Large language models in cybersecurity: State-of-the-art

FN Motlagh, M Hajizadeh, M Majd, P Najafi… - arXiv preprint arXiv …, 2024 - arxiv.org
The rise of Large Language Models (LLMs) has revolutionized our comprehension of
intelligence bringing us closer to Artificial Intelligence. Since their introduction, researchers …

Ethical dilemmas and moral frameworks: navigating the integration of artificial intelligence in Islamic societies

I Rahayu, H Ardiyanti, L Judijanto, A Hamid… - International Journal of …, 2023 - injotel.org
In Islamic societies, integrating artificial intelligence (AI) poses significant ethical dilemmas,
necessitating a careful navigation of moral frameworks. This abstract encapsulates the …

Review of generative ai methods in cybersecurity

Y Yigit, WJ Buchanan, MG Tehrani… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) and generative artificial intelligence (GenAI) constitute
paradigm shifts in cybersecurity that present hitherto unseen challenges as well as …

Enhancing Network Attack Detection Accuracy through the Integration of Large Language Models and Synchronized Attention Mechanism

Y Bai, M Sun, L Zhang, Y Wang, S Liu, Y Liu, J Tan… - Applied Sciences, 2024 - mdpi.com
In this study, we propose a novel method for detecting cyberattack behaviors by leveraging
the combined strengths of large language models and a synchronized attention mechanism …

Analisis Peran Keamanan Siber dan Keterampilan Digital dalam Pertumbuhan Usaha Kecil Menengah di Era Ekonomi Digital di Indonesia

IA Napu, E Supriatna, C Safitri… - Sanskara Ekonomi …, 2024 - sj.eastasouth-institute.com
Penelitian ini menyelidiki peran penting langkah-langkah keamanan siber dan keterampilan
digital dalam mendorong pertumbuhan Usaha Kecil dan Menengah (UKM) dalam ekonomi …

[PDF][PDF] A New Approach in Diagnosing and Preventing SQLIA with Large Language Models (LLMs)

A Rezanejad, AS Danesh, F Feyzi - 2023 - cccs.sgh.ac.ir
SQL injection attack is considered to be one of the most important and common methods of
intrusion into databases. The current research was conducted with the aim of improving the …