ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2303.12132
  4. Cited By
Fundamentals of Generative Large Language Models and Perspectives in
  Cyber-Defense

Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense

21 March 2023
Andrei Kucharavy
Z. Schillaci
Loic Maréchal
Maxime Wursch
Ljiljana Dolamic
Remi Sabonnadiere
Dimitri Percia David
Alain Mermoud
Vincent Lenders
    ELMAI4CE
ArXiv (abs)PDFHTML

Papers citing "Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense"

17 / 17 papers shown
Title
MM-AttacKG: A Multimodal Approach to Attack Graph Construction with Large Language Models
MM-AttacKG: A Multimodal Approach to Attack Graph Construction with Large Language Models
Yongheng Zhang
Xinyun Zhao
Yunshan Ma
Haokai Ma
Yingxiao Guan
Guozheng Yang
Yuliang Lu
Xiang Wang
12
0
0
20 Jun 2025
Digital Forensics in the Age of Large Language Models
Digital Forensics in the Age of Large Language Models
Zhipeng Yin
Zichong Wang
Weifeng Xu
Jun Zhuang
Pallab Mozumder
Antoinette Smith
Wenbin Zhang
AILaw
81
2
0
03 Apr 2025
Generative AI for Internet of Things Security: Challenges and Opportunities
Generative AI for Internet of Things Security: Challenges and Opportunities
Yan Lin Aung
Ivan Christian
Ye Dong
Xiaodong Ye
Sudipta Chattopadhyay
Jianying Zhou
100
1
0
13 Feb 2025
Evaluating Large Language Models' Capability to Launch Fully Automated
  Spear Phishing Campaigns: Validated on Human Subjects
Evaluating Large Language Models' Capability to Launch Fully Automated Spear Phishing Campaigns: Validated on Human Subjects
Fred Heiding
Simon Lermen
Andrew Kao
B. Schneier
A. Vishwanath
159
9
0
30 Nov 2024
Novel-WD: Exploring acquisition of Novel World Knowledge in LLMs Using
  Prefix-Tuning
Novel-WD: Exploring acquisition of Novel World Knowledge in LLMs Using Prefix-Tuning
Maxime Méloux
Christophe Cerisara
KELMCLL
84
0
0
30 Aug 2024
Foundation Models for Autonomous Robots in Unstructured Environments
Foundation Models for Autonomous Robots in Unstructured Environments
Hossein Naderi
Alireza Shojaei
Lifu Huang
LM&Ro
86
0
0
19 Jul 2024
Transfer Learning in Pre-Trained Large Language Models for Malware
  Detection Based on System Calls
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls
Pedro Miguel Sánchez Sánchez
Alberto Huertas Celdrán
Gérome Bovet
Gregorio Martínez Pérez
58
11
0
15 May 2024
AttacKG+:Boosting Attack Knowledge Graph Construction with Large
  Language Models
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models
Yongheng Zhang
Tingwen Du
Yunshan Ma
Xiang Wang
Yi Xie
Guozheng Yang
Yuliang Lu
Ee-Chien Chang
58
4
0
08 May 2024
Synthetic Image Generation in Cyber Influence Operations: An Emergent
  Threat?
Synthetic Image Generation in Cyber Influence Operations: An Emergent Threat?
Melanie Mathys
Marco Willi
Michael Graber
Raphael Meier
61
2
0
18 Mar 2024
Asset-centric Threat Modeling for AI-based Systems
Asset-centric Threat Modeling for AI-based Systems
Jan von der Assen
Jamo Sharif
Chao Feng
Christian Killer
Gérome Bovet
Burkhard Stiller
24
4
0
11 Mar 2024
Exploring Advanced Methodologies in Security Evaluation for LLMs
Exploring Advanced Methodologies in Security Evaluation for LLMs
Junming Huang
Jiawei Zhang
Qi Wang
Weihong Han
Yanchun Zhang
102
0
0
28 Feb 2024
Large Language Models in Cybersecurity: State-of-the-Art
Large Language Models in Cybersecurity: State-of-the-Art
Farzad Nourmohammadzadeh Motlagh
Mehrdad Hajizadeh
Mehryar Majd
Pejman Najafi
Feng Cheng
Christoph Meinel
ELM
115
48
0
30 Jan 2024
LLMs Perform Poorly at Concept Extraction in Cyber-security Research
  Literature
LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature
Maxime Wursch
Andrei Kucharavy
Dimitri Percia David
Alain Mermoud
76
6
0
12 Dec 2023
Digital Twins and the Future of their Use Enabling Shift Left and Shift
  Right Cybersecurity Operations
Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations
Ahmad Mohsin
Helge Janicke
Surya Nepal
David Holmes
22
5
0
24 Sep 2023
Devising and Detecting Phishing: Large Language Models vs. Smaller Human
  Models
Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models
Fredrik Heiding
B. Schneier
A. Vishwanath
Jeremy Bernstein
Peter S. Park
71
31
0
23 Aug 2023
Anatomy of an AI-powered malicious social botnet
Anatomy of an AI-powered malicious social botnet
Kai-Cheng Yang
Filippo Menczer
DeLMO
82
74
0
30 Jul 2023
"HOT" ChatGPT: The promise of ChatGPT in detecting and discriminating
  hateful, offensive, and toxic comments on social media
"HOT" ChatGPT: The promise of ChatGPT in detecting and discriminating hateful, offensive, and toxic comments on social media
Lingyao Li
Lizhou Fan
Shubham Atreja
Libby Hemphill
AI4MH
99
97
0
20 Apr 2023
1