ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2505.18846
  4. Cited By
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

24 May 2025
Muhammed Golec
Yaser Khamayseh
Suhib Bani Melhem
Abdulmalik Alwarafy
ArXivPDFHTML

Papers citing "LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy"

29 / 29 papers shown
Title
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
Shuang Tian
Tao Zhang
Qingbin Liu
Jiacheng Wang
Xuangou Wu
...
Ruichen Zhang
Wentao Zhang
Zhenhui Yuan
Shiwen Mao
Dong In Kim
93
1
0
22 Apr 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
50
2
0
10 Apr 2025
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
73
1
0
24 Mar 2025
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence
Dincy R. Arikkat
Vinod Puthuvath
Rafidha Rehiman K. A.
S. Nicolazzo
Marco Arazzi
Antonino Nocera
Mauro Conti
52
1
0
20 Mar 2025
When Compression Meets Model Compression: Memory-Efficient Double Compression for Large Language Models
When Compression Meets Model Compression: Memory-Efficient Double Compression for Large Language Models
Weilan Wang
Yu Mao
Dongdong Tang
Hongchao Du
Nan Guan
Chun Jason Xue
MQ
93
2
0
24 Feb 2025
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models
Sidahmed Benabderrahmane
Petko Valtchev
James Cheney
Talal Rahwan
91
1
0
13 Feb 2025
SHIELD: APT Detection and Intelligent Explanation Using LLM
SHIELD: APT Detection and Intelligent Explanation Using LLM
Parth Atulbhai Gandhi
Prasanna N. Wudali
Yonatan Amaru
Yuval Elovici
A. Shabtai
AAML
81
3
0
04 Feb 2025
TinyHelen's First Curriculum: Training and Evaluating Tiny Language Models in a Simpler Language Environment
Ke Yang
Volodymyr Kindratenko
Chengxiang Zhai
46
2
0
03 Jan 2025
SAGA: Synthetic Audit Log Generation for APT Campaigns
SAGA: Synthetic Audit Log Generation for APT Campaigns
Yi-Ting Huang
Y. Guo
Yue Yang
Guo-Wei Wong
Yu-Zih Jheng
Yeali S. Sun
Jessemyn Modini
Timothy Lynar
M. Chen
93
1
0
20 Nov 2024
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality
  Knowledge Graph Representation of Attack Techniques
MultiKG: Multi-Source Threat Intelligence Aggregation for High-Quality Knowledge Graph Representation of Attack Techniques
Jian Wang
Tiantian Zhu
Chunlin Xiong
Yan Chen
75
1
0
13 Nov 2024
Resource Allocation for Stable LLM Training in Mobile Edge Computing
Resource Allocation for Stable LLM Training in Mobile Edge Computing
Chang Liu
Jun Zhao
54
5
0
30 Sep 2024
Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities
Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities
Yangzhen Wu
P. Khuwaja
Kapal Dev
H. A. Hamadi
Yiming Yang
69
0
0
01 Aug 2024
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
Lingzhi Wang
Zhenyuan Li
Zonghan Guo
Yi Jiang
Kyle Jung
Kedar Thiagarajan
Jiahui Wang
Zhengkai Wang
Emily Wei
Xiangmin Shen
87
0
0
24 Jul 2024
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment
Erfan Ghiasvand
Suprio Ray
S. Iqbal
Sajjad Dadkhah
Ali A. Ghorbani
39
5
0
15 Jul 2024
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A
  Zero-Shot Generation with Large Language Models
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models
Ying Zhang
Xiaoyan Zhou
Hui Wen
Wenjia Niu
Jiqiang Liu
Haining Wang
Qiang Li
61
5
0
11 Jul 2024
Mobile Edge Intelligence for Large Language Models: A Contemporary Survey
Mobile Edge Intelligence for Large Language Models: A Contemporary Survey
Guanqiao Qu
Qiyuan Chen
Wei Wei
Zheng Lin
Xianhao Chen
Kaibin Huang
97
53
0
09 Jul 2024
Beyond Perplexity: Multi-dimensional Safety Evaluation of LLM
  Compression
Beyond Perplexity: Multi-dimensional Safety Evaluation of LLM Compression
Zhichao Xu
Ashim Gupta
Tao Li
Oliver Bentham
Vivek Srikumar
75
13
0
06 Jul 2024
Empirical Guidelines for Deploying LLMs onto Resource-constrained Edge
  Devices
Empirical Guidelines for Deploying LLMs onto Resource-constrained Edge Devices
Ruiyang Qin
Dancheng Liu
Zheyu Yan
Zhaoxuan Tan
Zixuan Pan
Zhenge Jia
Meng Jiang
Ahmed Abbasi
Jinjun Xiong
Yiyu Shi
76
14
0
06 Jun 2024
PerLLM: Personalized Inference Scheduling with Edge-Cloud Collaboration
  for Diverse LLM Services
PerLLM: Personalized Inference Scheduling with Edge-Cloud Collaboration for Diverse LLM Services
Zheming Yang
Yuanhao Yang
Chang Zhao
Qi Guo
Wenkai He
Wen Ji
69
17
0
23 May 2024
A Comprehensive Overview of Large Language Models (LLMs) for Cyber
  Defences: Opportunities and Directions
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions
Mohammed Hassanin
Nour Moustafa
62
30
0
23 May 2024
Large Language Models for Cyber Security: A Systematic Literature Review
Large Language Models for Cyber Security: A Systematic Literature Review
HanXiang Xu
Shenao Wang
Ningke Li
Kaidi Wang
Yanjie Zhao
Kai Chen
Ting Yu
Yang Liu
Haoyu Wang
95
37
0
08 May 2024
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large
  Language Models in Cyber Threat Intelligence
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence
Hangyuan Ji
Jian Yang
Linzheng Chai
Chaoren Wei
Liqun Yang
...
Tianzhen Sun
Hongcheng Guo
Tongliang Li
Changyu Ren
Zhoujun Li
61
8
0
06 May 2024
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize
  Configuration Errors via Logs
Face It Yourselves: An LLM-Based Two-Stage Strategy to Localize Configuration Errors via Logs
Shiwen Shan
Yintong Huo
Yuxin Su
Yichen Li
Dan Li
Zibin Zheng
46
21
0
31 Mar 2024
Model Compression and Efficient Inference for Large Language Models: A
  Survey
Model Compression and Efficient Inference for Large Language Models: A Survey
Wenxiao Wang
Wei Chen
Yicong Luo
Yongliu Long
Zhengkai Lin
Liye Zhang
Binbin Lin
Deng Cai
Xiaofei He
MQ
78
55
0
15 Feb 2024
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge
Shaswata Mitra
Subash Neupane
Trisha Chakraborty
Sudip Mittal
Aritran Piplai
Manas Gaur
Shahram Rahimi
68
26
0
18 Jan 2024
A Survey on Large Language Model (LLM) Security and Privacy: The Good,
  the Bad, and the Ugly
A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
Yifan Yao
Jinhao Duan
Kaidi Xu
Yuanfang Cai
Eric Sun
Yue Zhang
PILM
ELM
87
519
0
04 Dec 2023
Cold Start Latency in Serverless Computing: A Systematic Review,
  Taxonomy, and Future Directions
Cold Start Latency in Serverless Computing: A Systematic Review, Taxonomy, and Future Directions
Muhammed Golec
G. Walia
Mohit Kumar
Félix Cuadrado
S. Gill
Steve Uhlig
45
17
0
12 Oct 2023
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey
  of Vulnerabilities, Datasets, and Defenses
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
M. Ferrag
Othmane Friha
B. Kantarci
Norbert Tihanyi
Lucas C. Cordeiro
Merouane Debbah
Djallel Hamouda
Muna Al-Hawawreh
K. Choo
83
46
0
17 Jun 2023
HOLMES: Real-time APT Detection through Correlation of Suspicious
  Information Flows
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
42
397
0
03 Oct 2018
1