ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2204.02685
  4. Cited By
SecureBERT: A Domain-Specific Language Model for Cybersecurity

SecureBERT: A Domain-Specific Language Model for Cybersecurity

6 April 2022
Ehsan Aghaei
Xi Niu
W. Shadid
E. Al-Shaer
ArXivPDFHTML

Papers citing "SecureBERT: A Domain-Specific Language Model for Cybersecurity"

34 / 34 papers shown
Title
From Texts to Shields: Convergence of Large Language Models and Cybersecurity
From Texts to Shields: Convergence of Large Language Models and Cybersecurity
Tao Li
Ya-Ting Yang
Yunian Pan
Quanyan Zhu
39
0
0
01 May 2025
Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation
Christian Rondanini
B. Carminati
E. Ferrari
Antonio Gaudiano
Ashish Kundu
58
0
0
06 Mar 2025
Primus: A Pioneering Collection of Open-Source Datasets for Cybersecurity LLM Training
Primus: A Pioneering Collection of Open-Source Datasets for Cybersecurity LLM Training
Yao-Ching Yu
Tsun-Han Chiang
Cheng-Wei Tsai
Chien-Ming Huang
Wen-Kwang Tsao
66
6
0
16 Feb 2025
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction
Alaeddine Diaf
Abdelaziz Amara Korba
Nour El Islem Karabadji
Y. Ghamri-Doudane
33
3
0
03 Jan 2025
Automated CVE Analysis: Harnessing Machine Learning In Designing
  Question-Answering Models For Cybersecurity Information Extraction
Automated CVE Analysis: Harnessing Machine Learning In Designing Question-Answering Models For Cybersecurity Information Extraction
Tanjim Bin Faruk
70
0
0
21 Dec 2024
Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs.
  Large Language Models
Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models
Nir Daniel
Florian Klaus Kaiser
Shay Giladi
Sapir Sharabi
Raz Moyal
Shalev Shpolyansky
Andres Murillo
Aviad Elyashar
Rami Puzis
AAML
57
0
0
14 Dec 2024
A Cascade Approach for APT Campaign Attribution in System Event Logs:
  Technique Hunting and Subgraph Matching
A Cascade Approach for APT Campaign Attribution in System Event Logs: Technique Hunting and Subgraph Matching
Yi-Ting Huang
Y. Guo
Guo-Wei Wong
M. Chen
23
1
0
29 Oct 2024
Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent
  Threats
Chasing the Shadows: TTPs in Action to Attribute Advanced Persistent Threats
Nanda Rani
Bikash Saha
Vikas Maurya
Sandeep Kumar Shukla
25
1
0
24 Sep 2024
Practically implementing an LLM-supported collaborative vulnerability
  remediation process: a team-based approach
Practically implementing an LLM-supported collaborative vulnerability remediation process: a team-based approach
Xiaoqing Wang
Yuanjing Tian
Keman Huang
Bin Liang
39
1
0
21 Sep 2024
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and
  URLs Detection and Classification
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification
Abdelkader El Mahdaouy
Salima Lamsiyah
Meryem Janati Idrissi
H. Alami
Zakaria Yartaoui
Ismail Berrada
21
3
0
13 Sep 2024
Tweezers: A Framework for Security Event Detection via Event
  Attribution-centric Tweet Embedding
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding
Jian Cui
Hanna Kim
Eugene Jang
Dayeon Yim
Kicheol Kim
Yongjae Lee
Jin-Woo Chung
Seungwon Shin
Xiaojing Liao
48
0
0
12 Sep 2024
CyberPal.AI: Empowering LLMs with Expert-Driven Cybersecurity
  Instructions
CyberPal.AI: Empowering LLMs with Expert-Driven Cybersecurity Instructions
Matan Levi
Yair Alluouche
Daniel Ohayon
Anton Puzanov
35
6
0
17 Aug 2024
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval
  Augmented Generation
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation
Marco Simoni
Andrea Saracino
Vinod Puthuvath
Maurco Conti
60
2
0
22 Jul 2024
Actionable Cyber Threat Intelligence using Knowledge Graphs and Large
  Language Models
Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
Romy Fieblinger
Md Tanvirul Alam
Nidhi Rastogi
37
9
0
30 Jun 2024
Evaluating the Efficacy of Foundational Models: Advancing Benchmarking
  Practices to Enhance Fine-Tuning Decision-Making
Evaluating the Efficacy of Foundational Models: Advancing Benchmarking Practices to Enhance Fine-Tuning Decision-Making
O. Amujo
S. Yang
35
1
0
25 Jun 2024
A Comprehensive Overview of Large Language Models (LLMs) for Cyber
  Defences: Opportunities and Directions
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions
Mohammed Hassanin
Nour Moustafa
40
27
0
23 May 2024
CPE-Identifier: Automated CPE identification and CVE summaries
  annotation with Deep Learning and NLP
CPE-Identifier: Automated CPE identification and CVE summaries annotation with Deep Learning and NLP
Wanyu Hu
V. Thing
16
1
0
22 May 2024
Large Language Model (LLM) for Telecommunications: A Comprehensive
  Survey on Principles, Key Techniques, and Opportunities
Large Language Model (LLM) for Telecommunications: A Comprehensive Survey on Principles, Key Techniques, and Opportunities
Hao Zhou
Chengming Hu
Ye Yuan
Yufei Cui
Yili Jin
...
Di Wu
Xue Liu
Charlie Zhang
Xianbin Wang
Jiangchuan Liu
37
62
0
17 May 2024
CANAL -- Cyber Activity News Alerting Language Model: Empirical Approach
  vs. Expensive LLM
CANAL -- Cyber Activity News Alerting Language Model: Empirical Approach vs. Expensive LLM
Urjitkumar Patel
Fang-Chun Yeh
Chinmay Gondhalekar
29
3
0
10 May 2024
Large Language Models for Cyber Security: A Systematic Literature Review
Large Language Models for Cyber Security: A Systematic Literature Review
HanXiang Xu
Shenao Wang
Ningke Li
Kaidi Wang
Yanjie Zhao
Kai Chen
Ting Yu
Yang Liu
Haoyu Wang
42
29
0
08 May 2024
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for
  Pretraining on the Cybersecurity Domain
Ignore Me But Don't Replace Me: Utilizing Non-Linguistic Elements for Pretraining on the Cybersecurity Domain
Eugene Jang
Jian Cui
Dayeon Yim
Youngjin Jin
Jin-Woo Chung
Seung-Eui Shin
Yongjae Lee
65
2
0
15 Mar 2024
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from
  Finished Cyber Threat Reports
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Nanda Rani
Bikash Saha
Vikas Maurya
Sandeep K. Shukla
33
7
0
05 Mar 2024
GTBench: Uncovering the Strategic Reasoning Limitations of LLMs via
  Game-Theoretic Evaluations
GTBench: Uncovering the Strategic Reasoning Limitations of LLMs via Game-Theoretic Evaluations
Jinhao Duan
Renming Zhang
James Diffenderfer
B. Kailkhura
Lichao Sun
Elias Stengel-Eskin
Mohit Bansal
Tianlong Chen
Kaidi Xu
ELM
LRM
34
58
0
19 Feb 2024
Large Language Models in Cybersecurity: State-of-the-Art
Large Language Models in Cybersecurity: State-of-the-Art
Farzad Nourmohammadzadeh Motlagh
Mehrdad Hajizadeh
Mehryar Majd
Pejman Najafi
Feng Cheng
Christoph Meinel
ELM
52
43
0
30 Jan 2024
IoT in the Era of Generative AI: Vision and Challenges
IoT in the Era of Generative AI: Vision and Challenges
Xin Wang
Zhongwei Wan
Arvin Hekmati
M. Zong
Samiul Alam
Mi Zhang
Bhaskar Krishnamachari
32
15
0
03 Jan 2024
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion
  Detection and Classification
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification
Xuemei Li
Huirong Fu
14
4
0
19 Nov 2023
Automated CVE Analysis for Threat Prioritization and Impact Prediction
Automated CVE Analysis for Threat Prioritization and Impact Prediction
Ehsan Aghaei
E. Al-Shaer
W. Shadid
Xi Niu
8
4
0
06 Sep 2023
CVE-driven Attack Technique Prediction with Semantic Information
  Extraction and a Domain-specific Language Model
CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model
Ehsan Aghaei
E. Al-Shaer
21
3
0
06 Sep 2023
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the
  Wild
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild
G. Siracusano
D. Sanvito
Roberto González
Manikantan Srinivasan
Sivakaman Kamatchi
Wataru Takahashi
Masaru Kawakita
Takahiro Kakumaru
R. Bifulco
30
15
0
14 Jul 2023
Revolutionizing Cyber Threat Detection with Large Language Models: A
  privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices
Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices
M. Ferrag
Mthandazo Ndhlovu
Norbert Tihanyi
Lucas C. Cordeiro
Merouane Debbah
Thierry Lestable
Narinderjit Singh Thandi
26
74
0
25 Jun 2023
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack
  Descriptions
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions
Reza Fayyazi
S. Yang
21
14
0
24 Jun 2023
Domain Specialization as the Key to Make Large Language Models
  Disruptive: A Comprehensive Survey
Domain Specialization as the Key to Make Large Language Models Disruptive: A Comprehensive Survey
Chen Ling
Xujiang Zhao
Jiaying Lu
Chengyuan Deng
Can Zheng
...
Chris White
Quanquan Gu
Jian Pei
Carl Yang
Liang Zhao
ALM
33
126
0
30 May 2023
Constructing a Knowledge Graph from Textual Descriptions of Software
  Vulnerabilities in the National Vulnerability Database
Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database
Anders Molmen Host
Pierre Lison
Leon Moonen
16
2
0
30 Apr 2023
GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language
  Understanding
GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding
Alex Jinpeng Wang
Amanpreet Singh
Julian Michael
Felix Hill
Omer Levy
Samuel R. Bowman
ELM
304
6,996
0
20 Apr 2018
1