Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,000)

Search Parameters:
Keywords = CyberSecurity Challenges

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 231 KiB  
Systematic Review
Cybersecurity Issues in Electrical Protection Relays: A Systematic Review
by Giovanni Battista Gaggero, Paola Girdinio and Mario Marchese
Energies 2025, 18(14), 3796; https://doi.org/10.3390/en18143796 (registering DOI) - 17 Jul 2025
Abstract
The increasing digitalization of power systems has revolutionized the functionality and efficiency of electrical protection relays. These digital relays enhance fault detection, monitoring, and response mechanisms, ensuring the reliability and stability of power networks. However, their connectivity and reliance on communication protocols introduce [...] Read more.
The increasing digitalization of power systems has revolutionized the functionality and efficiency of electrical protection relays. These digital relays enhance fault detection, monitoring, and response mechanisms, ensuring the reliability and stability of power networks. However, their connectivity and reliance on communication protocols introduce significant cybersecurity risks, making them potential targets for malicious attacks. Cyber threats against digital protection relays can lead to severe consequences, including cascading failures, equipment damage, and compromised grid security. This paper presents a comprehensive review of cybersecurity challenges in digital electrical protection relays, focusing on four key areas: (1) a taxonomy of cyber attack models targeting protection relays, (2) the associated risks and their potential impact on power systems, (3) existing mitigation strategies to enhance relay security, and (4) future research directions to strengthen resilience against cyber threats. Full article
Show Figures

Figure 1

18 pages, 533 KiB  
Article
Comparative Analysis of Deep Learning Models for Intrusion Detection in IoT Networks
by Abdullah Waqas, Sultan Daud Khan, Zaib Ullah, Mohib Ullah and Habib Ullah
Computers 2025, 14(7), 283; https://doi.org/10.3390/computers14070283 (registering DOI) - 17 Jul 2025
Abstract
The Internet of Things (IoT) holds transformative potential in fields such as power grid optimization, defense networks, and healthcare. However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. This study addresses the problem of [...] Read more.
The Internet of Things (IoT) holds transformative potential in fields such as power grid optimization, defense networks, and healthcare. However, the constrained processing capacities and resource limitations of IoT networks make them especially susceptible to cyber threats. This study addresses the problem of detecting intrusions in IoT environments by evaluating the performance of deep learning (DL) models under different data and algorithmic conditions. We conducted a comparative analysis of three widely used DL models—Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM), and Bidirectional LSTM (biLSTM)—across four benchmark IoT intrusion detection datasets: BoTIoT, CiCIoT, ToNIoT, and WUSTL-IIoT-2021. Each model was assessed under balanced and imbalanced dataset configurations and evaluated using three loss functions (cross-entropy, focal loss, and dual focal loss). By analyzing model efficacy across these datasets, we highlight the importance of generalizability and adaptability to varied data characteristics that are essential for real-world applications. The results demonstrate that the CNN trained using the cross-entropy loss function consistently outperforms the other models, particularly on balanced datasets. On the other hand, LSTM and biLSTM show strong potential in temporal modeling, but their performance is highly dependent on the characteristics of the dataset. By analyzing the performance of multiple DL models under diverse datasets, this research provides actionable insights for developing secure, interpretable IoT systems that can meet the challenges of designing a secure IoT system. Full article
(This article belongs to the Special Issue Application of Deep Learning to Internet of Things Systems)
Show Figures

Figure 1

20 pages, 2632 KiB  
Article
Data-Driven Attack Detection Mechanism Against False Data Injection Attacks in DC Microgrids Using CNN-LSTM-Attention
by Chunxiu Li, Xinyu Wang, Xiaotao Chen, Aiming Han and Xingye Zhang
Symmetry 2025, 17(7), 1140; https://doi.org/10.3390/sym17071140 - 16 Jul 2025
Abstract
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant [...] Read more.
This study presents a novel spatio-temporal detection framework for identifying False Data Injection (FDI) attacks in DC microgrid systems from the perspective of cyber–physical symmetry. While modern DC microgrids benefit from increasingly sophisticated cyber–physical symmetry network integration, this interconnected architecture simultaneously introduces significant cybersecurity vulnerabilities. Notably, FDI attacks can effectively bypass conventional Chi-square detector-based protection mechanisms through malicious manipulation of communication layer data. To address this critical security challenge, we propose a hybrid deep learning framework that synergistically combines: Convolutional Neural Networks (CNN) for robust spatial feature extraction from power system measurements; Long Short-Term Memory (LSTM) networks for capturing complex temporal dependencies; and an attention mechanism that dynamically weights the most discriminative features. The framework operates through a hierarchical feature extraction process: First-level spatial analysis identifies local measurement patterns; second-level temporal analysis detects sequential anomalies; attention-based feature refinement focuses on the most attack-relevant signatures. Comprehensive simulation studies demonstrate the superior performance of our CNN-LSTM-Attention framework compared to conventional detection approaches (CNN-SVM and MLP), with significant improvements across all key metrics. Namely, the accuracy, precision, F1-score, and recall could be improved by at least 7.17%, 6.59%, 2.72% and 6.55%. Full article
Show Figures

Figure 1

26 pages, 3369 KiB  
Article
Zero-Day Threat Mitigation via Deep Learning in Cloud Environments
by Sebastian Ignacio Berrios Vasquez, Pamela Alejandra Hermosilla Monckton, Dante Ivan Leiva Muñoz and Hector Allende
Appl. Sci. 2025, 15(14), 7885; https://doi.org/10.3390/app15147885 - 15 Jul 2025
Viewed by 86
Abstract
The growing sophistication of cyber threats has increased the need for advanced detection techniques, particularly in cloud computing environments. Zero-day threats pose a critical risk due to their ability to bypass traditional security mechanisms. This study proposes a deep learning model called mixed [...] Read more.
The growing sophistication of cyber threats has increased the need for advanced detection techniques, particularly in cloud computing environments. Zero-day threats pose a critical risk due to their ability to bypass traditional security mechanisms. This study proposes a deep learning model called mixed vision transformer (MVT), which converts binary files into images and applies deep attention mechanisms for classification. The model was trained using the MaLeX dataset in a simulated Docker environment. It achieved an accuracy between 70% and 80%, with better performance in detecting malware compared with benign files. The proposed MVT approach not only demonstrates its potential to significantly enhance zero-day threat detection in cloud environments but also sets a foundation for robust and adaptive solutions to emerging cybersecurity challenges. Full article
Show Figures

Figure 1

20 pages, 1851 KiB  
Article
ISO-Based Framework Optimizing Industrial Internet of Things for Sustainable Supply Chain Management
by Emad Hashiem Abualsauod
Sustainability 2025, 17(14), 6421; https://doi.org/10.3390/su17146421 - 14 Jul 2025
Viewed by 153
Abstract
The Industrial Internet of Things (IIoT) offers transformative potential for supply chain management by enabling automation, real-time monitoring, and predictive analytics. However, fragmented standardization, interoperability challenges, and cybersecurity risks hinder its sustainable adoption. This study aims to develop and validate an ISO-based framework [...] Read more.
The Industrial Internet of Things (IIoT) offers transformative potential for supply chain management by enabling automation, real-time monitoring, and predictive analytics. However, fragmented standardization, interoperability challenges, and cybersecurity risks hinder its sustainable adoption. This study aims to develop and validate an ISO-based framework to optimize IIoT networks for sustainable supply chain operations. A quantitative time-series research design was employed, analyzing 150 observations from 10–15 industrial firms over five years. Analytical methods included ARIMA, structural equation modeling (SEM), and XGBoost for predictive evaluation. The findings indicate a 6.2% increase in system uptime, a 4.7% reduction in operational costs, a 2.8% decrease in lead times, and a 55–60% decline in security incidents following ISO standard implementation. Interoperability improved by 40–50%, and integration cost savings ranged from 35–40%, contributing to a 25% boost in overall operational efficiency. These results underscore the critical role of ISO frameworks such as ISO/IEC 30141 and ISO 50001 in enhancing connectivity, energy efficiency, and network security across IIoT-enabled supply chains. While standardization significantly improves key performance indicators, the persistence of lead time variability suggests the need for additional optimization strategies. This study offers a structured and scalable methodology for ISO-based IIoT integration, delivering both theoretical advancement and practical relevance. By aligning with internationally recognized sustainability standards, it provides policymakers, practitioners, and industry leaders with an evidence-based framework to accelerate digital transformation, enhance operational efficiency, and support resilient, sustainable supply chain development in the context of Industry 4.0. Full article
(This article belongs to the Special Issue Network Operations and Supply Chain Management)
Show Figures

Figure 1

15 pages, 632 KiB  
Article
Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education
by David Arnold, John Ford and Jafar Saniie
Information 2025, 16(7), 604; https://doi.org/10.3390/info16070604 - 14 Jul 2025
Viewed by 169
Abstract
Testbeds are widely used in experiential learning, providing practical assessments and bridging classroom material with real-world applications. However, manually managing and provisioning student lab environments consumes significant preparation time for instructors. The growing demand for advanced technical skills, such as network administration and [...] Read more.
Testbeds are widely used in experiential learning, providing practical assessments and bridging classroom material with real-world applications. However, manually managing and provisioning student lab environments consumes significant preparation time for instructors. The growing demand for advanced technical skills, such as network administration and cybersecurity, is leading to larger class sizes. This stresses testbed resources and necessitates continuous design updates. To address these challenges, we designed an efficient Environment Management Platform (EMP). The EMP is composed of a set of 4 Command Line Interface scripts and a Web Interface for secure administration and bulk user operations. Based on our testing, the EMP significantly reduces setup time for student virtualized lab environments. Through a cybersecurity learning environment case study, we found that setup is completed in 15 s for each student, a 12.8-fold reduction compared to manual provisioning. When considering a class of 20 students, the EMP realizes a substantial saving of 62 min in system configuration time. Additionally, the software-based management and provisioning process ensures the accurate realization of lab environments, eliminating the errors commonly associated with manual configuration. This platform is applicable to many educational domains that rely on virtual machines for experiential learning. Full article
(This article belongs to the Special Issue Digital Systems in Higher Education)
Show Figures

Graphical abstract

15 pages, 285 KiB  
Review
Human (Face-to-Face) and Digital Innovation Platforms and Their Role in Innovation and Sustainability
by Amalya L. Oliver and Rotem Rittblat
Platforms 2025, 3(3), 12; https://doi.org/10.3390/platforms3030012 - 12 Jul 2025
Viewed by 141
Abstract
This paper provides a comparative review of digital and human (face-to-face) innovation platforms and their roles in promoting innovation and sustainability. These platforms are particularly significant in advancing sustainability objectives as outlined in Sustainable Development Goal 17, (SDG17) which emphasizes the importance of [...] Read more.
This paper provides a comparative review of digital and human (face-to-face) innovation platforms and their roles in promoting innovation and sustainability. These platforms are particularly significant in advancing sustainability objectives as outlined in Sustainable Development Goal 17, (SDG17) which emphasizes the importance of knowledge and technology partnerships to address sustainability challenges, foster innovation, and enhance scientific collaboration. Through a systematic literature review of organizational and management research over the past decade, the study identifies key features, benefits, and limitations of each platform type. Digital platforms offer scalability, asynchronous collaboration, and data-driven innovation, yet face challenges such as trust deficits, cybersecurity risks, and digital inequality. In contrast, human (face-to-face) platforms facilitate trust, emotional communication, and spontaneous idea generation, but are limited in scalability and resource efficiency. By categorizing insights into thematic tables and evaluating implications for organizations, the paper highlights how the integration of both platform types can optimize innovation outcomes. The authors argue that hybrid models—combining the scalability and efficiency of digital platforms with the relational depth of human (face-to-face) platforms—offer a promising path toward sustainable innovation ecosystems. The paper concludes with a call for future empirical research on platform integration strategies and sector-specific applications. Full article
34 pages, 924 KiB  
Systematic Review
Smart Microgrid Management and Optimization: A Systematic Review Towards the Proposal of Smart Management Models
by Paul Arévalo, Dario Benavides, Danny Ochoa-Correa, Alberto Ríos, David Torres and Carlos W. Villanueva-Machado
Algorithms 2025, 18(7), 429; https://doi.org/10.3390/a18070429 - 11 Jul 2025
Viewed by 273
Abstract
The increasing integration of renewable energy sources (RES) in power systems presents challenges related to variability, stability, and efficiency, particularly in smart microgrids. This systematic review, following the PRISMA 2020 methodology, analyzed 66 studies focused on advanced energy storage systems, intelligent control strategies, [...] Read more.
The increasing integration of renewable energy sources (RES) in power systems presents challenges related to variability, stability, and efficiency, particularly in smart microgrids. This systematic review, following the PRISMA 2020 methodology, analyzed 66 studies focused on advanced energy storage systems, intelligent control strategies, and optimization techniques. Hybrid storage solutions combining battery systems, hydrogen technologies, and pumped hydro storage were identified as effective approaches to mitigate RES intermittency and balance short- and long-term energy demands. The transition from centralized to distributed control architectures, supported by predictive analytics, digital twins, and AI-based forecasting, has improved operational planning and system monitoring. However, challenges remain regarding interoperability, data privacy, cybersecurity, and the limited availability of high-quality data for AI model training. Economic analyses show that while initial investments are high, long-term operational savings and improved resilience justify the adoption of advanced microgrid solutions when supported by appropriate policies and financial mechanisms. Future research should address the standardization of communication protocols, development of explainable AI models, and creation of sustainable business models to enhance resilience, efficiency, and scalability. These efforts are necessary to accelerate the deployment of decentralized, low-carbon energy systems capable of meeting future energy demands under increasingly complex operational conditions. Full article
(This article belongs to the Special Issue Algorithms for Smart Cities (2nd Edition))
Show Figures

Figure 1

37 pages, 704 KiB  
Systematic Review
Quantifying the Multidimensional Impact of Cyber Attacks in Digital Financial Services: A Systematic Literature Review
by Olumayowa Adefowope Adekoya, Hany F. Atlam and Harjinder Singh Lallie
Sensors 2025, 25(14), 4345; https://doi.org/10.3390/s25144345 - 11 Jul 2025
Viewed by 121
Abstract
The increasing frequency and sophistication of cyber attacks have posed significant challenges for digital financial organisations, particularly in quantifying their multidimensional impacts. These challenges are largely attributed to the lack of a standardised cyber impact taxonomy, limited data availability, and the evolving nature [...] Read more.
The increasing frequency and sophistication of cyber attacks have posed significant challenges for digital financial organisations, particularly in quantifying their multidimensional impacts. These challenges are largely attributed to the lack of a standardised cyber impact taxonomy, limited data availability, and the evolving nature of technological threats. As a result, organisations often struggle with ineffective security investment prioritisation, reactive incident response planning, and the inability to implement robust, risk-based controls. Hence, an efficient and comprehensive approach is needed to quantify the diverse impacts of cyber attacks in digital financial services. This paper presents a systematic review and examination of the state of the art in cyber impact quantification, with a particular focus on digital financial organisations. Based on a structured search strategy, 44 articles (out of 637) were selected for in-depth analysis. The review investigates the terminologies used to describe cyber impacts, categorises current quantification techniques (pre-attack and post-attack), and identifies the most commonly utilised internal and external data sources. Furthermore, it explores the application of Machine Learning (ML) and Deep Learning (DL) techniques in cyber security risk quantification. Our findings reveal a significant lack of standardised taxonomy for describing and quantifying the multidimensional impact of cyberattacks across physical, digital, economic, psychological, reputational, and societal dimensions. Lastly, open issues and future research directions are discussed. This work provides insights for researchers and professionals by consolidating and identifying quantification technique gaps in cyber security risk quantification. Full article
Show Figures

Figure 1

32 pages, 3793 KiB  
Systematic Review
Systematic Review: Malware Detection and Classification in Cybersecurity
by Sebastian Berrios, Dante Leiva, Bastian Olivares, Héctor Allende-Cid and Pamela Hermosilla
Appl. Sci. 2025, 15(14), 7747; https://doi.org/10.3390/app15147747 - 10 Jul 2025
Viewed by 239
Abstract
Malicious Software, commonly known as Malware, represents a persistent threat to cybersecurity, targeting the confidentiality, integrity, and availability of information systems. The digital era, marked by the proliferation of connected devices, cloud services, and the advancement of machine learning, has brought numerous benefits; [...] Read more.
Malicious Software, commonly known as Malware, represents a persistent threat to cybersecurity, targeting the confidentiality, integrity, and availability of information systems. The digital era, marked by the proliferation of connected devices, cloud services, and the advancement of machine learning, has brought numerous benefits; however, it has also exacerbated exposure to cyber threats, affecting both individuals and corporations. This systematic review, which follows the PRISMA 2020 framework, aims to analyze current trends and new methods for malware detection and classification. The review was conducted using data from Web of Science and Scopus, covering publications from 2020 and 2024, with over 47 key studies selected for in-depth analysis based on relevance, empirical results and citation metrics. These studies cover a variety of detection techniques, including machine learning, deep learning and hybrid models, with a focus on feature extraction, malware behavior analysis and the application of advanced algorithms to improve detection accuracy. The results highlight important advances, such as the improved performance of ensemble learning and deep learning models in detecting sophisticated threats. Finally, this study identifies the main challenges and outlines opportunities of future research to improve malware detection and classification frameworks. Full article
Show Figures

Figure 1

28 pages, 635 KiB  
Systematic Review
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats
by Pedro Santos, Rafael Abreu, Manuel J. C. S. Reis, Carlos Serôdio and Frederico Branco
Sensors 2025, 25(14), 4272; https://doi.org/10.3390/s25144272 - 9 Jul 2025
Viewed by 467
Abstract
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify the most effective tools and methodologies for threat detection [...] Read more.
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify the most effective tools and methodologies for threat detection and prevention, and highlight the limitations of current approaches. An extensive search of academic databases was conducted following the PRISMA guidelines, including 43 relevant studies. This number reflects a rigorous selection process based on defined inclusion, exclusion, and quality criteria and is consistent with the scope of similar systematic reviews in the field of cyber threat intelligence. This review concludes that while CTI significantly improves the ability to predict and prevent cyber threats, challenges such as data standardization, privacy concerns, and trust between organizations persist. It also underscores the necessity of continuously improving CTI practices by leveraging the integration of advanced technologies and creating enhanced collaboration frameworks. These advancements are essential for developing a robust and adaptive cybersecurity posture capable of responding to an evolving threat landscape, ultimately contributing to a more secure digital environment for all sectors. Overall, the review provides practical reflections on the current state of CTI and suggests future research directions to strengthen and improve CTI’s effectiveness. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

31 pages, 1216 KiB  
Article
EL-GNN: A Continual-Learning-Based Graph Neural Network for Task-Incremental Intrusion Detection Systems
by Thanh-Tung Nguyen and Minho Park
Electronics 2025, 14(14), 2756; https://doi.org/10.3390/electronics14142756 - 9 Jul 2025
Viewed by 168
Abstract
Modern network infrastructures have significantly improved global connectivity while simultaneously escalating network security challenges as sophisticated cyberattacks increasingly target vital systems. Intrusion Detection Systems (IDSs) play a crucial role in identifying and mitigating these threats, and recent advances in machine-learning-based IDSs have shown [...] Read more.
Modern network infrastructures have significantly improved global connectivity while simultaneously escalating network security challenges as sophisticated cyberattacks increasingly target vital systems. Intrusion Detection Systems (IDSs) play a crucial role in identifying and mitigating these threats, and recent advances in machine-learning-based IDSs have shown promise in detecting evolving attack patterns. Notably, IDSs employing Graph Neural Networks (GNNs) have proven effective at modeling the dynamics of network traffic and internal interactions. However, these systems suffer from Catastrophic Forgetting (CF), where the incorporation of new attack patterns leads to the loss of previously acquired knowledge. This limits their adaptability and effectiveness in evolving network environments. In this study, we introduce the Elastic Graph Neural Network for Intrusion Detection Systems (EL-GNNs), a novel approach designed to enhance the continual learning (CL) capabilities of GNN-based IDSs. This approach enhances the performance of the GNN-based Intrusion Detection System (IDS) by significantly improving its capability to preserve previously learned knowledge from past cyber threats while simultaneously enabling it to effectively adapt and respond to newly emerging attack patterns in dynamic and evolving network environments. Experimental evaluations on trusted datasets across multiple task scenarios demonstrate that our method outperforms existing approaches in terms of accuracy and F1-score, effectively addressing CF and enhancing adaptability in detecting new network attacks. Full article
Show Figures

Graphical abstract

16 pages, 260 KiB  
Article
Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland
by Leoš Šafár, Marek Pekarčik, Patryk Morawiec, Paulina Rutecka and Monika Wieczorek-Kosmala
Information 2025, 16(7), 590; https://doi.org/10.3390/info16070590 - 8 Jul 2025
Viewed by 229
Abstract
As we move toward a more digitalized and interconnected world, new cybersecurity challenges emerge. While most related research has focused on large companies, this study aims to fill a gap in the literature by exploring cybersecurity issues in small and medium-sized enterprises (SMEs), [...] Read more.
As we move toward a more digitalized and interconnected world, new cybersecurity challenges emerge. While most related research has focused on large companies, this study aims to fill a gap in the literature by exploring cybersecurity issues in small and medium-sized enterprises (SMEs), particularly in relation to nontechnical, soft-skill, and intellectual capital aspects. This study examines the interplay between cybersecurity awareness and perception and ownership structure in SMEs in the Silesian region of Poland. Unlike the majority of cybersecurity literature, our focus is on how ownership structure influences cybersecurity perception. We surveyed 200 SMEs at random within the respective region and utilized hierarchical and simple linear regression analyses to assess the relationships between these factors and financial performance. Our results indicate that larger enterprises and those without a family-owned structure exhibit significantly greater levels of cybersecurity. Additionally, we found a positive correlation between cybersecurity and a firm’s financial performance and overall health. These findings underscore the importance of cybersecurity awareness and practices for the growth and stability of SMEs. Full article
(This article belongs to the Special Issue Information Sharing and Knowledge Management)
39 pages, 4950 KiB  
Systematic Review
Large Language Models’ Trustworthiness in the Light of the EU AI Act—A Systematic Mapping Study
by Md Masum Billah, Harry Setiawan Hamjaya, Hakima Shiralizade, Vandita Singh and Rafia Inam
Appl. Sci. 2025, 15(14), 7640; https://doi.org/10.3390/app15147640 - 8 Jul 2025
Viewed by 385
Abstract
The recent advancements and emergence of rapidly evolving AI models, such as large language models (LLMs), have sparked interest among researchers and professionals. These models are ubiquitously being fine-tuned and applied across various fields such as healthcare, customer service and support, education, automated [...] Read more.
The recent advancements and emergence of rapidly evolving AI models, such as large language models (LLMs), have sparked interest among researchers and professionals. These models are ubiquitously being fine-tuned and applied across various fields such as healthcare, customer service and support, education, automated driving, and smart factories. This often leads to an increased level of complexity and challenges concerning the trustworthiness of these models, such as the generation of toxic content and hallucinations with high confidence leading to serious consequences. The European Union Artificial Intelligence Act (AI Act) is a regulation concerning artificial intelligence. The EU AI Act has proposed a comprehensive set of guidelines to ensure the responsible usage and development of general-purpose AI systems (such as LLMs) that may pose potential risks. The need arises for strengthened efforts to ensure that these high-performing LLMs adhere to the seven trustworthiness aspects (data governance, record-keeping, transparency, human-oversight, accuracy, robustness, and cybersecurity) recommended by the AI Act. Our study systematically maps research, focusing on identifying the key trends in developing LLMs across different application domains to address the aspects of AI Act-based trustworthiness. Our study reveals the recent trends that indicate a growing interest in emerging models such as LLaMa and BARD, reflecting a shift in research priorities. GPT and BERT remain the most studied models, and newer alternatives like Mistral and Claude remain underexplored. Trustworthiness aspects like accuracy and transparency dominate the research landscape, while cybersecurity and record-keeping remain significantly underexamined. Our findings highlight the urgent need for a more balanced, interdisciplinary research approach to ensure LLM trustworthiness across diverse applications. Expanding studies into underexplored, high-risk domains and fostering cross-sector collaboration can bridge existing gaps. Furthermore, this study also reveals domains (like telecommunication) which are underrepresented, presenting considerable research gaps and indicating a potential direction for the way forward. Full article
Show Figures

Figure 1

53 pages, 2125 KiB  
Review
LLMs in Cyber Security: Bridging Practice and Education
by Hany F. Atlam
Big Data Cogn. Comput. 2025, 9(7), 184; https://doi.org/10.3390/bdcc9070184 - 8 Jul 2025
Viewed by 787
Abstract
Large Language Models (LLMs) have emerged as powerful tools in cyber security, enabling automation, threat detection, and adaptive learning. Their ability to process unstructured data and generate context-aware outputs supports both operational tasks and educational initiatives. Despite their growing adoption, current research often [...] Read more.
Large Language Models (LLMs) have emerged as powerful tools in cyber security, enabling automation, threat detection, and adaptive learning. Their ability to process unstructured data and generate context-aware outputs supports both operational tasks and educational initiatives. Despite their growing adoption, current research often focuses on isolated applications, lacking a systematic understanding of how LLMs align with domain-specific requirements and pedagogical effectiveness. This highlights a pressing need for comprehensive evaluations that address the challenges of integration, generalization, and ethical deployment in both operational and educational cyber security environments. Therefore, this paper provides a comprehensive and State-of-the-Art review of the significant role of LLMs in cyber security, addressing both operational and educational dimensions. It introduces a holistic framework that categorizes LLM applications into six key cyber security domains, examining each in depth to demonstrate their impact on automation, context-aware reasoning, and adaptability to emerging threats. The paper highlights the potential of LLMs to enhance operational performance and educational effectiveness while also exploring emerging technical, ethical, and security challenges. The paper also uniquely addresses the underexamined area of LLMs in cyber security education by reviewing recent studies and illustrating how these models support personalized learning, hands-on training, and awareness initiatives. The key findings reveal that while LLMs offer significant potential in automating tasks and enabling personalized learning, challenges remain in model generalization, ethical deployment, and production readiness. Finally, the paper discusses open issues and future research directions for the application of LLMs in both operational and educational contexts. This paper serves as a valuable reference for researchers, educators, and practitioners aiming to develop intelligent, adaptive, scalable, and ethically responsible LLM-based cyber security solutions. Full article
Show Figures

Figure 1

Back to TopTop