AI-Powered Vulnerability Detection and Adaptive Defense Strategies in Cybersecurity
Abstract
Keywords
Ethical Statement
Thanks
References
- N. G. Camacho, “The Role of AI in Cybersecurity: Addressing Threats in the Digital Age,” J. Artif. Intell. Gen. Sci. (JAIGS), vol. 3, no. 1, pp. 143–154, 2024.
- N. Mohamed, "Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms," Knowledge and Information Systems, 2025. [Online]. Available: https://doi.org/10.1007/s10115-025-02429-y.
- K. M. Roba Abbas, J. Pitt, K. M. Vogel, and M. Zafeirakopoulos, “Artificial Intelligence (AI) in Cybersecurity: a socio-technical research roadmap,” 2022. [Online]. Available: https://www.turing.ac.uk/sites/default/files/2023-11/ai_in_cybersecurity.pdf
- N. Mohamed, “Current trends in AI and ML for cybersecurity: A state-of-the-art survey,” Cogent Eng., vol. 10, no. 2, 2023.
- M. I. Alghamdi, “Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security,” Int. J. Interact. Mob. Technol., vol. 14, no. 16, 2020.
- S. Ali, S. U. Rehman, A. Imran, G. Adeem, Z. Iqbal, and K.-I. Kim, “Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection,” Electronics, vol. 11, no. 23, p. 3934, 2022.
- S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020.
- M. Tayyab, M. Marjani, N. Z. Jhanjhi, I. A. T. Hashem, R. S. A. Usmani, and F. Qamar, “A comprehensive review on deep learning algorithms: Security and privacy issues,” Comput. Secur., vol. 131, p. 103297, 2023.
Details
Primary Language
English
Subjects
Software Testing, Verification and Validation
Journal Section
Research Article
Early Pub Date
September 29, 2025
Publication Date
September 30, 2025
Submission Date
June 2, 2025
Acceptance Date
July 5, 2025
Published in Issue
Year 2025 Volume: 8 Number: 3
Cited By
Towards high-coverage web fuzzing: a framework integrating hybrid semantic modeling and online adaptive optimization
Journal of Computer Virology and Hacking Techniques
https://doi.org/10.1007/s11416-026-00610-7
