Author of the publication

Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review on Serious Games in E-learning., , , , , and . CoRR, (2022)Vehicle physical parameter identification based on an improved Harris hawks optimization and the transfer matrix method for multibody systems., , , , , and . Appl. Intell., 53 (2): 2391-2409 (2023)Cyber-Physical Systems Security Based on a Cross-Linked and Correlated Vulnerability Database., , and . CRITIS, volume 11777 of Lecture Notes in Computer Science, page 71-82. Springer, (2019)A Review on Serious Games in E-learning., , , , , and . SSCI, page 1-8. IEEE, (2021)Fidelity in Simulation-Based Serious Games., , , and . IEEE Trans. Learn. Technol., 13 (2): 340-353 (2020)Industry harmonization for Unified Standards on Autonomic Management & Control (AMC) of Networks and Services, SDN and NFV., , , , , , and . GLOBECOM Workshops, page 155-160. IEEE, (2014)A Survey on the Metaverse: The State-of-the-Art, Technologies, Applications, and Challenges., , , , , , , and . IEEE Internet Things J., 10 (16): 14671-14688 (August 2023)Securing federated learning with blockchain: a systematic literature review., , , and . Artif. Intell. Rev., 56 (5): 3951-3985 (May 2023)Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations., , , , , and . CoRR, (2023)A Semantic Framework with Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems., , , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 128-143. Springer, (2019)