INNOVATIVE SOLUTIONS FOR SECURITY CHALLENGES: INTEGRATING NATURAL AND APPLIED SCIENCES IN THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS – BIBLIOMETRIC ANALYSIS

Authors

  • Alexandru Ioan MINISTRY OF INTERNAL AFFAIRS

Keywords:

cybersecurity threats, artificial intelligence, interdisciplinary collaboration, convergence of sciences, applied sciences, natural sciences, ethical considerations in cybersecurity

Abstract

This paper explores innovative solutions for cybersecurity challenges by integrating insights from natural and applied sciences with a focus on AI-driven cyber-attacks. Utilizing bibliometric analysis, we systematically examine scientific publications from fields such as biology, chemistry, physics, computer science, engineering, and mathematics. Our study identifies key research trends, influential works, collaboration networks, and research gaps at the intersection of these disciplines and cybersecurity. By highlighting the potential of interdisciplinary approaches, this paper underscores the importance of a comprehensive strategy in enhancing cybersecurity resilience. The findings demonstrate the critical role of multidisciplinary research in developing robust and adaptive security measures to address the dynamic landscape of cyber threats.

References

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2016-2023). IoT Security: Ongoing Challenges and Research Directions. IEEE Access. https://doi.org/10.1109/ACCESS.2015.2437951

Atlantic Council. (2023, October 27). The 5×5—The cybersecurity implications of artificial intelligence. Retrieved from https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-the-cybersecurity-implications-of-artificial-intelligence/

Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175-179.

Bose, I., & Leung, A. C. (2018). Unveiling the next generation of cyber security threats using artificial intelligence. Computer Fraud & Security, 2018(7), 8-12. https://doi.org/10.1016/S1361-3723(18)30074-7

Brundage, M., et al. (2024). Artificial Intelligence and Cybersecurity. Intereconomics. Retrieved from https://www.intereconomics.eu/contents/year/2024/number/1/article/artificial-intelligence-and-cybersecurity.html

Dasgupta, D. (1997). Immunity-based intrusion detection system: A general framework. Proceedings of the 22nd National Information Systems Security Conference (NISSC).

Department of Homeland Security. (2024, February 7). Leading AI at DHS | Homeland Security. Retrieved from https://www.dhs.gov/ai/join

Dhillon, G. S., & Moores, J. (2017). Advanced threat analytics: A perspective on insights, challenges, and the path ahead. IEEE Security & Privacy, 15(5), 62–69. https://doi.org/10.1109/MSP.2017.3481228

Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

Goodfellow, I., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. https://arxiv.org/abs/1412.6572

Goodfellow, I. J., Shlens, J., Szegedy, C., Zaremba, W., & Fergus, R. (2014-2021). Adversarial Examples in Deep Learning. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. https://doi.org/10.1145/3050213.3050228

Herzog, S. (2017). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60. https://doi.org/10.5038/1944-0472.4.2.3

LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. https://doi.org/10.1038/nature14539

Li, T., Wang, J., & Ding, H. (2018). Applications of artificial intelligence in intelligent manufacturing: A review. Frontiers of Information Technology & Electronic Engineering, 19(1), 86-95. https://doi.org/10.1631/FITEE.1700826

Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2017-2022). Adversarial Attacks and Defenses in Deep Learning. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3128572.3140445

Saxe, A. M., Bansal, Y., Ogale, A., Nguyen, A., & Kohli, P. (2015-2022). Deep Learning for Malware Detection. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2819338

Security Magazine. (2024, January 15). The intersection of cybersecurity and artificial intelligence. Retrieved from https://www.securitymagazine.com/articles/100312-the-intersection-of-cybersecurity-and-artificial-intelligence

Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2010.25

Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199.

Symantec. (2019). Internet Security Threat Report. Volume 24.

Smith, R. N., Ford, B., & White, G. (2018). Intelligent user interface security. In Proceedings of the 10th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (pp. 57–68). Association for Computing Machinery. https://doi.org/10.1145/2324929.2324930

Song, Q., Wang, Y., Liu, Q., Li, X., & Dong, H. (2014-2020). Security and Privacy in Machine Learning. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3005048

Swami, A., Khan, L., Chen, H., Choo, K. K. R., & Gu, D. (2018-2024). AI in Cybersecurity: Threats and Opportunities. Computers & Security. https://doi.org/10.1016/j.compsec.2021.102250

Tramèr, F., Papernot, N., Carlini, N., Brendel, W., Madry, A., & Goodfellow, I. J. (2017-2024). Robustness of Machine Learning Models. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243809

Yang, Q., Wu, Y., Ren, F., & Li, C. (2016-2023). Machine Learning for Internet of Things Security. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2021.3051279

Yuan, Y., Zhu, D., Wang, S., & Xing, C. (2015-2021). Cyber-Physical Attacks and Defenses. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3225058.3225081

Zhang, C., Liu, J., Li, C., & Shi, W. (2019-2023). Deep Reinforcement Learning for Network Security. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2021

Downloads

Published

2025-03-25

Issue

Section

Natural and Applied Sciences in Forensics, Cybercrime and Security