www.ncsc.gov.uk\/information\/ncsc-certified-degrees."},{"key":"ref_156","unstructured":"Zhao, C., Agrawal, G., Kumarage, T., Tan, Z., Deng, Y., Chen, Y.-C., and Liu, H. (2024). Ontology-Aware RAG for Improved Question-Answering in Cybersecurity Education. arXiv."},{"key":"ref_157","first-page":"23164","article-title":"CyberQ: Generating Questions and Answers for Cybersecurity Education Using Knowledge Graph-Augmented LLMs","volume":"38","author":"Agrawal","year":"2024","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_158","unstructured":"Zhao, C., Maria, R.D., Kumarage, T., Chaudhary, K.S., Agrawal, G., Li, Y., Park, J., Deng, Y., Chen, Y.-C., and Liu, H. (2025). CyberBOT: Towards Reliable Cybersecurity Education via Ontology-Grounded Retrieval Augmented Generation. arXiv."},{"key":"ref_159","unstructured":"Shepherd, C. (2025). Generative AI Misuse Potential in Cyber Security Education: A Case Study of a UK Degree Program. arXiv."},{"key":"ref_160","doi-asserted-by":"crossref","unstructured":"Ohm, M., Bungartz, C., Boes, F., and Meier, M. (2024\u20132, January 30). Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT\u2019s Influence on Student Performance. Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna, Austria.","DOI":"10.1145\/3664476.3670446"},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Nizon-Deladoeuille, M., Stef\u00e1nsson, B., Neukirchen, H., and Welsh, T. (2024, January 9\u201311). Towards Supporting Penetration Testing Education with Large Language Models: An Evaluation and Comparison. Proceedings of the 2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS), Gran Canaria, Spain.","DOI":"10.1109\/SNAMS64316.2024.10883774"},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Al-Dhamari, N., and Clarke, N. (2024). GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness. arXiv.","DOI":"10.1007\/978-3-031-62918-1_1"},{"key":"ref_163","unstructured":"Wang, T., Zhou, N., and Chen, Z. (2025). CyberMentor: AI Powered Learning Tool Platform to Address Diverse Student Needs in Cybersecurity Education. arXiv."},{"key":"ref_164","unstructured":"Tann, W., Liu, Y., Sim, J.H., Seah, C.M., and Chang, E.-C. (2023). Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions. arXiv."},{"key":"ref_165","unstructured":"Shao, M., Chen, B., Jancheska, S., Dolan-Gavitt, B., Garg, S., Karri, R., and Shafique, M. (2024). An Empirical Evaluation of LLMs for Solving Offensive Security Challenges. arXiv."},{"key":"ref_166","unstructured":"Nelson, C., Doup\u00e9, A., and Shoshitaishvili, Y. (March, January 26). SENSAI: Large Language Models as Applied Cybersecurity Tutors. Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1, Pittsburgh, PA, USA."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"476","DOI":"10.34190\/eccws.23.1.2224","article-title":"Innovating Cybersecurity Education Through AI-augmented Teaching","volume":"23","author":"Joon","year":"2024","journal-title":"ECCWS"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/7\/184\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:06:14Z","timestamp":1760033174000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/9\/7\/184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":167,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["bdcc9070184"],"URL":"https:\/\/doi.org\/10.3390\/bdcc9070184","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,8]]}}}