[
Basit, A., et al. (2021). A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommunication Systems. 10.1007/s11235-020-00733-2.
]Search in Google Scholar
[
Brown, T.B., et al. (2020). Language Models are Few-Shot Learners. arXiv:2005.14165 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.2005.14165.
]Search in Google Scholar
[
Chen, B., et al. (2023). Unleashing the potential of prompt engineering in Large Language Models: a comprehensive review. arXiv:2310.14735 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.2310.14735.
]Search in Google Scholar
[
Devlin, J., et al. (2018). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.1810.04805.
]Search in Google Scholar
[
Fieblinger, R., et al. (2024). Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models. arXiv:2407.02528 [cs.CR]. Available at: https://doi.org/10.48550/arXiv.2407.02528
]Search in Google Scholar
[
Freitas, S., et al. (2024). AI-Driven Guided Response for Security Operation Centers with Microsoft Copilot for Security. arXiv:2407.09017 [cs.LG]. Available at: https://doi.org/10.48550/arXiv.2407.09017.
]Search in Google Scholar
[
Huang, Q., et al. (2024). Selective Prompting Tuning for Personalized Conversations with LLMs. arXiv:2406.18187 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.2406.18187
]Search in Google Scholar
[
IBM (2024). What is NLP?. Available at: https://www.ibm.com/think/topics/ai-agents, accessed on January 2025.
]Search in Google Scholar
[
Kirk, J.R., et al. (2022). Improving Language Model Prompting in Support of Semi-autonomous Task Learning. arXiv:2209.07636 [cs.LG]. Available at: https://doi.org/10.48550/arXiv.2209.07636.
]Search in Google Scholar
[
Molleti, R., et al. (2024). Automated threat detection and response using LLM agents. World Journal of Advanced Research and Reviews, 2024, 24(02), 079-090. Available at: https://doi.org/10.30574/wjarr.2024.24.2.3329.
]Search in Google Scholar
[
Palo Alto Networks. (2025). Cloud Security What Are Large Language Models (LLMs)? Available at: https://www.paloaltonetworks.com/cyberpedia/large-language-models-llm, accessed on February 2025.
]Search in Google Scholar
[
Patel, H., & Parmar, S. (2024). Prompt Engineering for Large Language Model. DOI:10.13140/RG.2.2.11549.93923.
]Search in Google Scholar
[
Patel, V., et al. (2025). Unveiling network intrusions: Leveraging large language models for anomaly detection in cybersecurity. AIP Conf. Proc., Vol. 3255, Nr. 1, 020011 (2025). Available at: https://doi.org/10.1063/5.0254175.
]Search in Google Scholar
[
Reynolds, L., & McDonell, K. (2021). Prompt Programming for Large Language Models: Beyond the Few-Shot Paradigm. arXiv:2102.07350 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.2102.07350.
]Search in Google Scholar
[
Shah, C. (2024). From Prompt Engineering to Prompt Science with Human in the Loop. arXiv:2401.04122 [cs.HC]. Available at: https://doi.org/10.48550/arXiv.2401.04122.
]Search in Google Scholar
[
Sharma, M. (2025). What is Prompt Engineering? Almost everything you want to know about one of the hottest jobs in AI. Techradar. Available at: https://www.techradar.com/computing/artificial-intelligence/what-is-prompt-engineering-almost-everything-you-want-to-know-about-one-of-the-hottest-job-in-ai, accessed on February 2025.
]Search in Google Scholar
[
Siemerink, A., Jansen, S., & Labunets, K. (2025). The Dual-Edged Sword of Large Language Models in Phishing. In: Horn Iwaya, L., Kamm, L., Martucci, L., Pulls, T. (eds) Secure IT Systems. NordSec 2024. Lecture Notes in Computer Science, Vol 15396. Springer, Cham. Available at: https://doi.org/10.1007/978-3-031-79007-2_14.
]Search in Google Scholar
[
Stanford NLP Group. (n.d.). Available at: https://nlp.stanford.edu/, accessed on January 2025.
]Search in Google Scholar
[
Zhang, Z., et al. (2024). Multimodal Chain-of-Thought Reasoning in Language Models. arXiv:2301.07069 [cs.CL]. Available at: https://doi.org/10.48550/arXiv.2301.07069.
]Search in Google Scholar