Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms, fromKnowledge and Information Systems: This is a comprehensive survey (published April 2025) of how AI (especially machine learning) is being applied in cybersecurity. The paper covers intrusion detection, malware classification, behavioral analysis, and threat intelligence. It also discusses future paradigms — where traditional defense mechanisms are no longer sufficient, and AI-driven security is needed to counter increasingly sophisticated cyber threats.
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations, from Artificial Intelligence Review: This paper explores the role of generative AI (GenAI) in cybersecurity operations. It examines how generative models can support threat intelligence, automate responses, and assist in security operations more autonomously. The authors also look at potential risks and trade-offs when deploying GenAI in cyber defense.
Organizational Adaptation to Generative AI in Cybersecurity: A Systematic Review (Christopher Nott): This May 2025 study investigates how organizations are adapting their cybersecurity operations in response to the advent of generative AI. Using systematic document analysis and case studies, it identifies how firms are changing their threat modeling, governance, and incident response frameworks. It notes that successful adoption tends to come from organizations with mature security infrastructure, strong human oversight, and clear AI governance.
A cybersecurity AI agent selection and decision support framework (Masike Malatji): This October 2025 paper proposes a structured decision-support framework for selecting different types of AI agents (reactive, cognitive, hybrid, learning) in line with the NIST Cybersecurity Framework 2.0. The framework considers attributes like autonomy, learning capability, and responsiveness, linking them to real-world cyber tasks (e.g., detection, incident response). It also defines graduated autonomy levels (assisted, augmented, autonomous) to align with different organizational maturity levels.
Towards Explainable and Lightweight AI for Real-Time Cyber Threat Hunting in Edge Networks (Milad Rahmati): Published in April 2025, this paper addresses the challenges of deploying AI on edge devices, such as resource constraints and lack of interpretability. It proposes an “Explainable and Lightweight AI (ELAI)” framework combining decision trees, attention-based deep learning, and federated learning. This hybrid approach aims to deliver real-time threat detection on edge networks, with transparency (so analysts understand AI decisions) and efficiency.
Harnessing artificial intelligence (AI) for cybersecurity: Challenges, opportunities, risks, future directions (Zarif Bin Akhtar & Ahmed Tajbiul Rawol), fromComputing and Artificial Intelligence:This article examines how AI can be both a powerful tool for cybersecurity and a source of risk. The authors explore vulnerabilities inherent in AI systems (e.g., data poisoning, adversarial attacks) and discuss ethical, regulatory, and governance issues. They also propose strategic solutions and frameworks to build robust AI-based security systems.