AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08 Edge ComputingCybersecurityAutomated Intrusion Detection System 2024.08.08 2025.05.27 Literature Database
Zero-day attack and ransomware detection Authors: Steven Jabulani Nhlapo, Mike Nkongolo Wa Nkongolo | Published: 2024-08-08 CybersecurityRansomware AssessmentMachine Learning Method 2024.08.08 2025.05.27 Literature Database
Quantum Clustering for Cybersecurity Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique | Published: 2024-08-05 AlgorithmCybersecurityQuantum Framework 2024.08.05 2025.05.27 Literature Database
A Systematic Mapping Study on SDN Controllers for Enhancing Security in IoT Networks Authors: Charles Oredola, Adnan Ashraf | Published: 2024-08-02 SDN ArchitectureCybersecurityEvaluation Method 2024.08.02 2025.05.27 Literature Database
Ollabench: Evaluating LLMs’ Reasoning for Human-centric Interdependent Cybersecurity Authors: Tam n. Nguyen | Published: 2024-06-11 LLM Performance EvaluationCybersecurityEvaluation Method 2024.06.11 2025.05.27 Literature Database
Siren — Advancing Cybersecurity through Deception and Adaptive Analysis Authors: Samhruth Ananthanarayanan, Girish Kulathumani, Ganesh Narayanan | Published: 2024-06-10 | Updated: 2025-04-24 CybersecurityProactive DefenseCryptography 2024.06.10 2025.05.27 Literature Database
A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications Authors: Aydin Zaboli, Seong Lok Choi, Tai-Jin Song, Junho Hong | Published: 2024-06-08 LLM Performance EvaluationCybersecurityAnomaly Detection Method 2024.06.08 2025.05.27 Literature Database
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models Authors: Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian | Published: 2024-06-02 LLM SecurityCybersecurityCompliance with Ethical Guidelines 2024.06.02 2025.05.27 Literature Database
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23 LLM SecurityCybersecurityPrompt Injection 2024.05.23 2025.05.27 Literature Database
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17 LLM Performance EvaluationCybersecurityPrompt Injection 2024.05.21 2025.05.27 Literature Database