{"id":"https://openalex.org/W4406892680","doi":"https://doi.org/10.1109/fllm63129.2024.10852476","title":"The Impact of Large Language Models on IT Security in the Corporate Environment","display_name":"The Impact of Large Language Models on IT Security in the Corporate Environment","publication_year":2024,"publication_date":"2024-11-26","ids":{"openalex":"https://openalex.org/W4406892680","doi":"https://doi.org/10.1109/fllm63129.2024.10852476"},"language":"en","primary_location":{"id":"doi:10.1109/fllm63129.2024.10852476","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fllm63129.2024.10852476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Foundation and Large Language Models (FLLM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089845224","display_name":"Sebastian Scholz","orcid":"https://orcid.org/0000-0003-1074-3281"},"institutions":[{"id":"https://openalex.org/I4210148941","display_name":"IU International University of Applied Sciences","ror":"https://ror.org/04fdat027","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210148941"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Scholz","raw_affiliation_strings":["IU International University of Applied Science,Erfurt,Germany"],"affiliations":[{"raw_affiliation_string":"IU International University of Applied Science,Erfurt,Germany","institution_ids":["https://openalex.org/I4210148941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054115101","display_name":"Alexander Lawall","orcid":"https://orcid.org/0000-0003-4703-6310"},"institutions":[{"id":"https://openalex.org/I4210148941","display_name":"IU International University of Applied Sciences","ror":"https://ror.org/04fdat027","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210148941"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Lawall","raw_affiliation_strings":["IU International University of Applied Science,Erfurt,Germany"],"affiliations":[{"raw_affiliation_string":"IU International University of Applied Science,Erfurt,Germany","institution_ids":["https://openalex.org/I4210148941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013159588","display_name":"Kristina Schaaff","orcid":"https://orcid.org/0009-0005-5286-6548"},"institutions":[{"id":"https://openalex.org/I4210148941","display_name":"IU International University of Applied Sciences","ror":"https://ror.org/04fdat027","country_code":"DE","type":"education","lineage":["https://openalex.org/I4210148941"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kristina Schaaff","raw_affiliation_strings":["IU International University of Applied Science,Erfurt,Germany"],"affiliations":[{"raw_affiliation_string":"IU International University of Applied Science,Erfurt,Germany","institution_ids":["https://openalex.org/I4210148941"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089845224"],"corresponding_institution_ids":["https://openalex.org/I4210148941"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42678583,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6901999711990356,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6901999711990356,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6427364945411682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32509857416152954}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6427364945411682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32509857416152954}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fllm63129.2024.10852476","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fllm63129.2024.10852476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Foundation and Large Language Models (FLLM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5099999904632568,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W3165670269","https://openalex.org/W3170803827","https://openalex.org/W3185585282","https://openalex.org/W3197115256","https://openalex.org/W3197388494","https://openalex.org/W3198619808","https://openalex.org/W3205191765","https://openalex.org/W3205795361","https://openalex.org/W3208054832","https://openalex.org/W3217476834","https://openalex.org/W4205199446","https://openalex.org/W4210320978","https://openalex.org/W4214753307","https://openalex.org/W4220864972","https://openalex.org/W4221069407","https://openalex.org/W4224305508","https://openalex.org/W4225658247","https://openalex.org/W4225983788","https://openalex.org/W4243582171","https://openalex.org/W4283462475","https://openalex.org/W4285115684","https://openalex.org/W4288060471","https://openalex.org/W4294343684","https://openalex.org/W4295181103","https://openalex.org/W4296105182","https://openalex.org/W4308531811","https://openalex.org/W4310249178","https://openalex.org/W4310676331","https://openalex.org/W4312240912","https://openalex.org/W4313313353","https://openalex.org/W4313648836","https://openalex.org/W4316663276","https://openalex.org/W4319988693","https://openalex.org/W4323363627","https://openalex.org/W4323848238","https://openalex.org/W4361004367","https://openalex.org/W4366547444","https://openalex.org/W4380267320","https://openalex.org/W4382398341","https://openalex.org/W4385878021","https://openalex.org/W4386119501","https://openalex.org/W4390509863","https://openalex.org/W4390678101","https://openalex.org/W6778883912","https://openalex.org/W6800751262"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,23,33,38,64,81],"impact":[4],"of":[5,16,26,77,83],"Large":[6],"Language":[7],"Models":[8],"(LLMs)":[9],"on":[10],"both":[11],"offensive":[12],"and":[13,48,60,89],"defensive":[14],"aspects":[15],"IT":[17,31],"security":[18],"within":[19],"corporate":[20],"environments.":[21],"Addressing":[22],"fragmented":[24],"understanding":[25],"LLMs":[27],"in":[28,80],"connection":[29],"with":[30,69],"security,":[32],"study":[34],"aims":[35],"to":[36],"answer":[37],"research":[39,65],"question:":[40],"What":[41],"attack":[42],"vectors":[43],"are":[44],"enabled":[45],"by":[46],"LLMs,":[47],"what":[49],"defense":[50,91],"measures":[51],"can":[52],"be":[53],"implemented?":[54],"Employing":[55],"a":[56,74],"systematic":[57],"literature":[58],"analysis":[59],"developing":[61],"use":[62],"cases,":[63],"combines":[66],"theoretical":[67],"insights":[68],"practical":[70],"scenarios.":[71],"Results":[72],"provide":[73],"comprehensive":[75],"overview":[76],"LLM":[78],"applications":[79],"realm":[82],"Cyber":[84],"Defense,":[85],"identifying":[86],"potential":[87],"threats":[88],"effective":[90],"strategies.":[92]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
