{"id":"https://openalex.org/W4407466527","doi":"https://doi.org/10.1109/sin63213.2024.10871324","title":"Cybersecurity Revolution via Large Language Models and Explainable AI","display_name":"Cybersecurity Revolution via Large Language Models and Explainable AI","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4407466527","doi":"https://doi.org/10.1109/sin63213.2024.10871324"},"language":"en","primary_location":{"id":"doi:10.1109/sin63213.2024.10871324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037528486","display_name":"Taher M. Ghazal","orcid":"https://orcid.org/0000-0003-0672-7924"},"institutions":[{"id":"https://openalex.org/I4210163116","display_name":"Applied Science University","ror":"https://ror.org/059zrbe49","country_code":"BH","type":"education","lineage":["https://openalex.org/I4210163116"]}],"countries":["BH"],"is_corresponding":true,"raw_author_name":"Taher M. Ghazal","raw_affiliation_strings":["College of Arts &#x0026; Science Applied Science University,Manama,Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Arts &#x0026; Science Applied Science University,Manama,Kingdom of Bahrain","institution_ids":["https://openalex.org/I4210163116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027937970","display_name":"Jamshaid Iqbal Janjua","orcid":null},"institutions":[{"id":"https://openalex.org/I142732210","display_name":"University of Engineering and Technology Lahore","ror":"https://ror.org/0051w2v06","country_code":"PK","type":"education","lineage":["https://openalex.org/I142732210"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Jamshaid Iqbal Janjua","raw_affiliation_strings":["Al-Khawarizimi Institute of Computer Science (KICS), University of Engineering &#x0026; Technology (UET),Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"Al-Khawarizimi Institute of Computer Science (KICS), University of Engineering &#x0026; Technology (UET),Lahore,Pakistan","institution_ids":["https://openalex.org/I142732210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074666259","display_name":"Walid Abushiba","orcid":"https://orcid.org/0000-0003-0835-9926"},"institutions":[{"id":"https://openalex.org/I4210163116","display_name":"Applied Science University","ror":"https://ror.org/059zrbe49","country_code":"BH","type":"education","lineage":["https://openalex.org/I4210163116"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Walid Abushiba","raw_affiliation_strings":["College of Engineering, Applied Science University,Bahrain"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Applied Science University,Bahrain","institution_ids":["https://openalex.org/I4210163116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056873670","display_name":"Munir Ahmad","orcid":"https://orcid.org/0000-0002-5240-0984"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Munir Ahmad","raw_affiliation_strings":["College of Informatics, Korea University,Seoul,Republic of Korea,02841"],"affiliations":[{"raw_affiliation_string":"College of Informatics, Korea University,Seoul,Republic of Korea,02841","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108732299","display_name":"Anaum Ihsan","orcid":null},"institutions":[{"id":"https://openalex.org/I142732210","display_name":"University of Engineering and Technology Lahore","ror":"https://ror.org/0051w2v06","country_code":"PK","type":"education","lineage":["https://openalex.org/I142732210"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Anuam Ihsan","raw_affiliation_strings":["Al-Khawarizimi Institute of Computer Science (KICS), University of Engineering &#x0026; Technology (UET),Lahore,Pakistan"],"affiliations":[{"raw_affiliation_string":"Al-Khawarizimi Institute of Computer Science (KICS), University of Engineering &#x0026; Technology (UET),Lahore,Pakistan","institution_ids":["https://openalex.org/I142732210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060263868","display_name":"Nidal A. Al-Dmour","orcid":"https://orcid.org/0000-0002-2898-3905"},"institutions":[{"id":"https://openalex.org/I21173400","display_name":"Mutah University","ror":"https://ror.org/008g9ns82","country_code":"JO","type":"education","lineage":["https://openalex.org/I21173400"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Nidal A. Al-Dmour","raw_affiliation_strings":["College of Engineering, Mutah University,Department of Computer Engineering,Jordan"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Mutah University,Department of Computer Engineering,Jordan","institution_ids":["https://openalex.org/I21173400"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037528486"],"corresponding_institution_ids":["https://openalex.org/I4210163116"],"apc_list":null,"apc_paid":null,"fwci":16.9881,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.99367281,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.7967000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.7967000007629395,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.7236999869346619,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7370336055755615},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.46774226427078247},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4267697334289551},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4081489145755768},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3921110928058624},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3597836196422577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7370336055755615},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.46774226427078247},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4267697334289551},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4081489145755768},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3921110928058624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3597836196422577}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin63213.2024.10871324","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin63213.2024.10871324","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 17th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2131389289","https://openalex.org/W2803881474","https://openalex.org/W2931858311","https://openalex.org/W2945976633","https://openalex.org/W3025204993","https://openalex.org/W3095840026","https://openalex.org/W3214636190","https://openalex.org/W3215572174","https://openalex.org/W4207008561","https://openalex.org/W4226319939","https://openalex.org/W4304185307","https://openalex.org/W4321786089","https://openalex.org/W4327503230","https://openalex.org/W4378746207","https://openalex.org/W4379382625","https://openalex.org/W4384345672","https://openalex.org/W4385192605","https://openalex.org/W4385412351","https://openalex.org/W4385822528","https://openalex.org/W4386250132","https://openalex.org/W4390012906","https://openalex.org/W4395700348","https://openalex.org/W4398179837","https://openalex.org/W4399249532","https://openalex.org/W4399425914","https://openalex.org/W6696127270","https://openalex.org/W6734862562","https://openalex.org/W6809990436","https://openalex.org/W6838545472","https://openalex.org/W6838831395","https://openalex.org/W6842602790","https://openalex.org/W6850627172","https://openalex.org/W6854020643","https://openalex.org/W6858932932","https://openalex.org/W6860526224"],"related_works":["https://openalex.org/W2169518243","https://openalex.org/W4231937131","https://openalex.org/W3188962172","https://openalex.org/W323219885","https://openalex.org/W2063928587","https://openalex.org/W2772917594","https://openalex.org/W1487966966","https://openalex.org/W4312825515","https://openalex.org/W1589342014","https://openalex.org/W3204019825"],"abstract_inverted_index":{"Integrating":[0],"Groundbreaking":[1],"advancements":[2],"in":[3,41,92,141,151],"AI,":[4,9],"like":[5,68],"language":[6],"models,":[7],"interpretable":[8],"and":[10,26,32,55,61,70,90,111,133],"machine":[11],"learning,":[12],"opens":[13],"up":[14],"a":[15],"world":[16],"of":[17,24,57,98,137],"exciting":[18],"new":[19],"possibilities.":[20],"The":[21],"Evolving":[22],"face":[23],"cybersecurity":[25,37],"Modern":[27],"cyber":[28],"threats":[29],"are":[30,63],"complex":[31],"well":[33],"crafted;":[34],"hence,":[35],"conventional":[36],"mechanisms":[38],"show":[39],"difficulty":[40],"staying":[42],"relevant.":[43],"LLMs,":[44],"especially":[45],"based":[46],"on":[47],"Transformer":[48],"architecture":[49],"will":[50,145],"noticeably":[51],"increase":[52],"the":[53,82,86,101,119,121,127,134],"accuracy":[54],"speed":[56],"detecting":[58],"threats.":[59,116],"Transparency":[60],"trust":[62],"increased":[64],"by":[65],"XAI":[66,89],"approaches":[67],"SHAP":[69],"LIME,":[71],"which":[72],"offer":[73],"facts":[74],"about":[75,118],"ML":[76],"model":[77],"predictions.":[78],"This":[79],"paper":[80],"explores":[81],"literature":[83],"that":[84],"demonstrates":[85],"integration":[87],"between":[88],"LLMs":[91],"cybersecurity,":[93],"exemplifying":[94],"how":[95,113],"this":[96],"trinity":[97],"models":[99],"has":[100],"potential":[102],"to":[103,147],"help":[104,146],"attenuate":[105],"errors":[106],"producing":[107],"reduced":[108],"false":[109],"positives":[110],"improve":[112],"we":[114],"detect":[115],"Thinking":[117],"possibilities":[120],"challenges":[122],"including":[123],"performance":[124],"Explainability":[125],"trade-offs,":[126],"need":[128],"for":[129],"common":[130],"evaluation":[131],"metrics,":[132],"black-box":[135],"nature":[136],"AI":[138],"Models,":[139],"remain":[140],"place.":[142],"Solving":[143],"these":[144],"enhance":[148],"AI-driven":[149],"solutions":[150],"cybersecurity.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":42}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
