Application of Large Language Models in Cybersecurity: a Systematic Literature Review

I Hasanov, S Virtanen, A Hakkala, J Isoaho - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of Large Language Models (LLMs) is currently creating a major paradigm
shift in societies and businesses in the way digital technologies are used. While the …

Artificial intelligence: revolutionizing cyber security in the digital era

S Kumar, U Gupta, AK Singh, AK Singh - Journal of Computers …, 2023 - jcmm.co.in
As we navigate the digital era of the 21st century, cyber security has grown into a pressing
societal issue that requires innovative, cutting-edge solutions. In response to this pressing …

[PDF][PDF] Cyber security: performance analysis and challenges for cyber attacks detection

AA Salih, MB Abdulrazzaq - Indonesian Journal of Electrical …, 2023 - academia.edu
Nowadays, with the occurrence of new attacks and raised challenges have been facing the
security of computer systems. Cyber security techniques have become essential for …

Usage of AI Techniques for Cyberthreat Security System in Android Mobile Devices

PV Chintalapati, GR Babu, PK Sree, SK Kode… - International Conference …, 2023 - Springer
Due to technology advancements, every daily work has been automated since the
beginning of the digital era. Technology hasn't yet given individuals adequate resources and …

ExTRUST: Reducing Exploit Stockpiles With a Privacy-Preserving Depletion System for Inter-State Relationships

T Reinhold, P Kuehn, D Günther… - … on Technology and …, 2023 - ieeexplore.ieee.org
Cyberspace is a fragile construct threatened by malicious cyber operations of different
actors, with vulnerabilities in IT hardware and software forming the basis for such activities …

AI-Driven Cybersecurity: Balancing Advancements and Safeguards

A Shahana, R Hasan, SF Farabi… - Journal of …, 2024 - al-kindipublisher.com
Abstract As Artificial Intelligence (AI) continues its rapid evolution, its profound influence on
cybersecurity becomes increasingly evident. This study delves into the pivotal role of AI in …

Developing PDP model by using malware detection techniques for securing cloud storage data using cryptanalysis

S Kausar, S Sonekar, P Mane - AIP Conference Proceedings, 2022 - pubs.aip.org
This model advocates detection plus protection better than the existing one. This model will
first detect the malware and then remove the unwanted (delinquent systems) one. It will …

Towards a Peaceful Development of Cyberspace-Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of …

T Reinhold - 2023 - tuprints.ulb.tu-darmstadt.de
Cyberspace, already a few decades old, has become a matter of course for most of us, part
of our everyday life. At the same time, this space and the global infrastructure behind it are …

The Role of Cybersecurity in Combating Digital Crime-A Technical Perspective

B Madupati - Available at SSRN 5076618, 2024 - papers.ssrn.com
Cybercrime refers to the crime perpetrated on digital platforms, and it has emerged as a
growing phenomenon in the contemporary world, affecting everyone, including individuals …

Функціональна модель системи виявлення та прогнозування кіберзагроз для корпоративних комп'ютерних мереж з використанням експертних оцінок

М Міщенко - Технічні науки та технології, 2024 - tst.stu.cn.ua
Анотація У роботі представлено функціональне моделювання системи виявлення та
прогнозування кіберзагроз для кор-поративних комп'ютерних мереж із використанням …