Next Article in Journal
Blind Source Separation Using Time-Delayed Dynamic Mode Decomposition
Previous Article in Journal
Bioinformatics-Driven Structural and Pharmacological Analysis of SLITRK1 in Tourette Syndrome: Impact of S656M Mutation Using Molecular Dynamics, Docking, and Reinforcement Learning
 
 
Article
Peer-Review Record

From Vulnerability to Defense: The Role of Large Language Models in Enhancing Cybersecurity

Computation 2025, 13(2), 30; https://doi.org/10.3390/computation13020030
by Wafaa Kasri 1,†, Yassine Himeur 2,*,†, Hamzah Ali Alkhazaleh 2, Saed Tarapiah 3, Shadi Atalla 2, Wathiq Mansoor 2 and Hussain Al-Ahmad 2
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Computation 2025, 13(2), 30; https://doi.org/10.3390/computation13020030
Submission received: 3 December 2024 / Revised: 30 December 2024 / Accepted: 4 January 2025 / Published: 29 January 2025

Round 1

Reviewer 1 Report

Comments and Suggestions for Authors

This paper reviews the foundational elements, real-world applications, and limitations of LLMs in cybersecurity, identifies emerging trends and proposes future research directions, and concludes by emphasizing the potential of LLMs to redefine cybersecurity. There are still some problems should be addressed, which are listed as follows.

1. In the Introduction, I suggested the authors should give a figure to describe the architecture of the whole survey. 

2. Figure 1 is a flowchart, but it is not very standard, which should be improved. There are also lots of colors for the boxes in the figure, and what is meaning of the different colors?  

3. Section 2.3. 'Key Features and Capabilities' is too simple. The role of LLMs for enhancing cybersecurity should be defined formally, which is the foundations for the following sections.

4. Figure 2 and Figure 4 are from the reference [39] and [88] respectively. Why the authors use the figures from the references?

5. From Table 2 to Table 14, lots of works are compared in the table. However, the deep analysis is absent, especially Table 10, 12, 13, 14. What did the authors discover from the comparison tables.  

6. There are still lots of typos in the manuscript. For example line 812, line 1421. 

 

Author Response

Please refer to the attached "Response_to_Reviewer_#1"

Author Response File: Author Response.pdf

Reviewer 2 Report

Comments and Suggestions for Authors

 This paper examines the applications of LLMs to cybersecurity problems such as threat identification, phishing attack detection, malware detection and classification, intrusion detection, vulnerability detection, incident response, and data protection and privacy. It reviews related literatures extensively and presents the comparison results of the studies in each problem. This paper also discusses the  vulnerability, misuse, limitations and challenges of deploying LLMs in cyberseurity.

This paper is well organized and written. It provides appropriate backgrounds and the related studies are well analyzed. It also gives the summary and taxonomy of the studies. And the quality of English is also very good. However, it needs to corrrect some typos and citation format such as line 1147, 1152, 1164.

Author Response

Please refer to the attached "Response_to_Reviewer_#2"

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

Comments and Suggestions for Authors

The authors have tried their best to improve the manuscript according to the reviewer's comments.

Back to TopTop