Domain specialization as the key to make large language models disruptive: A comprehensive survey

C Ling, X Zhao, J Lu, C Deng, C Zheng, J Wang… - arXiv preprint arXiv …, 2023 - arxiv.org
Large language models (LLMs) have significantly advanced the field of natural language
processing (NLP), providing a highly useful, task-agnostic foundation for a wide range of …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Navigating the security landscape of large language models in enterprise information systems

BB Gupta, A Gaurav, V Arya - Enterprise Information Systems, 2024 - Taylor & Francis
In this letter, we present a comprehensive analysis of the security landscape surrounding
large language models, leveraging a dataset from 2022 to 2023. We delve into the …

Interpretability and transparency-driven detection and transformation of textual adversarial examples (it-dt)

B Sabir, MA Babar, S Abuadbba - arXiv preprint arXiv:2307.01225, 2023 - arxiv.org
Transformer-based text classifiers like BERT, Roberta, T5, and GPT-3 have shown
impressive performance in NLP. However, their vulnerability to adversarial examples poses …

Controllable fake document infilling for cyber deception

Y Hu, Y Lin, ES Parolin, L Khan, K Hamlen - arXiv preprint arXiv …, 2022 - arxiv.org
Recent works in cyber deception study how to deter malicious intrusion by generating
multiple fake versions of a critical document to impose costs on adversaries who need to …

A survey of large language models for cyber threat detection

Y Chen, M Cui, D Wang, Y Cao, P Yang, B Jiang… - Computers & …, 2024 - Elsevier
With the increasing complexity of cyber threats and the expanding scope of cyberspace,
there exist progressively more challenges in cyber threat detection. It's proven that most …

Boosting D3FEND: Ontological analysis and recommendations

Í Oliveira, G Engelberg, PPF Barcelos… - Formal Ontology in …, 2023 - ebooks.iospress.nl
Formal Ontology is a discipline whose business is to develop formal theories about general
aspects of reality such as identity, dependence, parthood, truthmaking, causality, etc. A …

[PDF][PDF] Design the IoT Botnet Defense Process for Cybersecurity in Smart City.

D Kim, S Jeon, J Shin, JT Seo - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
The smart city comprises various infrastructures, including healthcare, transportation,
manufacturing, and energy. A smart city's Internet of Things (IoT) environment constitutes a …

[PDF][PDF] Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge.

S Zhang, X Su, P Shi, T Du, Y Han - Computers, Materials & …, 2023 - cdn.techscience.cn
ABSTRACT Cyber Threat Intelligence (CTI) is a valuable resource for cybersecurity defense,
but it also poses challenges due to its multi-source and heterogeneous nature. Security …