Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/11857
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Güven M. | - |
dc.date.accessioned | 2024-11-10T14:56:03Z | - |
dc.date.available | 2024-11-10T14:56:03Z | - |
dc.date.issued | 2024 | - |
dc.identifier.issn | 2149-9144 | - |
dc.identifier.uri | https://doi.org/10.22399/ijcesen.469 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/11857 | - |
dc.description.abstract | In response to the escalating complexity of cyber threats and the rapid expansion of digital environments, traditional detection models are proving increasingly inadequate. The advent of Large Language Models (LLMs) powered by Natural Language Processing (NLP) represents a transformative advancement in cyber security. This review explores the burgeoning landscape of LLM applications in cyber security, highlighting their significant potential across various threat detection domains. Recent advancements have demonstrated LLMs' efficacy in enhancing tasks such as cyber threat intelligence, phishing detection, anomaly detection through log analysis, and more. By synthesizing recent literature, this paper provides a comprehensive overview of how LLMs are reshaping cyber security frameworks. It also discusses current challenges and future directions, aiming to guide researchers and practitioners in leveraging LLMs effectively to fortify digital defences and mitigate evolving cyber threats. © IJCESEN. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Prof.Dr. İskender AKKURT | en_US |
dc.relation.ispartof | International Journal of Computational and Experimental Science and Engineering | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Cyber Security | en_US |
dc.subject | Large Language Models | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Malware Analysis | en_US |
dc.title | A Comprehensive Review of Large Language Models in Cyber Security | en_US |
dc.type | Review | en_US |
dc.department | TOBB ETÜ | en_US |
dc.identifier.volume | 10 | en_US |
dc.identifier.issue | 3 | en_US |
dc.identifier.startpage | 507 | en_US |
dc.identifier.endpage | 516 | en_US |
dc.identifier.scopus | 2-s2.0-85206578198 | en_US |
dc.institutionauthor | Güven M. | - |
dc.identifier.doi | 10.22399/ijcesen.469 | - |
dc.authorscopusid | 56343141800 | - |
dc.relation.publicationcategory | Diğer | en_US |
item.openairetype | Review | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
3
checked on Dec 21, 2024
Page view(s)
60
checked on Dec 16, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.