Have a personal or library account? Click to login
Artificial Intelligence in Cybersecurity: Applications and Challenges Cover

Artificial Intelligence in Cybersecurity: Applications and Challenges

Open Access
|Dec 2025

References

  1. AI4Cyber. (2025). AI4Cyber EU Project. Available at:https://ai4cyber.eu, accessed on October 01, 2025.
  2. Chandola, V., Banerjee, A., & Kumar, V. (2021). Anomaly detection: a survey. ACM Computing Surveys, Vol. 41, no. 3, 1-58. Available at:https://doi.org/10.1145/1541880.1541882.
  3. Cunningham, M. (2025). Serge Egelman receives 2025 CyLab Distinguished Alumni Award. Available at:https://www.cylab.cmu.edu, accessed on October 01, 2025.
  4. DARPA. (n.d.). CGC: Cyber Grand Challenge. Available at:https://www.darpa.mil/program/cyber-grand-challenge, accessed on October 01, 2025.
  5. European School of Data Science and Technology. (n.d.). Artificial Intelligence: The Future and Its Applications. Available at:https://esdst.eu/arti%EF%AC%81cial-intelligence-the-future-and-its-applications/, accessed on October 01, 2025.
  6. Khalaf, L., et al. (2024). Deep Learning–Based Anomaly Detection in Network Traffic for Cybersecurity. ACM Digital Library. AICCONF ‘24: Proceedings of the Cognitive Models and Artificial Intelligence Conference, 303-309. DOI:10.1145/3660853.3660932.
  7. Mutalib, N.H.A., et al. (2024). Explainable deep learning approach for advanced persistent threats. Artificial Intelligence Review, Vol. 57(11), 297. Available at: https://doi.org/10.1007/s10462-024-10890-4.
  8. Nguyen, M.-D., et al. (2023). A deep learning anomaly detection framework with explainability and robustness. ACM Digital Library. ARES 2023: Proceedings of the 18th International Conference on Availability, Reliability and Security, 1-7. Available at: https://doi.org/10.1145/3600160.3605052.
  9. Pallavi, S. (2025). Redefining OT security with dedicated OT workflows & NEXT-gen visibility for industrial teams. Darktrace. Available at:https://www.darktrace.com/blog/darktrace-announces-unified-ot-security-introducing-dedicated-workflows-for-ot-engineers-segmentation-aware-risk-modeling-and-next-generation-endpoint-visibility-for-industrial-teams, accessed on October 01, 2025.
  10. Salem, A.H., et al. (2024). Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques. Journal of Big Data, Vol. 11. SpringerOpen. DOI: https://doi.org/10.1186/s40537-024-00957-y.
  11. Talukder, A., et al. (2024). Machine learning–based network intrusion detection for big and imbalanced data. Journal of Big Data, Vol. 11. SpringerOpen. DOI:https://doi.org/10.1186/s40537-024-00886-w.
DOI: https://doi.org/10.2478/bsaft-2025-0021 | Journal eISSN: 3100-5098 | Journal ISSN: 3100-508X
Language: English
Page range: 199 - 208
Published on: Dec 16, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2025 Loredana MOCEAN, Miranda-Petronella VLAD, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.