ARCHIVES
Review Article
The Rise of Intelligent Cyber Threats with Artificial Intelligence: Survey of New Attack Techniques
Santosh Kumar Jadala1
1 Department of Computer and Information Sciences, University of the Cumberlands, United States of America.
Published Online: May-August 2026
Pages: 327-335
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20260502036References
1. Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in the Internet of Things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198. https://doi.org/10.3390/electronics11020198
2. Ali, G., Mijwil, M. M., Buruga, B. A., Abotaleb, M., & Adamopoulos, I. (2024). A survey on artificial intelligence in cybersecurity for smart agriculture: State-of-the-art, cyber threats, artificial intelligence applications, and ethical concerns. Mesopotamian Journal of Computer Science, 2024, 53-103. https://journals.mesopotamian.press/index.php/cs/article/view/455
3. Aljabri, M., Aljameel, S. S., Mohammad, R. M. A., Almotiri, S. H., Mirza, S., Anis, F. M., ... & Altamimi, H. S. (2021). Intelligent techniques for detecting network attacks: review and research directions. Sensors, 21(21), 7070. https://doi.org/10.3390/s21217070
4. Arif, A., Khan, M. I., & Khan, A. R. A. (2024). An overview of cyber threats generated by AI. International Journal of Multidisciplinary Sciences and Arts, 3(4), 67-76. https://doi.org/10.47709/ijmdsa.v3i4.4753
5. Azhar, I. (2016). How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks: A systematic review. Ishaq Azhar Mohammed," HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS: A SYSTEMATIC REVIEW", International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882. https://ssrn.com/abstract=3905773
6. Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats, and Industry 4.0: Challenges and opportunities. Artificial intelligence review, 54(5), 3849-3886. https://doi.org/10.1007/s10462-020-09942-2
7. Dangi, A. K., Pant, K., Alanya-Beltran, J., Chakraborty, N., Akram, S. V., & Balakrishna, K. (2023, January). A Review of use of Artificial Intelligence on Cyber Security and the Fifth-Generation Cyber-attacks and their analysis. In 2023 International Conference on Artificial Intelligence and Smart Communication (AISC) (pp. 553-557). IEEE. https://doi.org/10.1109/AISC56616.2023.10085175
8. De Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. R. (2023). Artificial intelligence-based cybersecurity in the context of Industry 4.0—a survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
9. Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:1502.03552. https://doi.org/10.48550/arXiv.1502.03552
10. Eke, R. N., & Onyejegbu, L. N. (2023). Bibliometric and systematic review of artificial intelligence (AI) applications in cyber threat intelligence (AACTI) publications. African Journal of Advances in Science and Technology Research, 10(1), 57-78. https://publications.afropolitanjournals.com/index.php/ajastr/article/view/372
11. Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The emerging threat of AI-driven cyber attacks: A review. Applied Artificial Intelligence, 36(1), 2037254. https://doi.org/10.1080/08839514.2022.2037254
12. Guembe, B., Misra, S., Azeta, A., & Lopez-Baldominos, I. (2025). Bibliometric analysis of artificial intelligence cyberattack detection models. Artificial Intelligence Review, 58(6), 177. https://doi.org/10.1007/s10462-025-11167-0
13. Hassan, M. U. (2023). Study of artificial intelligence in cybersecurity and the emerging threat of AI-driven cyber attacks and challenges. Available at SSRN 4652028. https://dx.doi.org/10.2139/ssrn.4652028
14. Hu, Y., Kuang, W., Qin, Z., Li, K., Zhang, J., Gao, Y., ... & Li, K. (2021). Artificial intelligence security: Threats and countermeasures. ACM Computing Surveys (CSUR), 55(1), 1-36. https://doi.org/10.1145/3487890
15. Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 1(2), 564-574. 10.18535/ijsrm/v9i2.ec01
16. Jimmy, F. N. U. (2023). The Role of Artificial Intelligence in Predicting Cyber Threats. Valley International Journal Digital Library, 935-953. 10.18535/ijsrm/v11i08.ec04
17. Kallepalli, K., & Chaudhry, U. B. (2021). Intelligent security: Applying artificial intelligence to detect advanced cyber attacks. In Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (pp. 287-320). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-87166-6_11
18. Kaloudi, N., & Li, J. (2020). The AI-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), 1-34. https://doi.org/10.1145/3372823
19. Karpatou, P. A. (2025). The evolution of cybersecurity threats & the rise of artificial intelligence. https://dione.lib.unipi.gr/xmlui/handle/unipi/17786
20. Khalaf, B. A., Mostafa, S. A., Mustapha, A., Mohammed, M. A., & Abduallah, W. M. (2019). Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access, 7, 51691-51713. 10.1109/ACCESS.2019.2908998
21. Lakhal, H., Zegrari, M., & Bahnasse, A. (2025). Next-Generation Smart Grid Cybersecurity: A Systematic Review of OT Cyber Threats, AI-Driven Defense, Cyber Deception Techniques, and Emerging Security Strategies. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3623834
22. Liu, Y., Li, S., Wang, X., & Xu, L. (2024). A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences, 140(2). 10.32604/cmes.2024.046473
23. Malik, A., Arshid, K., Noonari, N., & Munir, R. (2025). Artificial intelligence-driven cybersecurity framework using machine learning for advanced threat detection and prevention. Sch. J. Eng. Tech, 6, 401-423. https://doi.org/10.36347/sjet.2025.v13i06.005
24. Manoharan, A., & Sarker, M. (2023). Revolutionizing cybersecurity: Unleashing the power of artificial intelligence and machine learning for next-generation threat detection. DOI: https://www. doi. org/10.56726/IRJMETS32644, 1. https://www.doi.org/10.56726/IRJMETS32644
25. Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems, 67(8), 6969-7055. https://doi.org/10.1007/s10115-025-02429-y
26. Muneer, S., Farooq, U., Athar, A., Ahsan Raza, M., Ghazal, T. M., & Sakib, S. (2024). A critical review of artificial intelligence-based approaches in intrusion detection: A comprehensive analysis. Journal of Engineering, 2024(1), 3909173. https://doi.org/10.1155/2024/3909173
27. Ozkan-Okay, M., Akin, E., Aslan, Ö., Kosunalp, S., Iliev, T., Stoyanov, I., & Beloev, I. (2024). A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cybersecurity solutions. IEEE Access, 12, 12229-12256. https://doi.org/10.1109/ACCESS.2024.3355547
28. Paramesha, M., Rane, N. L., & Rane, J. (2024). Artificial intelligence, machine learning, and deep learning for cybersecurity solutions: a review of emerging technologies and applications. Partners Universal Multidisciplinary Research Journal, 1(2), 84-109. https://d1wqtxts1xzle7.cloudfront.net/117213995/Artificial_Intelligence-libre.pdf?1722796138=&response-content-disposition=inline%3B+filename%3DArtificial_Intelligence_Machine_Learning.pdf&Expires=1777370295&Signature=FPugB97YjsUaamMVDnLkY1ad0T0ggX10nNjbgLNEGiNw5w5m1lC3LfnCgXdyMRM6jltv4qU5nQIawTKg7VM3dBEO-D1gY7hpjYvOio7StFXDN3Xgy4MA8JLtO4~tYkX4T8GLVrtNdC~8TZK3XTliBvyK~2kLa8vPc6VkIsxdMavAIsI12Iwtqj05BmNYcBCT4jKGCvanyBm5Xh8pGpkc1ALkXyR66cbzW6PF-E5ICwjYvkzq5VK-xvHeFBIF4BU4HfRXctqEyJ20L0O9LE8Y8AkLC3riR~HqWuvs6V0iM8ymvu0ijfp4Se7EWEoCEFpYxBm~l1D2PCvQKptfhExexQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
29. Qiu, S., Liu, Q., Zhou, S., & Wu, C. (2019). Review of artificial intelligence, adversarial attack, and defense technologies. Applied Sciences, 9(5), 909. https://doi.org/10.3390/app9050909
30. Rajendran, R. M., & Vyas, B. (2023). Cybersecurity threats and their prevention through artificial intelligence technology. International Journal for Multidisciplinary Research, 5(6), 1-18. https://www.researchgate.net/profile/Bhuman-Vyas/publication/376717717_Cyber_Security_Threat_And_Its_Prevention_Through_Artificial_Intelligence_Technology/links/6584c9ab3c472d2e8e79c4b2/Cyber-Security-Threat-And-Its-Prevention-Through-Artificial-Intelligence-Technology.pdf
31. Reddy, V. S. S. (2023). ADVANCED THREAT INTELLIGENCE UTILIZING AI TO PREDICT AND PREVENT CYBER ATTACKS. Global Journal of Cyber Security (GJCS), 1(01), 1-12. https://openlibindex.com/index.php/GJCS/article/view/GJCS_01_01_001
32. Sankaram, M., Roopesh, M., Rasetti, S., & Nishat, N. (2024). A comprehensive review of artificial intelligence applications in enhancing cybersecurity threat detection and response mechanisms. Management, 3(5). https://doi.org/10.62304/jbedpm.v3i05.180
33. Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 173. https://doi.org/10.1007/s42979-021-00557-0
34. Siddiqui, S. (2016). Cognitive artificial intelligence–a complexity-based machine learning approach for advanced cyber threats. https://mspace.lib.umanitoba.ca/server/api/core/bitstreams/2913066a-f9b9-4148-adc1-385933aa7c4f/content
35. Smith, M., Brown, C., & Asante, G. (2025). The Rise of Intelligent Threats: AI-Driven Cyber Attacks in Multi-Cloud Environments. https://www.researchgate.net/profile/Godfred-Asante-6/publication/393521324_The_Rise_of_Intelligent_Threats_AI-Driven_Cyber_Attacks_in_Multi-Cloud_Environments/links/686ea444e9b6c13c89e7cc63/The-Rise-of-Intelligent-Threats-AI-Driven-Cyber-Attacks-in-Multi-Cloud-Environments.pdf
36. Tao, F., Akhtar, M. S., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: A comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28). 10.4108/eai.7-7-2021.170285
37. Trifonov, R., Nakov, O., & Mladenov, V. (2018, December). Artificial intelligence in cyber threat intelligence. In the 2018 international conference on intelligent and innovative computing applications (ICONIC) (pp. 1-4). IEEE. 10.1109/ICONIC.2018.8601235
38. Yaseen, A. (2023). AI-driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity, 7(12), 25-43. https://orcid.org/0009-0002-8950-0767
39. Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022a). Explainable artificial intelligence applications in cybersecurity: State-of-the-art in research. IEEe Access, 10, 93104-93139. https://doi.org/10.1109/ACCESS.2022.3204051
40. Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., ... & Choo, K. K. R. (2022b). Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artificial Intelligence Review, 55(2). https://doi.org/10.1007/s10462-021-09976-0
2. Ali, G., Mijwil, M. M., Buruga, B. A., Abotaleb, M., & Adamopoulos, I. (2024). A survey on artificial intelligence in cybersecurity for smart agriculture: State-of-the-art, cyber threats, artificial intelligence applications, and ethical concerns. Mesopotamian Journal of Computer Science, 2024, 53-103. https://journals.mesopotamian.press/index.php/cs/article/view/455
3. Aljabri, M., Aljameel, S. S., Mohammad, R. M. A., Almotiri, S. H., Mirza, S., Anis, F. M., ... & Altamimi, H. S. (2021). Intelligent techniques for detecting network attacks: review and research directions. Sensors, 21(21), 7070. https://doi.org/10.3390/s21217070
4. Arif, A., Khan, M. I., & Khan, A. R. A. (2024). An overview of cyber threats generated by AI. International Journal of Multidisciplinary Sciences and Arts, 3(4), 67-76. https://doi.org/10.47709/ijmdsa.v3i4.4753
5. Azhar, I. (2016). How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks: A systematic review. Ishaq Azhar Mohammed," HOW ARTIFICIAL INTELLIGENCE IS CHANGING CYBER SECURITY LANDSCAPE AND PREVENTING CYBER ATTACKS: A SYSTEMATIC REVIEW", International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882. https://ssrn.com/abstract=3905773
6. Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats, and Industry 4.0: Challenges and opportunities. Artificial intelligence review, 54(5), 3849-3886. https://doi.org/10.1007/s10462-020-09942-2
7. Dangi, A. K., Pant, K., Alanya-Beltran, J., Chakraborty, N., Akram, S. V., & Balakrishna, K. (2023, January). A Review of use of Artificial Intelligence on Cyber Security and the Fifth-Generation Cyber-attacks and their analysis. In 2023 International Conference on Artificial Intelligence and Smart Communication (AISC) (pp. 553-557). IEEE. https://doi.org/10.1109/AISC56616.2023.10085175
8. De Azambuja, A. J. G., Plesker, C., Schützer, K., Anderl, R., Schleich, B., & Almeida, V. R. (2023). Artificial intelligence-based cybersecurity in the context of Industry 4.0—a survey. Electronics, 12(8), 1920. https://doi.org/10.3390/electronics12081920
9. Dilek, S., Çakır, H., & Aydın, M. (2015). Applications of artificial intelligence techniques to combating cyber crimes: A review. arXiv preprint arXiv:1502.03552. https://doi.org/10.48550/arXiv.1502.03552
10. Eke, R. N., & Onyejegbu, L. N. (2023). Bibliometric and systematic review of artificial intelligence (AI) applications in cyber threat intelligence (AACTI) publications. African Journal of Advances in Science and Technology Research, 10(1), 57-78. https://publications.afropolitanjournals.com/index.php/ajastr/article/view/372
11. Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The emerging threat of AI-driven cyber attacks: A review. Applied Artificial Intelligence, 36(1), 2037254. https://doi.org/10.1080/08839514.2022.2037254
12. Guembe, B., Misra, S., Azeta, A., & Lopez-Baldominos, I. (2025). Bibliometric analysis of artificial intelligence cyberattack detection models. Artificial Intelligence Review, 58(6), 177. https://doi.org/10.1007/s10462-025-11167-0
13. Hassan, M. U. (2023). Study of artificial intelligence in cybersecurity and the emerging threat of AI-driven cyber attacks and challenges. Available at SSRN 4652028. https://dx.doi.org/10.2139/ssrn.4652028
14. Hu, Y., Kuang, W., Qin, Z., Li, K., Zhang, J., Gao, Y., ... & Li, K. (2021). Artificial intelligence security: Threats and countermeasures. ACM Computing Surveys (CSUR), 55(1), 1-36. https://doi.org/10.1145/3487890
15. Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 1(2), 564-574. 10.18535/ijsrm/v9i2.ec01
16. Jimmy, F. N. U. (2023). The Role of Artificial Intelligence in Predicting Cyber Threats. Valley International Journal Digital Library, 935-953. 10.18535/ijsrm/v11i08.ec04
17. Kallepalli, K., & Chaudhry, U. B. (2021). Intelligent security: Applying artificial intelligence to detect advanced cyber attacks. In Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats (pp. 287-320). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-030-87166-6_11
18. Kaloudi, N., & Li, J. (2020). The AI-based cyber threat landscape: A survey. ACM Computing Surveys (CSUR), 53(1), 1-34. https://doi.org/10.1145/3372823
19. Karpatou, P. A. (2025). The evolution of cybersecurity threats & the rise of artificial intelligence. https://dione.lib.unipi.gr/xmlui/handle/unipi/17786
20. Khalaf, B. A., Mostafa, S. A., Mustapha, A., Mohammed, M. A., & Abduallah, W. M. (2019). Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access, 7, 51691-51713. 10.1109/ACCESS.2019.2908998
21. Lakhal, H., Zegrari, M., & Bahnasse, A. (2025). Next-Generation Smart Grid Cybersecurity: A Systematic Review of OT Cyber Threats, AI-Driven Defense, Cyber Deception Techniques, and Emerging Security Strategies. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3623834
22. Liu, Y., Li, S., Wang, X., & Xu, L. (2024). A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT. Computer Modeling in Engineering & Sciences, 140(2). 10.32604/cmes.2024.046473
23. Malik, A., Arshid, K., Noonari, N., & Munir, R. (2025). Artificial intelligence-driven cybersecurity framework using machine learning for advanced threat detection and prevention. Sch. J. Eng. Tech, 6, 401-423. https://doi.org/10.36347/sjet.2025.v13i06.005
24. Manoharan, A., & Sarker, M. (2023). Revolutionizing cybersecurity: Unleashing the power of artificial intelligence and machine learning for next-generation threat detection. DOI: https://www. doi. org/10.56726/IRJMETS32644, 1. https://www.doi.org/10.56726/IRJMETS32644
25. Mohamed, N. (2025). Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowledge and Information Systems, 67(8), 6969-7055. https://doi.org/10.1007/s10115-025-02429-y
26. Muneer, S., Farooq, U., Athar, A., Ahsan Raza, M., Ghazal, T. M., & Sakib, S. (2024). A critical review of artificial intelligence-based approaches in intrusion detection: A comprehensive analysis. Journal of Engineering, 2024(1), 3909173. https://doi.org/10.1155/2024/3909173
27. Ozkan-Okay, M., Akin, E., Aslan, Ö., Kosunalp, S., Iliev, T., Stoyanov, I., & Beloev, I. (2024). A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cybersecurity solutions. IEEE Access, 12, 12229-12256. https://doi.org/10.1109/ACCESS.2024.3355547
28. Paramesha, M., Rane, N. L., & Rane, J. (2024). Artificial intelligence, machine learning, and deep learning for cybersecurity solutions: a review of emerging technologies and applications. Partners Universal Multidisciplinary Research Journal, 1(2), 84-109. https://d1wqtxts1xzle7.cloudfront.net/117213995/Artificial_Intelligence-libre.pdf?1722796138=&response-content-disposition=inline%3B+filename%3DArtificial_Intelligence_Machine_Learning.pdf&Expires=1777370295&Signature=FPugB97YjsUaamMVDnLkY1ad0T0ggX10nNjbgLNEGiNw5w5m1lC3LfnCgXdyMRM6jltv4qU5nQIawTKg7VM3dBEO-D1gY7hpjYvOio7StFXDN3Xgy4MA8JLtO4~tYkX4T8GLVrtNdC~8TZK3XTliBvyK~2kLa8vPc6VkIsxdMavAIsI12Iwtqj05BmNYcBCT4jKGCvanyBm5Xh8pGpkc1ALkXyR66cbzW6PF-E5ICwjYvkzq5VK-xvHeFBIF4BU4HfRXctqEyJ20L0O9LE8Y8AkLC3riR~HqWuvs6V0iM8ymvu0ijfp4Se7EWEoCEFpYxBm~l1D2PCvQKptfhExexQ__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
29. Qiu, S., Liu, Q., Zhou, S., & Wu, C. (2019). Review of artificial intelligence, adversarial attack, and defense technologies. Applied Sciences, 9(5), 909. https://doi.org/10.3390/app9050909
30. Rajendran, R. M., & Vyas, B. (2023). Cybersecurity threats and their prevention through artificial intelligence technology. International Journal for Multidisciplinary Research, 5(6), 1-18. https://www.researchgate.net/profile/Bhuman-Vyas/publication/376717717_Cyber_Security_Threat_And_Its_Prevention_Through_Artificial_Intelligence_Technology/links/6584c9ab3c472d2e8e79c4b2/Cyber-Security-Threat-And-Its-Prevention-Through-Artificial-Intelligence-Technology.pdf
31. Reddy, V. S. S. (2023). ADVANCED THREAT INTELLIGENCE UTILIZING AI TO PREDICT AND PREVENT CYBER ATTACKS. Global Journal of Cyber Security (GJCS), 1(01), 1-12. https://openlibindex.com/index.php/GJCS/article/view/GJCS_01_01_001
32. Sankaram, M., Roopesh, M., Rasetti, S., & Nishat, N. (2024). A comprehensive review of artificial intelligence applications in enhancing cybersecurity threat detection and response mechanisms. Management, 3(5). https://doi.org/10.62304/jbedpm.v3i05.180
33. Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2(3), 173. https://doi.org/10.1007/s42979-021-00557-0
34. Siddiqui, S. (2016). Cognitive artificial intelligence–a complexity-based machine learning approach for advanced cyber threats. https://mspace.lib.umanitoba.ca/server/api/core/bitstreams/2913066a-f9b9-4148-adc1-385933aa7c4f/content
35. Smith, M., Brown, C., & Asante, G. (2025). The Rise of Intelligent Threats: AI-Driven Cyber Attacks in Multi-Cloud Environments. https://www.researchgate.net/profile/Godfred-Asante-6/publication/393521324_The_Rise_of_Intelligent_Threats_AI-Driven_Cyber_Attacks_in_Multi-Cloud_Environments/links/686ea444e9b6c13c89e7cc63/The-Rise-of-Intelligent-Threats-AI-Driven-Cyber-Attacks-in-Multi-Cloud-Environments.pdf
36. Tao, F., Akhtar, M. S., & Jiayuan, Z. (2021). The future of artificial intelligence in cybersecurity: A comprehensive survey. EAI Endorsed Transactions on Creative Technologies, 8(28). 10.4108/eai.7-7-2021.170285
37. Trifonov, R., Nakov, O., & Mladenov, V. (2018, December). Artificial intelligence in cyber threat intelligence. In the 2018 international conference on intelligent and innovative computing applications (ICONIC) (pp. 1-4). IEEE. 10.1109/ICONIC.2018.8601235
38. Yaseen, A. (2023). AI-driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity, 7(12), 25-43. https://orcid.org/0009-0002-8950-0767
39. Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022a). Explainable artificial intelligence applications in cybersecurity: State-of-the-art in research. IEEe Access, 10, 93104-93139. https://doi.org/10.1109/ACCESS.2022.3204051
40. Zhang, Z., Ning, H., Shi, F., Farha, F., Xu, Y., Xu, J., ... & Choo, K. K. R. (2022b). Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artificial Intelligence Review, 55(2). https://doi.org/10.1007/s10462-021-09976-0
Related Articles
2026
Artificial Intelligence in Learning and Teaching
2026
Admin Assist: An AI – Driven Configuration and Orchestration for Enterprise Application
2026
Enhancing Blood Group Identification using pigeon inspired optimization: An Innovative Approach
2026
Eco-Genius: Power Up Smart, Power Down Waste
2026
Crowd-Sourced Disaster Response and Rescue Assistant
2026