Applied Soft Computing, Journal Year: 2024, Volume and Issue: 170, P. 112663 - 112663
Published: Dec. 25, 2024
Language: Английский
Applied Soft Computing, Journal Year: 2024, Volume and Issue: 170, P. 112663 - 112663
Published: Dec. 25, 2024
Language: Английский
International Journal of Information Security, Journal Year: 2025, Volume and Issue: 24(2)
Published: Feb. 14, 2025
Language: Английский
Citations
0Lecture notes in computer science, Journal Year: 2025, Volume and Issue: unknown, P. 238 - 256
Published: Jan. 1, 2025
Language: Английский
Citations
0Intelligent Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 200515 - 200515
Published: April 1, 2025
Language: Английский
Citations
0Published: Jan. 1, 2025
Language: Английский
Citations
0Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 429 - 444
Published: May 1, 2025
Academic institutions explore generative artificial intelligence for varied educational and research goals, yet they often operate with limited budgets specialized personnel shortages. Researchers have revealed that models capable of producing sophisticated outputs can be exploited malicious objectives, magnifying cyber risks in settings where funding constraints impede robust defenses. This chapter investigated the impact resource on secure deployment AI, emphasizing emerging exploits stem from data poisoning model inversion. Findings indicated coordinated defense strategies, clear governance frameworks, targeted training mitigate threats without hindering research. These insights suggest collaborative networks practical safeguards are vital sustaining academic innovation. The contributes a framework to help integrate advanced AI capabilities while preserving security.
Language: Английский
Citations
0Future Internet, Journal Year: 2025, Volume and Issue: 17(5), P. 207 - 207
Published: May 5, 2025
This paper investigates, applies, and evaluates state-of-the-art Large Language Models (LLMs) for the classification of posts from a dark web hackers’ forum into four cyber-security categories. The LLMs applied included Mistral-7B-Instruct-v0.2, Gemma-1.1-7B, Llama-3-8B-Instruct, Llama-2-7B, with zero-shot learning, few-shot fine-tuning. categories consisted “Access Control Management”, “Availability Protection Security by Design Mechanisms”, “Software Firmware Flaws”, “not relevant”. were also classified labelled human expert, allowing detailed evaluation accuracy per each LLM customization/learning method. We verified fine-tuning as most effective mechanism to enhance reliability classifications. results include methodology dataset.
Language: Английский
Citations
0Artificial Intelligence Review, Journal Year: 2025, Volume and Issue: 58(8)
Published: May 7, 2025
Language: Английский
Citations
0Applied Soft Computing, Journal Year: 2024, Volume and Issue: 170, P. 112663 - 112663
Published: Dec. 25, 2024
Language: Английский
Citations
0