{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:12:16Z","timestamp":1776834736218,"version":"3.51.2"},"reference-count":248,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T00:00:00Z","timestamp":1738108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>The escalating complexity of cyber threats, coupled with the rapid evolution of digital landscapes, poses significant challenges to traditional cybersecurity mechanisms. This review explores the transformative role of LLMs in addressing critical challenges in cybersecurity. With the rapid evolution of digital landscapes and the increasing sophistication of cyber threats, traditional security mechanisms often fall short in detecting, mitigating, and responding to complex risks. LLMs, such as GPT, BERT, and PaLM, demonstrate unparalleled capabilities in natural language processing, enabling them to parse vast datasets, identify vulnerabilities, and automate threat detection. Their applications extend to phishing detection, malware analysis, drafting security policies, and even incident response. By leveraging advanced features like context awareness and real-time adaptability, LLMs enhance organizational resilience against cyberattacks while also facilitating more informed decision-making. However, deploying LLMs in cybersecurity is not without challenges, including issues of interpretability, scalability, ethical concerns, and susceptibility to adversarial attacks. This review critically examines the foundational elements, real-world applications, and limitations of LLMs in cybersecurity while also highlighting key advancements in their integration into security frameworks. Through detailed analysis and case studies, this paper identifies emerging trends and proposes future research directions, such as improving robustness, addressing privacy concerns, and automating incident management. The study concludes by emphasizing the potential of LLMs to redefine cybersecurity, driving innovation and enhancing digital security ecosystems.<\/jats:p>","DOI":"10.3390\/computation13020030","type":"journal-article","created":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T07:45:12Z","timestamp":1738136712000},"page":"30","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity"],"prefix":"10.3390","volume":"13","author":[{"given":"Wafaa","family":"Kasri","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology, Tissemsilt University, Bougara 38000, Algeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8904-5587","authenticated-orcid":false,"given":"Yassine","family":"Himeur","sequence":"additional","affiliation":[{"name":"College of Engineering and Information Technology, University of Dubai, Academic City, Dubai 14143, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0218-5219","authenticated-orcid":false,"given":"Hamzah Ali","family":"Alkhazaleh","sequence":"additional","affiliation":[{"name":"College of Engineering and Information Technology, University of Dubai, Academic City, Dubai 14143, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8053-6467","authenticated-orcid":false,"given":"Saed","family":"Tarapiah","sequence":"additional","affiliation":[{"name":"Department of Telecommunication Engineering, An-Najah National University, Nablus P.O. Box 7, Palestine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3017-9243","authenticated-orcid":false,"given":"Shadi","family":"Atalla","sequence":"additional","affiliation":[{"name":"College of Engineering and Information Technology, University of Dubai, Academic City, Dubai 14143, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2784-5188","authenticated-orcid":false,"given":"Wathiq","family":"Mansoor","sequence":"additional","affiliation":[{"name":"College of Engineering and Information Technology, University of Dubai, Academic City, Dubai 14143, United Arab Emirates"}]},{"given":"Hussain","family":"Al-Ahmad","sequence":"additional","affiliation":[{"name":"College of Engineering and Information Technology, University of Dubai, Academic City, Dubai 14143, United Arab Emirates"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Saeed, S., Altamimi, S.A., Alkayyal, N.A., Alshehri, E., and Alabbad, D.A. (2023). Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations. Sensors, 23.","DOI":"10.3390\/s23156666"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"9355","DOI":"10.1007\/s12652-023-04603-y","article-title":"Advanced persistent threats (APT): Evolution, anatomy, attribution and countermeasures","volume":"14","author":"Sharma","year":"2023","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"e1512","DOI":"10.1002\/widm.1512","article-title":"Filter bubbles in recommender systems: Fact or fallacy\u2014A systematic review","volume":"13","author":"Areeb","year":"2023","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"102746","DOI":"10.1016\/j.cose.2022.102746","article-title":"Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives","volume":"118","author":"Himeur","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40537-024-00957-y","article-title":"Advancing cybersecurity: A comprehensive review of AI-driven detection techniques","volume":"11","author":"Salem","year":"2024","journal-title":"J. Big Data"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"8603","DOI":"10.1007\/s11042-017-4754-2","article-title":"A robust and secure key-frames based video watermarking system using chaotic encryption","volume":"77","author":"Himeur","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"103585","DOI":"10.1016\/j.cose.2023.103585","article-title":"A systematic review of current cybersecurity training methods","volume":"136","author":"Pruemmer","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Du, M., He, F., Zou, N., Tao, D., and Hu, X. (2022). Shortcut learning of large language models in natural language understanding: A survey. arXiv.","DOI":"10.1145\/3596490"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sohail, S.S., Farhat, F., Himeur, Y., Nadeem, M., Madsen, D.\u00d8., Singh, Y., Atalla, S., and Mansoor, W. (2023). The future of gpt: A taxonomy of existing chatgpt research, current challenges, and possible future directions. Curr. Chall. Possible Future Dir.","DOI":"10.2139\/ssrn.4413921"},{"key":"ref_10","unstructured":"Devlin, J., Chang, M.W., Lee, K., and Toutanova, K. (2018). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"123224","DOI":"10.1016\/j.eswa.2024.123224","article-title":"Revolutionizing generative pre-traineds: Insights and challenges in deploying ChatGPT and generative chatbots for FAQs","volume":"246","author":"Khennouche","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Farhat, F., Silva, E.S., Hassani, H., Madsen, D.\u00d8., Sohail, S.S., Himeur, Y., Alam, M.A., and Zafar, A. (2024). The scholarly footprint of ChatGPT: A bibliometric analysis of the early outbreak phase. Front. Artif. Intell., 6.","DOI":"10.3389\/frai.2023.1270749"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sohail, S.S., Madsen, D.\u00d8., Himeur, Y., and Ashraf, M. (2023). Using ChatGPT to navigate ambivalent and contradictory research findings on artificial intelligence. Front. Artif. Intell., 6.","DOI":"10.3389\/frai.2023.1195797"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Papageorgiou, E., Chronis, C., Varlamis, I., and Himeur, Y. (2024). A survey on the use of large language models (llms) in fake news. Future Internet, 16.","DOI":"10.3390\/fi16080298"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104016","DOI":"10.1016\/j.cose.2024.104016","article-title":"A survey of large language models for cyber threat detection","volume":"145","author":"Chen","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Safitra, M.F., Lubis, M., and Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, 15.","DOI":"10.3390\/su151813369"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/j.procs.2015.09.201","article-title":"Cyber security challenges within the connected home ecosystem futures","volume":"61","author":"Arabo","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3171","DOI":"10.1007\/s13369-019-04319-2","article-title":"Cybersecurity threats and vulnerabilities: A systematic mapping study","volume":"45","author":"Humayun","year":"2020","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_19","first-page":"5766","article-title":"The recent trends in cybersecurity: A review","volume":"34","author":"Kaur","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Aghaei, E., Niu, X., Shadid, W., and Al-Shaer, E. (2022, January 17\u201319). SecureBERT: A Domain-Specific Language Model for Cybersecurity. Proceedings of the International Conference on Security and Privacy in Communication Systems, Kansas City, MO, USA.","DOI":"10.1007\/978-3-031-25538-0_3"},{"key":"ref_21","first-page":"15","article-title":"Building resilient SMEs: Harnessing large language models for cyber security in Australia","volume":"3","year":"2024","journal-title":"J. AI Robot. Workplace Autom."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fu, M., Wang, P., Liu, M., Zhang, Z., and Zhou, X. (2024). IoV-BERT-IDS: Hybrid Network Intrusion Detection System in IoV Using Large Language Models. IEEE Trans. Vehicul. Technol.","DOI":"10.1109\/TVT.2024.3402366"},{"key":"ref_23","unstructured":"Zhang, A.K., Perry, N., Dulepet, R., Ji, J., Lin, J.W., Jones, E., Menders, C., Hussein, G., Liu, S., and Jasper, D. (2024). Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risks of Language Models. arXiv."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zaboli, A., Choi, S.L., Song, T.J., and Hong, J. (2024, January 21\u201325). Chatgpt and other large language models for cybersecurity of smart grid applications. Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM), Seattle, WA, USA.","DOI":"10.1109\/PESGM51994.2024.10688863"},{"key":"ref_25","unstructured":"Xu, J., Stokes, J.W., McDonald, G., Bai, X., Marshall, D., Wang, S., Swaminathan, A., and Li, Z. (2024). Autoattacker: A large language model guided system to implement automatic cyber-attacks. arXiv."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652594","article-title":"Cysecbert: A domain-adapted language model for the cybersecurity domain","volume":"27","author":"Bayer","year":"2024","journal-title":"ACM Trans. Priv. Secur."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103964","DOI":"10.1016\/j.cose.2024.103964","article-title":"From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models","volume":"144","author":"McIntosh","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_28","unstructured":"Liang, J. (2021). Machine Learning in Cybersecurity Training. Cyber Train. Rev."},{"key":"ref_29","unstructured":"Chopra, S., Ahmad, H., Goel, D., and Szabo, C. (2024). ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models. arXiv."},{"key":"ref_30","first-page":"31","article-title":"The Mythos of Model Interpretability","volume":"16","author":"Lipton","year":"2018","journal-title":"Commun. ACM"},{"key":"ref_31","unstructured":"Hodge, R. (2021). AI-Driven Cybersecurity Ecosystems. AI Soc."},{"key":"ref_32","unstructured":"Zoph, B., Ghiasi, G., Lin, T.-Y., Cui, Y., Liu, H., Cubuk, E.D., and Le, Q.V. (2020). Rethinking Pretraining and Fine-tuning in AI. AI Adv."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"103645","DOI":"10.1016\/j.adhoc.2024.103645","article-title":"PLLM-CS: Pre-trained Large Language Model (LLM) for cyber threat detection in satellite networks","volume":"166","author":"Hassanin","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"104213","DOI":"10.1016\/j.cose.2024.104213","article-title":"AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model","volume":"150","author":"Chen","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"104220","DOI":"10.1016\/j.cose.2024.104220","article-title":"AttacKG+: Boosting attack graph construction with Large Language Models","volume":"150","author":"Zhang","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"e2313","DOI":"10.1002\/nem.2313","article-title":"Intent-Based Network Configuration Using Large Language Models","volume":"35","author":"Tu","year":"2025","journal-title":"Int. J. Netw. Manag."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-024-10590-1","article-title":"How secure is AI-generated code: A large-scale comparison of large language models","volume":"30","author":"Tihanyi","year":"2025","journal-title":"Empir. Softw. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Dharmendra, H., Raghunandan, G., Sindhu, A., Samanvitha, C., Nethravathi, N., and Elango, D. (2025). Human Evaluation in Large Language Model Testing: Assessing the Quality of AI Model Output. Advancements in Intelligent Process Automation, IGI Global.","DOI":"10.4018\/979-8-3693-5380-6.ch022"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11280-024-01322-y","article-title":"KPLLM-STE: Knowledge-enhanced and prompt-aware large language models for short-text expansion","volume":"28","author":"Zhong","year":"2025","journal-title":"World Wide Web"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-024-01817-5","article-title":"A study on the application of the T5 large language model in encrypted traffic classification","volume":"18","author":"Luo","year":"2025","journal-title":"Peer-Netw. Appl."},{"key":"ref_41","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_42","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref_43","unstructured":"Chowdhery, A., Narang, S., Devlin, J., Bosma, M., Mishra, G., Roberts, A., Barham, P., Chung, H.W., Sutton, C., and Gehrmann, S. (2022). PaLM: Scaling language models with pathways. arXiv."},{"key":"ref_44","unstructured":"Technology Innovation Institute (2024, May 21). Falcon 180B: A State-of-the-Art Open-Source LLM. Technical Report. Available online: https:\/\/www.tii.ae\/news\/technology-innovation-institute-introduces-worlds-most-powerful-open-llm-falcon-180b."},{"key":"ref_45","unstructured":"Community, S. (2024, May 21). Vicuna 13-B: A Fine-Tuned LLM for Conversational AI. Project Documentation. Available online: https:\/\/lmsys.org\/blog\/2023-03-30-vicuna\/."},{"key":"ref_46","unstructured":"Salesforce (2024, May 21). XGen-7B: A Robust Model for Long-Context Text Generation. Technical Report. Available online: https:\/\/clarifai.com\/salesforce\/xgen\/models\/xgen-7b-8k-instruct."},{"key":"ref_47","unstructured":"Scao, T.L., Fan, A., Wolf, T., Akiki, C., Pavlick, E., Ili\u0107, S., Hesslow, D., Castagn\u00e9, R., Luccioni, A.S., and Yvon, F. (2022). BLOOM: A multilingual open-source LLM. arXiv."},{"key":"ref_48","unstructured":"AI, M. (2024, May 21). Mistral 7B: Optimized for NLP and Generative Tasks. Technical Report. Available online: https:\/\/mistral.ai\/news\/announcing-mistral-7b\/."},{"key":"ref_49","unstructured":"EleutherAI (2024, May 21). GPT-NeoX: Open-Source Large-Scale Language Modeling. Project Documentation. Available online: https:\/\/github.com\/EleutherAI\/gpt-neox."},{"key":"ref_50","unstructured":"Research, M.A. (2024, May 21). LLaMA 2: Open Foundation and Fine-Tuned Models for Research Use. Technical Report. Available online: https:\/\/ai.meta.com\/research\/publications\/llama-2-open-foundation-and-fine-tuned-chat-models\/."},{"key":"ref_51","unstructured":"Microsoft (2024, May 21). Turing-NLG: Microsoft\u2019s Generative Pre-Trained Language Model. Technical Report. Available online: https:\/\/www.microsoft.com\/en-us\/research\/blog\/turing-nlg-a-17-billion-parameter-language-model-by-microsoft\/."},{"key":"ref_52","unstructured":"Tihanyi, N., Ferrag, M.A., Jain, R., and Debbah, M.O. (2024). CyberMetric: A Benchmark Dataset for Evaluating Large Language Models in Cybersecurity Knowledge. arXiv."},{"key":"ref_53","unstructured":"Liu, Z. (2023). SecQA: Question-Answering Benchmark Dataset for Evaluating LLMs in Computer Security. arXiv."},{"key":"ref_54","unstructured":"Shao, M., Jancheska, S., Udeshi, M., Dolan-Gavitt, B., Xi, H., Milner, K., Chen, B., Yin, M., Garg, S., and Krishnamurthy, P. (2024). NYU CTF Dataset: Evaluating LLMs on Capture the Flag Challenges for Offensive Security Tasks. arXiv."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Ryd\u00e9n, A., N\u00e4slund, E., Schiller, E.M., and Almgren, M. (2024). LLMSecCode: Evaluating large language models for secure coding. International Symposium on Cyber Security, Cryptology, and Machine Learning, Springer Nature.","DOI":"10.1007\/978-3-031-76934-4_7"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., and Ciampi, M. (2023). A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem. Sensors, 23.","DOI":"10.3390\/s23020651"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Thapa, C., Jang, S.I., Ahmed, M.E., Camtepe, S., Pieprzyk, J., and Nepal, S. (2022, January 5\u20139). Transformer-based language models for software vulnerability detection. Proceedings of the 38th Annual Computer Security Applications Conference, Austin, TX, USA.","DOI":"10.1145\/3564625.3567985"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Rahali, A., and Akhloufi, M.A. (2021, January 17\u201320). MalBERT: Malware detection using bidirectional encoder representations from transformers. Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, Australia.","DOI":"10.1109\/SMC52423.2021.9659287"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","article-title":"Revolutionizing cyber threat detection with large language models: A privacy-preserving bert-based lightweight model for iot\/iiot devices","volume":"12","author":"Ferrag","year":"2024","journal-title":"IEEE Access"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"e230163","DOI":"10.1148\/radiol.230163","article-title":"ChatGPT and other large language models are double-edged swords","volume":"307","author":"Shen","year":"2023","journal-title":"Radiology"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"124379","DOI":"10.1109\/ACCESS.2019.2937347","article-title":"Cyber security threats detection in internet of things using deep learning approach","volume":"7","author":"Ullah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"367","DOI":"10.3390\/make6010018","article-title":"Prompt engineering or fine-tuning? a case study on phishing detection with large language models","volume":"6","author":"Trad","year":"2024","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_63","unstructured":"Koide, T., Fukushi, N., Nakano, H., and Chiba, D. (2024). Chatspamdetector: Leveraging large language models for effective phishing email detection. arXiv."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Chataut, R., Gyawali, P.K., and Usman, Y. (2024, January 8\u201310). Can ai keep you safe? a study of large language models for phishing detection. Proceedings of the 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC60891.2024.10427626"},{"key":"ref_65","unstructured":"Lee, J., Lim, P., Hooi, B., and Divakaran, D.M. (2024). Multimodal Large Language Models for Phishing Webpage Detection and Identification. arXiv."},{"key":"ref_66","unstructured":"Patel, H., Rehman, U., and Iqbal, F. (2024). Large Language Models Spot Phishing Emails with Surprising Accuracy: A Comparative Analysis of Performance. arXiv."},{"key":"ref_67","unstructured":"Roy, S.S., and Nilizadeh, S. (2024). Utilizing Large Language Models to Optimize the Detection and Explainability of Phishing Websites. arXiv."},{"key":"ref_68","unstructured":"Bethany, M., Galiopoulos, A., Bethany, E., Karkevandi, M.B., Vishwamitra, N., and Najafirad, P. (2024). Large language model lateral spear phishing: A comparative study in large-scale organizational settings. arXiv."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Mahendru, S., and Pandit, T. (2024). SecureNet: A Comparative Study of DeBERTa and Large Language Models for Phishing Detection. arXiv.","DOI":"10.1109\/BDAI62182.2024.10692765"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"42131","DOI":"10.1109\/ACCESS.2024.3375882","article-title":"Devising and detecting phishing emails using large language models","volume":"12","author":"Heiding","year":"2024","journal-title":"IEEE Access"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Uddin, M.A., and Sarker, I.H. (2024). An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach. arXiv.","DOI":"10.2139\/ssrn.4785953"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Benavides-Astudillo, E., Fuertes, W., Sanchez-Gordon, S., Nu\u00f1ez-Agurto, D., and Rodr\u00edguez-Gal\u00e1n, G. (2023). A phishing-attack-detection model using natural language processing and deep learning. Appl. Sci., 13.","DOI":"10.3390\/app13095275"},{"key":"ref_73","unstructured":"Li, Y., Huang, C., Deng, S., Lock, M.L., Cao, T., Oo, N., Hooi, B., and Lim, H.W. (2024). KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection. arXiv."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.procs.2021.07.040","article-title":"Lightweight URL-based phishing detection using natural language processing transformers for mobile devices","volume":"191","author":"Haynes","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_75","unstructured":"Wang, H., and Hooi, B. (2024). Automated Phishing Detection Using URLs and Webpages. arXiv."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Maneriker, P., Stokes, J.W., Lazo, E.G., Carutasu, D., Tajaddodianfar, F., and Gururajan, A. (December, January 29). Urltran: Improving phishing url detection using transformers. Proceedings of the MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), San Diego, CA, USA.","DOI":"10.1109\/MILCOM52596.2021.9653028"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"e402","DOI":"10.1002\/spy2.402","article-title":"An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach","volume":"7","author":"Jamal","year":"2024","journal-title":"Secur. Priv."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Nguyen, Q.H., Wu, T., Nguyen, V., Yuan, X., Xue, J., and Rudolph, C. (2024, January 2\u201320). Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails. Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, Singapore.","DOI":"10.1145\/3665451.3665531"},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Roy, S.S., Thota, P., Naragam, K.V., and Nilizadeh, S. (2024, January 19\u201323). From Chatbots to Phishbots?: Phishing Scam Generation in Commercial Large Language Models. Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP54263.2024.00182"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1007\/s11192-019-03222-9","article-title":"Investigating the applications of artificial intelligence in cyber security","volume":"121","author":"Abbas","year":"2019","journal-title":"Scientometrics"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Sajid, M.S.I., Wei, J., Alam, M.R., Aghaei, E., and Al-Shaer, E. (July, January 29). Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware. Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France.","DOI":"10.1109\/CNS48642.2020.9162202"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Hu, J.L., Ebrahimi, M., and Chen, H. (2021, January 2\u20133). Single-shot black-box adversarial attacks against malware detectors: A causal language model approach. Proceedings of the 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, TX, USA.","DOI":"10.1109\/ISI53945.2021.9624787"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, P.M.S., Celdr\u00e1n, A.H., Bovet, G., and P\u00e9rez, G.M. (2024). Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls. arXiv.","DOI":"10.1109\/MILCOM61039.2024.10773857"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"58488","DOI":"10.1109\/ACCESS.2022.3179384","article-title":"Static malware detection using stacked bilstm and gpt-2","volume":"10","author":"Acarturk","year":"2022","journal-title":"IEEE Access"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Gao, Y., Hasegawa, H., Yamaguchi, Y., and Shimada, H. (July, January 27). Malware detection using attributed CFG generated by pre-trained language model with graph isomorphism network. Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA.","DOI":"10.1109\/COMPSAC54236.2022.00237"},{"key":"ref_86","unstructured":"Zahan, N., Burckhardt, P., Lysenko, M., Aboukhadijeh, F., and Williams, L. (2024). Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models. arXiv."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Madani, P. (2023, January 1\u20134). Metamorphic malware evolution: The potential and peril of large language models. Proceedings of the 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA.","DOI":"10.1109\/TPS-ISA58951.2023.00019"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Khan, I., and Kwon, Y.W. (2024, January 12\u201314). A Structural-Semantic Approach Integrating Graph-Based and Large Language Models Representation to Detect Android Malware. Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection, Edinburgh, UK.","DOI":"10.1007\/978-3-031-65175-5_20"},{"key":"ref_89","unstructured":"Fang, C., Miao, N., Srivastav, S., Liu, J., Zhang, R., Fang, R., Tsang, R., Nazari, N., Wang, H., and Homayoun, H. (2024, January 14\u201316). Large Language Models for Code Analysis: Do {LLMs} Really Do Their Job?. Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA."},{"key":"ref_90","unstructured":"Houssel, P.R., Singh, P., Layeghy, S., and Portmann, M. (2024). Towards Explainable Network Intrusion Detection Using Large Language Models. arXiv."},{"key":"ref_91","unstructured":"Zhang, H., Sediq, A.B., Afana, A., and Erol-Kantarci, M. (2024). Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection. arXiv."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Alkhatib, N., Mushtaq, M., Ghauch, H., and Danger, J.L. (2022, January 5\u20138). Can-bert do it? controller area network intrusion detection system based on bert language model. Proceedings of the 2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/AICCSA56895.2022.10017800"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Lai, H. (2023, January 20\u201321). Intrusion Detection Technology Based on Large Language Models. Proceedings of the 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), Bengaluru, India.","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s12083-023-01595-6","article-title":"Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection","volume":"17","author":"Li","year":"2024","journal-title":"Peer- Netw. Appl."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Lin, J., Guo, Y., and Chen, H. (2024). Intrusion Detection at Scale with the Assistance of a Command-line Language Model. arXiv.","DOI":"10.1109\/DSN-S60304.2024.00031"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"122045","DOI":"10.1016\/j.eswa.2023.122045","article-title":"A lightweight IoT intrusion detection model based on improved BERT-of-Theseus","volume":"238","author":"Wang","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_97","unstructured":"Ziems, N., Liu, G., Flanagan, J., and Jiang, M. (2023). Explaining tree model decisions in natural language for network intrusion detection. arXiv."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Nguyen, L.G., and Watabe, K. (2022, January 9). Flow-based network intrusion detection based on BERT masked language model. Proceedings of the 3rd International CoNEXT Student Workshop, Rome, Italy.","DOI":"10.1145\/3565477.3569152"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"121900","DOI":"10.1109\/ACCESS.2022.3211313","article-title":"Data curation and quality evaluation for machine learning-based cyber intrusion detection","volume":"10","author":"Tran","year":"2022","journal-title":"IEEE Access"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"124931","DOI":"10.1109\/ACCESS.2021.3110524","article-title":"Intrusion detection method using bi-directional GPT for in-vehicle controller area networks","volume":"9","author":"Nam","year":"2021","journal-title":"IEEE Access"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"103999","DOI":"10.1016\/j.cose.2024.103999","article-title":"Llm-tikg: Threat intelligence knowledge graph construction utilizing large language model","volume":"145","author":"Hu","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"122564","DOI":"10.1016\/j.eswa.2023.122564","article-title":"Flowtransformer: A transformer framework for flow-based network intrusion detection systems","volume":"241","author":"Manocchio","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_103","unstructured":"Farrukh, Y.A., Wali, S., Khan, I., and Bastian, N.D. (2024). XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language Model. arXiv."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Zhou, X., Cao, S., Sun, X., and Lo, D. (2024). Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. J. Cybersecur.","DOI":"10.1145\/3708522"},{"key":"ref_105","unstructured":"Zibaeirad, A., and Vieira, M. (2024). VulnLLMEval: A Framework for Evaluating Large Language Models in Software Vulnerability Detection and Patching. arXiv."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zou, Q., Singhal, A., Sun, X., and Liu, P. (2024, January 12). Evaluating Large Language Models for Real-World Vulnerability Repair in C\/C++ Code. Proceedings of the IWSPA \u201924: Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, Porto, Portugal.","DOI":"10.1145\/3643651.3659892"},{"key":"ref_107","unstructured":"Steenhoek, B., Rahman, M.M., Roy, M.K., Alam, M.S., Barr, E.T., and Le, W. (2024). A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection. arXiv."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/3687251.3687253","article-title":"Smart Contract Vulnerability Detection: The Role of Large Language Model (LLM)","volume":"24","author":"Boi","year":"2024","journal-title":"ACM SIGAPP Appl. Comput. Rev."},{"key":"ref_109","unstructured":"Jensen, R.I.T., Tawosi, V., and Alamir, S. (2024, January 20). Software Vulnerability and Functionality Assessment using Large Language Models. Proceedings of the Third ACM\/IEEE International Workshop on NL-Based Software Engineering (NLBSE \u201924), Lisbon, Portugal."},{"key":"ref_110","unstructured":"Mathews, N.S., Brus, Y., Aafer, Y., Nagappan, M., and McIntosh, S. (2024). LLbezpeky: Leveraging Large Language Models for Vulnerability Detection. arXiv."},{"key":"ref_111","unstructured":"Liu, Y., Gao, L., Yang, M., Xie, Y., Chen, P., Zhang, X., and Chen, W. (2024). VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models. arXiv."},{"key":"ref_112","unstructured":"Nong, Y., Yang, H., Cheng, L., Hu, H., and Cai, H. (2024). Automated Software Vulnerability Patching using Large Language Models. arXiv."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Zhou, X., Zhang, T., and Lo, D. (2024, January 14\u201320). Large Language Model for Vulnerability Detection: Emerging Results and Future Directions. Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER\u201924), Lisbon, Portugal.","DOI":"10.1145\/3639476.3639762"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Nana, S.R., Bassole, D., Guel, D., and Si\u00e9, O. (2023). Deep Learning and Web Applications Vulnerabilities Detection: An Approach Based on Large Language Models, Laboratoire de Math\u00e9matiques et d\u2019Informatique, Universit\u00e9 Joseph KI-ZERBO.","DOI":"10.14569\/IJACSA.2024.01507135"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Hasan, S.M., Alotaibi, A.M., Talukder, S., and Shahid, A.R. (2024). Distributed Threat Intelligence at the Edge Devices: A Large Language Model-Driven Approach. arXiv.","DOI":"10.1109\/COMPSAC61105.2024.00206"},{"key":"ref_116","unstructured":"Clairoux-Trepanier, V., Beauchamp, I.M., Ruellan, E., Paquet-Clouston, M., Paquette, S.O., and Clay, E. (2024). The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums. arXiv."},{"key":"ref_117","unstructured":"Wu, Z., Tang, F., Zhao, M., and Li, Y. (2024). KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment. arXiv."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"102763","DOI":"10.1016\/j.cose.2022.102763","article-title":"Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text","volume":"120","author":"Jo","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Liu, J., and Zhan, J. (2024, January 15\u201318). Constructing Knowledge Graph from Cyber Threat Intelligence Using Large Language Model. Proceedings of the 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy.","DOI":"10.1109\/BigData59044.2023.10386611"},{"key":"ref_120","unstructured":"Karuna, P., Hemberg, E., O\u2019Reilly, U.M., and Rutar, N. (2021). Automating cyber threat hunting using NLP, automated query generation, and genetic perturbation. arXiv."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Tanksale, V. (2024, January 19\u201322). Cyber Threat Hunting Using Large Language Models. Proceedings of the International Congress on Information and Communication Technology, London, UK.","DOI":"10.1007\/978-981-97-3289-0_50"},{"key":"ref_122","unstructured":"Jiang, Y., Zhang, C., He, S., Yang, Z., Ma, M., Qin, S., Kang, Y., Dang, Y., Rajmohan, S., and Lin, Q. (2023, January 14\u201320). Xpert: Empowering Incident Management with Query Recommendations via Large Language Models. Proceedings of the 2023 International Conference on Incident Management, Lisbon, Portugal."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Grigorev, A., Saleh, K., Ou, Y., and Mihaita, A.S. (2024, January 24\u201327). Enhancing Traffic Incident Management with Large Language Models: A Hybrid Machine Learning Approach for Severity Classification. Proceedings of the Proceedings of the 2024 International Conference on Intelligent Transportation Systems (ITSC), Edmonton, AB, Canada.","DOI":"10.1007\/s13177-024-00448-7"},{"key":"ref_124","unstructured":"Chen, Z., Kang, Y., Li, L., Zhang, X., Zhang, H., Xu, H., Zhou, Y., Yang, L., Sun, J., and Xu, Z. (2023, January 14\u201320). Towards Intelligent Incident Management: Why We Need It and How We Make It. Proceedings of the ACM\/IEEE International Conference on Software Engineering (ICSE), Melbourne, VIC, Australia."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Tharayil, S.M., Alotaibi, N.M., Idris, M.A., and Aldhalaan, B.H. (2024). Combining NLP and Generative Models for Predicting Incident Category and Incident Routing in Incidents Management Systems. Information Systems Engineering and Management (ISEM, Volume 5), Springer.","DOI":"10.1007\/978-3-031-65014-7_7"},{"key":"ref_126","unstructured":"Grigorev, A., Saleh, A.S.M.K., and Ou, Y. (2024). IncidentResponseGPT: Generating traffic incident response plans with generative artificial intelligence. arXiv."},{"key":"ref_127","unstructured":"Tulechki, N. (2024). Natural Language Processing of Incident and Accident Reports: Application to Risk Management in Civil Aviation. [Ph.D. Thesis, Universit\u00e9 Toulouse le Mirail-Toulouse II]."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"100074","DOI":"10.1016\/j.nlp.2024.100074","article-title":"An innovative GPT-based open-source intelligence using historical cyber incident reports","volume":"7","author":"Sufi","year":"2024","journal-title":"Nat. Lang. Process. J."},{"key":"ref_129","first-page":"102","article-title":"Unveiling Security, Privacy, and Ethical Concerns of ChatGPT","volume":"2","author":"Wu","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_130","first-page":"102","article-title":"Privacy Issues in Large Language Models: A Survey","volume":"2","author":"Kibriya","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Plant, R., Giuffrida, V., and Gkatzia, D. (2022). You Are What You Write: Preserving Privacy in the Era of Large Language Models. arXiv.","DOI":"10.2139\/ssrn.4417900"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Brown, H., Lee, K., Mireshghallah, F., Shokri, R., and Tram\u00e8r, F. (2022, January 21\u201324). What Does it Mean for a Language Model to Preserve Privacy?. Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT \u201922), Seoul, Republic of Korea.","DOI":"10.1145\/3531146.3534642"},{"key":"ref_133","unstructured":"Peris, C., Dupuy, C., Majmudar, J., Parikh, R., Smaili, S., Zemel, R., and Gupta, R. (March, January 27). Privacy in the Time of Language Models. Proceedings of the WSDM \u201923: Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, Singapore."},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Rodriguez, D., Yang, I., Del Alamo, J.M., and Sadeh, N. (2024). Large language models: A new approach for privacy policy analysis at scale. J. Comput., 123\u2013145.","DOI":"10.1007\/s00607-024-01331-9"},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Alsalemi, A., Al-Kababji, A., Himeur, Y., Bensaali, F., and Amira, A. (2020, January 7\u201310). Cloud energy micro-moment data classification: A platform study. Proceedings of the 2020 IEEE\/ACM 13th International Conference on Utility and Cloud Computing (UCC), Leicester, UK.","DOI":"10.1109\/UCC48980.2020.00066"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s13677-023-00574-9","article-title":"A Transformer-based network intrusion detection approach for cloud security","volume":"13","author":"Long","year":"2024","journal-title":"J. Cloud Comput."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Bulut, M.F., and Hwang, J. (2021, January 5\u201310). NL2Vul: Natural Language to Standard Vulnerability Score for Cloud Security Posture Management. Proceedings of the 2021 IEEE 14th International Conference on Cloud Computing (CLOUD), Chicago, IL, USA.","DOI":"10.1109\/CLOUD53861.2021.00073"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Chen, Y., Xie, H., Ma, M., Kang, Y., Gao, X., Shi, L., Cao, Y., Gao, X., Fan, H., and Wen, M. (2024, January 22\u201325). Automatic Root Cause Analysis via Large Language Models for Cloud Incidents. Proceedings of the Nineteenth European Conference on Computer Systems (EuroSys \u201924), Athens, Greece.","DOI":"10.1145\/3627703.3629553"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Kilhoffer, Z., and Bashir, M. (2024, January 27\u201328). Cloud Privacy Beyond Legal Compliance: An NLP Analysis of Certifiable Privacy and Security Standards. Proceedings of the 2024 IEEE Cloud Summit, Washington, DC, USA.","DOI":"10.1109\/Cloud-Summit61220.2024.00020"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s10270-019-00747-8","article-title":"A Security Requirements Modelling Language for Cloud Computing Environments","volume":"19","author":"Mouratidis","year":"2020","journal-title":"Softw. Syst. Model."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"124736","DOI":"10.1016\/j.eswa.2024.124736","article-title":"Knowledge Retrieval and Diagnostics in Cloud Services with Large Language Models","volume":"255","author":"Baghdasaryan","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Cao, D., and Jun, W. (2024, January 20\u201323). LLM-CloudSec: Large Language Model Empowered Automatic and Deep Vulnerability Analysis for Intelligent Clouds. Proceedings of the IEEE INFOCOM 2024\u2014IEEE Conference on Computer Communications, Vancouver, BC, Canada.","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620804"},{"key":"ref_143","unstructured":"Mahajan, S., Khurana, M., and Estrela, V.V. (2024). Enhancing Security in Cloud Computing Using Artificial Intelligence (AI). Advancements in Artificial Intelligence and Cloud Computing, Wiley. Chapter 11."},{"key":"ref_144","unstructured":"Song, C., Ma, L., Zheng, J., Liao, J., Kuang, H., and Yang, L. (2024). Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection. arXiv."},{"key":"ref_145","unstructured":"Xia, S., Shao, S., He, M., Yu, T., Song, L., and Zhang, Y. (2024). AuditGPT: Auditing Smart Contracts with ChatGPT. arXiv."},{"key":"ref_146","unstructured":"Fotoh, L.E., and Mugwira, T. (2024). Exploring Large Language Models in External Audits: Implications and Ethical Considerations. SSRN Preprint."},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Cartwright, O., Dunbar, H., and Radcliffe, T. (2024). Evaluating Privacy Compliance in Commercial Large Language Models\u2014ChatGPT, Claude, and Gemini. Preprint.","DOI":"10.21203\/rs.3.rs-4792047\/v1"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Hassani, S. (2024). Enhancing Legal Compliance and Regulation Analysis with Large Language Models. arXiv.","DOI":"10.1109\/RE59067.2024.00065"},{"key":"ref_149","unstructured":"Zhu, L., Yang, L., Li, C., Hu, S., Liu, L., and Yin, B. (2024). LEGILM: A Fine-Tuned Legal Language Model for Data Compliance. arXiv."},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Chard, S., Johnson, B., and Lewis, D. (2024). Auditing Large Language Models for Privacy Compliance with Specially Crafted Prompts. OSF Preprint.","DOI":"10.31219\/osf.io\/8tgkx"},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Sharif, M., Datta, P., Riddle, A., Westfall, K., Bates, A., Ganti, V., Lentzk, M., and Ott, D. (2024, January 20\u201322). DrSec: Flexible Distributed Representations for Efficient Endpoint Security. Proceedings of the 2024 IEEE Symposium on Security and Privacy, San Francisco, CA, USA.","DOI":"10.1109\/SP54263.2024.00145"},{"key":"ref_152","unstructured":"Motlagh, F.N., Hajizadeh, M., Majd, M., Najafi, P., Cheng, F., and Meinel, C. (2024). Large Language Models in Cybersecurity: State-of-the-Art. arXiv."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Black, G.S., Rimal, B.P., and Vaidyan, V.M. (2024). Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models. IEEE Transa. Emerg. Top. Comput., 1\u201312.","DOI":"10.1109\/TETCI.2024.3446695"},{"key":"ref_154","unstructured":"Shao, M., Chen, B., Jancheska, S., Dolan-Gavitt, B., Garg, S., Karri, R., and Shafique, M. (2024). An Empirical Evaluation of LLMs for Solving Offensive Security Challenges. arXiv."},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Ren, Q., Gao, C., Shao, J., Yan, J., Tan, X., Lam, W., and Ma, L. (2024). CodeAttack: Revealing Safety Generalization Challenges of Large Language Models via Code Completion. arXiv.","DOI":"10.18653\/v1\/2024.findings-acl.679"},{"key":"ref_156","unstructured":"Cui, T., Wang, Y., Fu, C., Xiao, Y., Li, S., Deng, X., Liu, Y., Zhang, Q., Qiu, Z., and Li, P. (2024). Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems. arXiv."},{"key":"ref_157","doi-asserted-by":"crossref","unstructured":"Szab\u00f3, Z., and Bilicki, V. (2023). A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection. Future Internet, 15.","DOI":"10.3390\/fi15100326"},{"key":"ref_158","first-page":"238837","article-title":"Natural Language Processing for Financial Regulation","volume":"8","author":"Achitouv","year":"2020","journal-title":"IEEE Access"},{"key":"ref_159","first-page":"23892","article-title":"CyberBERT: A Pre-trained Language Model for Cybersecurity","volume":"9","author":"Alashri","year":"2021","journal-title":"IEEE Access"},{"key":"ref_160","unstructured":"Corporation, T.M. (2024, May 21). MITRE ATT&CK Framework: A Knowledge Base for Adversary Tactics and Techniques. MITRE Technical Reports. Available online: https:\/\/attack.mitre.org\/."},{"key":"ref_161","unstructured":"Parliament and of the European Union (2016). General Data Protection Regulation (GDPR), Parliament and of the European Union."},{"key":"ref_162","unstructured":"US Department of Health and Human Services (1996). Health Insurance Portability and Accountability Act of 1996 (HIPAA), US Department of Health and Human Services."},{"key":"ref_163","doi-asserted-by":"crossref","unstructured":"Wang, W., Sadjadi, S.M., and Rishe, N. (2024, January 10\u201312). A Survey of Major Cybersecurity Compliance Frameworks. Proceedings of the IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity), New York, NY, USA.","DOI":"10.1109\/BigDataSecurity62737.2024.00013"},{"key":"ref_164","unstructured":"Yao, X., Wu, X., Li, X., Xu, H., Li, C., Huang, P., Li, S., Ma, X., and Shan, J. (2024). Smart Audit System Empowered by LLM. arXiv."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Sarker, I.H. (2024). Generative AI and Large Language Modeling in Cybersecurity. AI-Driven Cybersecurity and Threat Intelligence: Cyber Automation, Intelligent Decision-Making and Explainability, Springer Nature.","DOI":"10.1007\/978-3-031-54497-2"},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"155498","DOI":"10.1109\/ACCESS.2024.3427369","article-title":"LLM for soc security: A paradigm shift","volume":"12","author":"Saha","year":"2024","journal-title":"IEEE Access"},{"key":"ref_167","doi-asserted-by":"crossref","unstructured":"Jones, A.J. (2024). Justo Integration of LLMs with Traditional Security Tools. Application of Large Language Models (LLMs) for Software Vulnerability Detection, IGI Global.","DOI":"10.4018\/979-8-3693-9311-6.ch008"},{"key":"ref_168","unstructured":"Johnson, O., Mozes, M., He, X., Kleinberg, B., and Griffin, L.D. (2023). Use of llms for illicit purposes: Threats, prevention measures, and vulnerabilities. arXiv."},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Ayoobi, N., Shahriar, S., and Mukherjee, A. (2023, January 4\u20138). The looming threat of fake and llm-generated linkedin profiles: Challenges and opportunities for detection and prevention. Proceedings of the 34th ACM Conference on Hypertext and Social Media, Rome, Italy.","DOI":"10.1145\/3603163.3609064"},{"key":"ref_170","first-page":"1205","article-title":"Interpretable Insights for Cybersecurity Stakeholders Using LLMs","volume":"30","author":"White","year":"2021","journal-title":"AI Soc."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Hildebrandt, C., Woodlief, T., and Elbaum, S. (2024, January 13\u201318). ODD-diLLMma: Driving Automation System ODD Compliance Checking using LLMs. Proceedings of the IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/IROS58592.2024.10801369"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Ranade, P., Piplai, A., Joshi, A., and Finin, T. (2021, January 15\u201318). Cybert: Contextualized embeddings for the cybersecurity domain. Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Virtual.","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"ref_173","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1093\/bioinformatics\/btz682","article-title":"BioBERT: A pre-trained biomedical language representation model for biomedical text mining","volume":"36","author":"Lee","year":"2020","journal-title":"Bioinformatics"},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Beltagy, I., Lo, K., and Cohan, A. (2019). SciBERT: A pretrained language model for scientific text. arXiv.","DOI":"10.18653\/v1\/D19-1371"},{"key":"ref_175","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., and Soricut, R. (2019). ALBERT: A lite BERT for self-supervised learning of language representations. arXiv."},{"key":"ref_176","doi-asserted-by":"crossref","unstructured":"Tony, C., Mutas, M., Ferreyra, N.E.D., and Scandariato, R. (2023, January 15\u201316). Llmseceval: A dataset of natural language prompts for security evaluations. Proceedings of the 2023 IEEE\/ACM 20th International Conference on Mining Software Repositories (MSR), Melbourne, Australia.","DOI":"10.1109\/MSR59073.2023.00084"},{"key":"ref_177","unstructured":"Hazell, J. (2023). Spear Phishing with Large Language Models. arXiv."},{"key":"ref_178","unstructured":"Fayyazi, R., and Yang, S.J. (2023). On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions. arXiv."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"68633","DOI":"10.1109\/ACCESS.2022.3185748","article-title":"An attack detection framework based on BERT and deep learning","volume":"10","author":"Seyyar","year":"2022","journal-title":"IEEE Access"},{"key":"ref_180","unstructured":"Liu, Z., Shi, J., and Buford, J.F. (2024, January 20\u201327). CyberBench: A Multi-Task Benchmark for Evaluating Large Language Models in Cybersecurity. Proceedings of the AAAI-24 Workshop on Artificial Intelligence for Cyber Security (AICS), Vancouver, BC, Canada."},{"key":"ref_181","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C., Le, T., Nguyen, V., and Phung, D. (2022, January 14\u201318). VulRepair: A T5-Based Automated Software Vulnerability Repair. Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Singapore.","DOI":"10.1145\/3540250.3549098"},{"key":"ref_182","unstructured":"Ferrag, M.A., Battah, A., Tihanyi, N., Debbah, M., Lestable, T., and Cordeiro, L.C. (2023). Securefalcon: The next cyber reasoning system for cyber security. arXiv."},{"key":"ref_183","unstructured":"Koide, T., Fukushi, N., Nakano, H., and Chiba, D. (2023). Detecting phishing sites using chatgpt. arXiv."},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Gur, I., Nachum, O., Miao, Y., Safdari, M., Huang, A., Chowdhery, A., Narang, S., Fiedel, N., and Faust, A. (2023). Understanding HTML with Large Language Models. arXiv.","DOI":"10.18653\/v1\/2023.findings-emnlp.185"},{"key":"ref_185","unstructured":"Ali, T., and Kostakos, P. (2023). HuntGPT: Integrating Machine Learning-Based Anomaly Detection and Explainable AI with Large Language Models (LLMs). arXiv."},{"key":"ref_186","doi-asserted-by":"crossref","unstructured":"Greshake, K., Abdelnabi, S., Mishra, S., Endres, C., Holz, T., and Fritz, M. (2023, January 26\u201330). Not what you\u2019ve signed up for: Compromising real-world llm-integrated applications with indirect prompt injection. Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, Copenhagen, Denmark.","DOI":"10.1145\/3605764.3623985"},{"key":"ref_187","unstructured":"Zhang, Y., and Ippolito, D. (2023). Prompts should not be seen as secrets: Systematically measuring prompt extraction attack success. arXiv."},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Yan, J., Gupta, V., and Ren, X. (2022). Bite: Textual backdoor attacks with iterative trigger injection. arXiv.","DOI":"10.18653\/v1\/2023.acl-long.725"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Qi, X., Huang, K., Panda, A., Wang, M., and Mittal, P. (2023). Visual adversarial examples jailbreak large language models. arXiv.","DOI":"10.1609\/aaai.v38i19.30150"},{"key":"ref_190","unstructured":"Bagdasaryan, E., Hsieh, T.Y., Nassi, B., and Shmatikov, V. (2023). (Ab) using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs. arXiv."},{"key":"ref_191","unstructured":"Bailey, L., Ong, E., Russell, S., and Emmons, S. (2023). Image hijacking: Adversarial images can control generative models at runtime. arXiv."},{"key":"ref_192","first-page":"80079","article-title":"Jailbroken: How does llm safety training fail?","volume":"36","author":"Wei","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_193","unstructured":"Qiu, H., Zhang, S., Li, A., He, H., and Lan, Z. (2023). Latent jailbreak: A benchmark for evaluating text safety and output robustness of large language models. arXiv."},{"key":"ref_194","unstructured":"Shayegani, E., Mamun, M.A.A., Fu, Y., Zaree, P., Dong, Y., and Abu-Ghazaleh, N. (2023). Survey of vulnerabilities in large language models revealed by adversarial attacks. arXiv."},{"key":"ref_195","first-page":"61478","article-title":"Are aligned neural networks adversarially aligned?","volume":"36","author":"Carlini","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_196","unstructured":"Zou, A., Wang, Z., Kolter, J.Z., and Fredrikson, M. (2023). Universal and transferable adversarial attacks on aligned language models. arXiv."},{"key":"ref_197","doi-asserted-by":"crossref","unstructured":"Cao, B., Cao, Y., Lin, L., and Chen, J. (2023). Defending against alignment-breaking attacks via robustly aligned llm. arXiv.","DOI":"10.18653\/v1\/2024.acl-long.568"},{"key":"ref_198","unstructured":"Yu, J., Lin, X., and Xing, X. (2023). Gptfuzzer: Red teaming large language models with auto-generated jailbreak prompts. arXiv."},{"key":"ref_199","unstructured":"Liu, X., Xu, N., Chen, M., and Xiao, C. (2023). Autodan: Generating stealthy jailbreak prompts on aligned large language models. arXiv."},{"key":"ref_200","unstructured":"Zeng, Y., Wu, Y., Zhang, X., Wang, H., and Wu, Q. (2024). Autodefense: Multi-agent llm defense against jailbreak attacks. arXiv."},{"key":"ref_201","unstructured":"Helbling, A., Phute, M., Hull, M., and Chau, D.H. (2023). Llm self defense: By self examination, llms know they are being tricked. arXiv."},{"key":"ref_202","unstructured":"Alon, G., and Kamfonas, M. (2023). Detecting language model attacks with perplexity. arXiv."},{"key":"ref_203","unstructured":"Jain, N., Schwarzschild, A., Wen, Y., Somepalli, G., Kirchenbauer, J., Chiang, P.y., Goldblum, M., Saha, A., Geiping, J., and Goldstein, T. (2023). Baseline defenses for adversarial attacks against aligned language models. arXiv."},{"key":"ref_204","unstructured":"Zhu, S., Zhang, R., An, B., Wu, G., Barrow, J., Wang, Z., Huang, F., Nenkova, A., and Sun, T. (2023). Autodan: Automatic and interpretable adversarial attacks on large language models. arXiv."},{"key":"ref_205","doi-asserted-by":"crossref","unstructured":"Li, H., Guo, D., Fan, W., Xu, M., Huang, J., Meng, F., and Song, Y. (2023). Multi-step jailbreaking privacy attacks on chatgpt. arXiv.","DOI":"10.18653\/v1\/2023.findings-emnlp.272"},{"key":"ref_206","unstructured":"Yuan, Y., Jiao, W., Wang, W., Huang, J.t., He, P., Shi, S., and Tu, Z. (2023). Gpt-4 is too smart to be safe: Stealthy chat with llms via cipher. arXiv."},{"key":"ref_207","unstructured":"Deng, Y., Zhang, W., Pan, S.J., and Bing, L. (2023). Multilingual jailbreak challenges in large language models. arXiv."},{"key":"ref_208","unstructured":"Bhatt, M., Chennabasappa, S., Li, Y., Nikolaidis, C., Song, D., Wan, S., Ahmad, F., Aschermann, C., Chen, Y., and Kapil, D. (2024). Cyberseceval 2: A wide-ranging cybersecurity evaluation suite for large language models. arXiv."},{"key":"ref_209","unstructured":"Hossen, M.I., Zhang, J., Cao, Y., and Hei, X. (2024). Assessing Cybersecurity Vulnerabilities in Code Large Language Models. arXiv."},{"key":"ref_210","unstructured":"Tann, W., Liu, Y., Sim, J.H., Seah, C.M., and Chang, E.C. (2023). Using large language models for cybersecurity capture-the-flag challenges and certification questions. arXiv."},{"key":"ref_211","doi-asserted-by":"crossref","unstructured":"Shahid, M.R., and Debar, H. (2021, January 13\u201316). Cvss-bert: Explainable natural language processing to determine the severity of a computer security vulnerability from its description. Proceedings of the 2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA), Pasadena, CA, USA.","DOI":"10.1109\/ICMLA52953.2021.00256"},{"key":"ref_212","doi-asserted-by":"crossref","unstructured":"Quinn, T., and Thompson, O. (2024). Applying Large Language Model (LLM) for Developing Cybersecurity Policies to Counteract Spear Phishing Attacks on Senior Corporate Managers. Res. Sq.","DOI":"10.21203\/rs.3.rs-4405206\/v1"},{"key":"ref_213","unstructured":"Kaddour, J., Harris, J., Mozes, M., Bradley, H., Raileanu, R., and McHardy, R. (2023). Challenges and Applications of Large Language Models. arXiv."},{"key":"ref_214","doi-asserted-by":"crossref","unstructured":"Das, B.C., and Amini, M.H. (2024). Security and Privacy Challenges of Large Language Models: A Survey. arXiv.","DOI":"10.1145\/3712001"},{"key":"ref_215","unstructured":"Yang, J., Jin, H., Tang, R., Han, X., Feng, Q., Jiang, H., Yin, B., and Hu, X. (2023). Harnessing the Power of LLMs in Practice: A Survey on ChatGPT and Beyond. arXiv."},{"key":"ref_216","unstructured":"Abdali, S., Anarfi, R., Barberan, C., and He, J. (2024). Securing Large Language Models: Threats, Vulnerabilities and Responsible Practices. arXiv."},{"key":"ref_217","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s13735-024-00334-8","article-title":"Adversarial attacks and defenses for large language models (LLMs): Methods, frameworks & challenges","volume":"13","author":"Kumar","year":"2024","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"ref_218","unstructured":"Weidinger, L., Mellor, J., Rauh, M., Griffin, C., Uesato, J., Huang, P.-S., Cheng, M., Glaese, M., Balle, B., and Kasirzadeh, A. (2021). Ethical and social risks of harm from language models. arXiv."},{"key":"ref_219","doi-asserted-by":"crossref","unstructured":"Lee, H., Hong, S.J., Park, J., Kim, T., Kim, G., and Ha, J.H. (2023). KoSBI: A Dataset for Mitigating Social Bias Risks Towards Safer Large Language Model Applications. arXiv.","DOI":"10.18653\/v1\/2023.acl-industry.21"},{"key":"ref_220","unstructured":"(2023, May 01). ChatGPT Banned in Italy Over Privacy Concerns. Available online: https:\/\/www.bbc.com\/news\/technology-65139406."},{"key":"ref_221","unstructured":"Glukhov, D., Shumailov, I., Gal, Y., Papernot, N., and Papyan, V. (2023). LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?. arXiv."},{"key":"ref_222","unstructured":"Chen, C., Feng, X., Zhou, J., Yin, J., and Zheng, X. (2023). Federated Large Language Model: A Position Paper. arXiv."},{"key":"ref_223","doi-asserted-by":"crossref","unstructured":"Pan, Y., Pan, L., Chen, W., Nakov, P., Kan, M.Y., and Wang, W.Y. (2023). On the Risk of Misinformation Pollution with Large Language Models, National University of Singapore.","DOI":"10.18653\/v1\/2023.findings-emnlp.97"},{"key":"ref_224","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MITP.2023.3275489","article-title":"Cybercrime and Privacy Threats of Large Language Models","volume":"25","author":"Kshetri","year":"2023","journal-title":"IT Prof."},{"key":"ref_225","first-page":"280","article-title":"A Survey on ChatGPT: AI-Generated Contents, Challenges, and Solutions","volume":"4","author":"Wang","year":"2023","journal-title":"IEEE Trans. Cybern."},{"key":"ref_226","doi-asserted-by":"crossref","unstructured":"Al-kfairy, M., Mustafa, D., Kshetri, N., Insiew, M., and Alfandi, O. (2024). Ethical challenges and solutions of generative AI: An interdisciplinary perspective. Informatics, 11.","DOI":"10.2139\/ssrn.4833030"},{"key":"ref_227","doi-asserted-by":"crossref","unstructured":"Feretzakis, G., Papaspyridis, K., Gkoulalas-Divanis, A., and Verykios, V.S. (2024). Privacy-Preserving Techniques in Generative AI and Large Language Models: A Narrative Review. Information, 15.","DOI":"10.3390\/info15110697"},{"key":"ref_228","doi-asserted-by":"crossref","first-page":"114","DOI":"10.3390\/digital4010005","article-title":"Effectiveness of ChatGPT in coding: A comparative analysis of popular large language models","volume":"4","author":"Coello","year":"2024","journal-title":"Digital"},{"key":"ref_229","doi-asserted-by":"crossref","unstructured":"Huang, K., Li, Y., and Thaine, P. (2024). Use GenAI Tools to Boost Your Security Posture. Generative AI Security: Theories and Practices, Springer.","DOI":"10.1007\/978-3-031-54252-7_10"},{"key":"ref_230","unstructured":"Carlini, N., Tramer, F., Wallace, E., Jagielski, M., Herbert-Voss, A., Lee, K., Roberts, A., Brown, T.B., Song, D., and Erlingsson, \u00da. (2020). Extracting Training Data from Large Language Models. arXiv."},{"key":"ref_231","first-page":"32748","article-title":"Defending pre-trained language models as few-shot learners against backdoor attacks","volume":"36","author":"Xi","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_232","doi-asserted-by":"crossref","unstructured":"Guo, P., Liu, F., Lin, X., Zhao, Q., and Zhang, Q. (2024). L-autoda: Leveraging large language models for automated decision-based adversarial attacks. arXiv.","DOI":"10.1145\/3638530.3664121"},{"key":"ref_233","first-page":"65665","article-title":"Trojllm: A black-box trojan prompt attack on large language models","volume":"36","author":"Xue","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_234","unstructured":"Jin, M., Zhu, S., Wang, B., Zhou, Z., Zhang, C., and Zhang, Y. (2024). Attackeval: How to evaluate the effectiveness of jailbreak attacking on large language models. arXiv."},{"key":"ref_235","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/MNET.2024.3367788","article-title":"A comprehensive overview of backdoor attacks in large language models within communication networks","volume":"38","author":"Yang","year":"2024","journal-title":"IEEE Netw."},{"key":"ref_236","doi-asserted-by":"crossref","unstructured":"Wang, Y., Dong, X., Caverlee, J., and Yu, P.S. (2024). DA3: A Distribution-Aware Adversarial Attack against Language Models. arXiv.","DOI":"10.18653\/v1\/2024.emnlp-main.107"},{"key":"ref_237","unstructured":"Cui, J., Xu, Y., Huang, Z., Zhou, S., Jiao, J., and Zhang, J. (2024). Recent advances in attack and defense approaches of large language models. arXiv."},{"key":"ref_238","doi-asserted-by":"crossref","unstructured":"Zhao, W., Li, Z., Li, Y., Zhang, Y., and Sun, J. (2024). Defending Large Language Models Against Jailbreak Attacks via Layer-specific Editing. arXiv.","DOI":"10.18653\/v1\/2024.findings-emnlp.293"},{"key":"ref_239","first-page":"36267312","article-title":"Evaluation of domain-specific prompt engineering attacks on large language models","volume":"362","author":"Ashcroft","year":"2024","journal-title":"ESS Open Arch. Eprints"},{"key":"ref_240","unstructured":"Wu, T., Luo, L., Li, Y.F., Pan, S., Vu, T.T., and Haffari, G. (2023). Continual Learning for Large Language Models: A Survey. arXiv."},{"key":"ref_241","doi-asserted-by":"crossref","unstructured":"Ai, L., Kumarage, T., Bhattacharjee, A., Liu, Z., Hui, Z., Davinroy, M., Cook, J., Cassani, L., Trapeznikov, K., and Kirchner, M. (2024). Defending Against Social Engineering Attacks in the Age of LLMs. arXiv.","DOI":"10.18653\/v1\/2024.emnlp-main.716"},{"key":"ref_242","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-024-10973-2","article-title":"Digital Deception: Generative artificial intelligence in social engineering and phishing","volume":"57","author":"Schmitt","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref_243","unstructured":"Hassanin, M., and Moustafa, N. (2024). A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions. arXiv."},{"key":"ref_244","doi-asserted-by":"crossref","first-page":"104137","DOI":"10.1016\/j.cose.2024.104137","article-title":"Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study","volume":"148","author":"Waelchli","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_245","unstructured":"Karlzen, H., and Sommestad, T. (September, January 29). Automatic incident response solutions: A review of proposed solutions\u2019 input and output. Proceedings of the 18th International Conference on Availability, Reliability and Security, Benevento, Italy."},{"key":"ref_246","doi-asserted-by":"crossref","unstructured":"Kyaw, P.H., Gutierrez, J., and Ghobakhlou, A. (2024). A Systematic Review of Deep Learning Techniques for Phishing Email Detection. Electronics, 13.","DOI":"10.3390\/electronics13193823"},{"key":"ref_247","doi-asserted-by":"crossref","first-page":"100211","DOI":"10.1016\/j.hcc.2024.100211","article-title":"A survey on large language model (llm) security and privacy: The good, the bad, and the ugly","volume":"4","author":"Yao","year":"2024","journal-title":"High-Confid. Comput."},{"key":"ref_248","unstructured":"Xu, H., Wang, S., Li, N., Wang, K., Zhao, Y., Chen, K., Yu, T., Liu, Y., and Wang, H. (2024). Large language models for cyber security: A systematic literature review. arXiv."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/2\/30\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:38:14Z","timestamp":1759919894000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/2\/30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,29]]},"references-count":248,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["computation13020030"],"URL":"https:\/\/doi.org\/10.3390\/computation13020030","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,29]]}}}