Frontiers in Blockchain,
Journal Year:
2024,
Volume and Issue:
7
Published: Dec. 12, 2024
Introduction
Phishing
attacks
pose
a
significant
threat
to
online
security
by
deceiving
users
into
divulging
sensitive
information
through
fraudulent
websites.
Traditional
anti-phishing
approaches
are
centralized
and
reactive,
exhibiting
critical
limitations
such
as
delayed
detection,
poor
adaptability
evolving
threats,
susceptibility
data
tampering,
lack
of
transparency.
Methods
This
paper
presents
MLPhishChain,
decentralized
application
(DApp)
that
integrates
blockchain
technology
with
machine
learning
(ML)
provide
proactive
transparent
solution
for
URL
verification.
Users
can
submit
URLs
automated
phishing
analysis
via
an
ML
model,
each
URL’s
status
securely
recorded
on
immutable
ledger.
To
address
the
dynamic
nature
MLPhishChain
features
re-evaluation
mechanism,
enabling
request
updated
assessments
website
content
evolve.
Additionally,
system
incorporates
from
external
services
(e.g.,
VirusTotal)
offer
multi-source
validation
risk,
enhancing
user
confidence
decision-making.
Results
The
was
built
using
Ganache
Truffle,
performance
metrics
were
computed
evaluate
its
efficacy
in
terms
latency,
scalability,
resource
consumption.
indicate
proposed
achieves
rapid
verification
low
scales
effectively
handle
increasing
submissions,
optimizes
usage.
Discussion
By
leveraging
strengths
intelligent
algorithms,
addresses
shortcomings
traditional
methods.
It
delivers
reliable
adaptable
capable
addressing
threats.
approach
establishes
new
standard
characterized
enhanced
transparency,
resilience,
adaptability.
Computation,
Journal Year:
2025,
Volume and Issue:
13(2), P. 30 - 30
Published: Jan. 29, 2025
The
escalating
complexity
of
cyber
threats,
coupled
with
the
rapid
evolution
digital
landscapes,
poses
significant
challenges
to
traditional
cybersecurity
mechanisms.
This
review
explores
transformative
role
LLMs
in
addressing
critical
cybersecurity.
With
landscapes
and
increasing
sophistication
security
mechanisms
often
fall
short
detecting,
mitigating,
responding
complex
risks.
LLMs,
such
as
GPT,
BERT,
PaLM,
demonstrate
unparalleled
capabilities
natural
language
processing,
enabling
them
parse
vast
datasets,
identify
vulnerabilities,
automate
threat
detection.
Their
applications
extend
phishing
detection,
malware
analysis,
drafting
policies,
even
incident
response.
By
leveraging
advanced
features
like
context
awareness
real-time
adaptability,
enhance
organizational
resilience
against
cyberattacks
while
also
facilitating
more
informed
decision-making.
However,
deploying
is
not
without
challenges,
including
issues
interpretability,
scalability,
ethical
concerns,
susceptibility
adversarial
attacks.
critically
examines
foundational
elements,
real-world
applications,
limitations
highlighting
key
advancements
their
integration
into
frameworks.
Through
detailed
analysis
case
studies,
this
paper
identifies
emerging
trends
proposes
future
research
directions,
improving
robustness,
privacy
automating
management.
study
concludes
by
emphasizing
potential
redefine
cybersecurity,
driving
innovation
enhancing
ecosystems.
In
this
paper,
we
delve
into
the
transformative
role
of
pre-trained
language
models
(PLMs)
in
cybersecurity,
offering
a
comprehensive
examination
their
deployment
across
wide
array
cybersecurity
tasks.
Beginning
with
an
exploration
general
PLMs,
including
advancements
and
emergence
domain-specific
tailored
for
provide
insightful
overview
foundational
technologies
driving
these
developments.
The
core
our
review
focuses
on
multifaceted
applications
PLMs
ranging
from
malware
vulnerability
detection
to
more
nuanced
areas
like
log
analysis,
network
traffic
threat
intelligence,
among
others.
We
also
highlight
recent
strides
application
large
(LLMs),
showcasing
growing
influence
enhancing
measures.
By
charting
landscape
PLM
pointing
toward
future
directions,
work
serves
as
valuable
resource
both
research
community
industry
practitioners,
underlining
critical
need
continued
innovation
harnessing
fortify
defenses.
Applied Sciences,
Journal Year:
2025,
Volume and Issue:
15(2), P. 628 - 628
Published: Jan. 10, 2025
In
China,
fruit
tree
diseases
are
a
significant
threat
to
the
development
of
industry,
and
knowledge
about
is
most
needed
professional
for
farmers
other
practitioners
in
industry.
Research
papers
primary
sources
that
represent
cutting-edge
progress
disease
research.
Traditional
engineering
methods
acquisition
require
extensive
cumbersome
preparatory
work,
they
demand
high
level
background
information
technology
skills
from
handlers.
This
paper,
perspective
industry
dissemination,
aims
at
users
such
as
farmers,
experts,
communicators,
gatherers.
It
proposes
fast,
cost-effective,
low-technical-barrier
method
extracting
research
paper
abstracts—K-Extract,
based
on
large
language
models
(LLMs)
prompt
engineering.
Under
zero-shot
conditions,
K-Extract
utilizes
conversational
LLMs
automate
extraction
knowledge.
The
has
constructed
comprehensive
classification
system
and,
through
series
optimized
questions,
effectively
overcomes
deficiencies
LLM
providing
factual
accuracy.
tests
multiple
available
Chinese
market,
results
show
can
seamlessly
integrate
with
any
model,
DeepSeek
model
Kimi
performing
particularly
well.
experimental
indicate
have
accuracy
rate
handling
judgment
tasks
simple
Q&A
tasks.
simple,
efficient,
accurate,
serve
convenient
tool
agricultural
field.
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(7), P. 2946 - 2946
Published: March 31, 2024
The
efficient
management
and
utilization
of
coal
mine
equipment
maintenance
knowledge
is
an
indispensable
foundation
for
advancing
the
establishment
intelligent
mines.
This
has
problems
such
as
scattered,
low
sharing,
insufficient
management,
which
restricts
development
intelligence.
For
above-mentioned
problems,
a
large
language
model
based
on
multi-source
text
(XCoalChat)
was
proposed
to
better
manage
utilize
existing
massive
maintenance.
dataset
ReliableCEMK-Self-Instruction
constructed
obtain
wide
diverse
amount
through
sample
generation.
Aiming
at
illusory
problem
model,
graph
enhancement
method
“Coal
Mine
Equipment
Maintenance
System—Full
Life
Cycle—Specification”
improve
density.
A
triple-LoRA
fine-tuning
mechanism
DPO
direct
preference
optimization
were
introduced
into
top
baseline
guarantees
that
XCoalChat
can
handle
multiple
Q&A
decision
analysis
tasks
with
limited
computing
power.
Compared
ChatGLM,
Bloom,
LLama,
comprehensive
assessment
performed
by
experiments
including
dialog
consulting,
professional
analysis.
results
showed
achieved
best
response
accuracy
in
consulting
analysis;
also
took
least
reasoning
time
average.
outperformed
other
mainstream
models,
verify
effective
field
Electronics,
Journal Year:
2024,
Volume and Issue:
13(13), P. 2621 - 2621
Published: July 4, 2024
The
study
aims
to
identify
the
knowledge,
skills
and
competencies
required
by
accounting
auditing
(AA)
professionals
in
context
of
integrating
disruptive
Generative
Artificial
Intelligence
(GenAI)
technologies
develop
a
framework
for
GenAI
capabilities
into
organisational
systems,
harnessing
its
potential
revolutionise
lifelong
learning
development
assist
day-to-day
operations
decision-making.
Through
systematic
literature
review,
103
papers
were
analysed,
outline,
current
business
ecosystem,
competencies’
demand
generated
AI
adoption
and,
particular,
associated
risks,
thus
contributing
body
knowledge
underexplored
research
areas.
Positioned
at
confluence
accounting,
GenAI,
paper
introduces
meaningful
overview
areas
effective
data
analysis,
interpretation
findings,
risk
awareness
management.
It
emphasizes
reshapes
role
discovering
true
adopting
it
accordingly.
new
LLM-based
system
model
that
can
enhance
through
collaboration
with
similar
systems
provides
an
explanatory
scenario
illustrate
applicability
audit
area.
IGI Global eBooks,
Journal Year:
2025,
Volume and Issue:
unknown, P. 25 - 48
Published: Feb. 14, 2025
This
chapter
explores
the
evolution
of
phishing
detection
methods,
present
traditional,
advanced,
and
hybrid
approaches.
Traditional
methods
provide
a
base
layer
defense,
but
their
effectiveness
is
limited
against
adaptive
attacks.
Advanced
techniques
employ
machine
learning
(ML)
deep
(DL)
to
enhance
accuracy
leveraging
data-driven
models
that
analyze
URL
structures,
email
content,
website
behavior.
Hybrid
combine
multiple
optimize
performance.
Case
studies
illustrate
practical
application
these
methodologies
in
various
domains
which
include
use
convolutional
neural
networks
(CNNs),
long
short-term
memory
(LSTMs),
ensemble
algorithms
such
as
Random
Forests
Gradient
Boosting,
achieving
accuracies
exceeding
97%
many
cases.
Research
also
highlights
on
large
language
(LLMs)
Universal
Adversarial
Perturbation
(UAP)
techniques,
for
detecting
advanced
strategies.
Challenges
imbalanced
datasets
real-time
requirements.