INNOVATIVE SOLUTIONS FOR SECURITY CHALLENGES: INTEGRATING NATURAL AND APPLIED SCIENCES IN THE EMERGING THREAT OF AI-DRIVEN CYBER ATTACKS – BIBLIOMETRIC ANALYSIS
Keywords:
cybersecurity threats, artificial intelligence, interdisciplinary collaboration, convergence of sciences, applied sciences, natural sciences, ethical considerations in cybersecurityAbstract
This paper explores innovative solutions for cybersecurity challenges by integrating insights from natural and applied sciences with a focus on AI-driven cyber-attacks. Utilizing bibliometric analysis, we systematically examine scientific publications from fields such as biology, chemistry, physics, computer science, engineering, and mathematics. Our study identifies key research trends, influential works, collaboration networks, and research gaps at the intersection of these disciplines and cybersecurity. By highlighting the potential of interdisciplinary approaches, this paper underscores the importance of a comprehensive strategy in enhancing cybersecurity resilience. The findings demonstrate the critical role of multidisciplinary research in developing robust and adaptive security measures to address the dynamic landscape of cyber threats.
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2016-2023). IoT Security: Ongoing Challenges and Research Directions. IEEE Access. https://doi.org/10.1109/ACCESS.2015.2437951
Atlantic Council. (2023, October 27). The 5×5—The cybersecurity implications of artificial intelligence. Retrieved from https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-the-cybersecurity-implications-of-artificial-intelligence/
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175-179.
Bose, I., & Leung, A. C. (2018). Unveiling the next generation of cyber security threats using artificial intelligence. Computer Fraud & Security, 2018(7), 8-12. https://doi.org/10.1016/S1361-3723(18)30074-7
Brundage, M., et al. (2024). Artificial Intelligence and Cybersecurity. Intereconomics. Retrieved from https://www.intereconomics.eu/contents/year/2024/number/1/article/artificial-intelligence-and-cybersecurity.html
Dasgupta, D. (1997). Immunity-based intrusion detection system: A general framework. Proceedings of the 22nd National Information Systems Security Conference (NISSC).
Department of Homeland Security. (2024, February 7). Leading AI at DHS | Homeland Security. Retrieved from https://www.dhs.gov/ai/join
Dhillon, G. S., & Moores, J. (2017). Advanced threat analytics: A perspective on insights, challenges, and the path ahead. IEEE Security & Privacy, 15(5), 62–69. https://doi.org/10.1109/MSP.2017.3481228
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
Goodfellow, I., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. https://arxiv.org/abs/1412.6572
Goodfellow, I. J., Shlens, J., Szegedy, C., Zaremba, W., & Fergus, R. (2014-2021). Adversarial Examples in Deep Learning. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. https://doi.org/10.1145/3050213.3050228
Herzog, S. (2017). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60. https://doi.org/10.5038/1944-0472.4.2.3
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. https://doi.org/10.1038/nature14539
Li, T., Wang, J., & Ding, H. (2018). Applications of artificial intelligence in intelligent manufacturing: A review. Frontiers of Information Technology & Electronic Engineering, 19(1), 86-95. https://doi.org/10.1631/FITEE.1700826
Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z. B., & Swami, A. (2017-2022). Adversarial Attacks and Defenses in Deep Learning. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3128572.3140445
Saxe, A. M., Bansal, Y., Ogale, A., Nguyen, A., & Kohli, P. (2015-2022). Deep Learning for Malware Detection. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2819338
Security Magazine. (2024, January 15). The intersection of cybersecurity and artificial intelligence. Retrieved from https://www.securitymagazine.com/articles/100312-the-intersection-of-cybersecurity-and-artificial-intelligence
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP.2010.25
Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199.
Symantec. (2019). Internet Security Threat Report. Volume 24.
Smith, R. N., Ford, B., & White, G. (2018). Intelligent user interface security. In Proceedings of the 10th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (pp. 57–68). Association for Computing Machinery. https://doi.org/10.1145/2324929.2324930
Song, Q., Wang, Y., Liu, Q., Li, X., & Dong, H. (2014-2020). Security and Privacy in Machine Learning. IEEE Access. https://doi.org/10.1109/ACCESS.2020.3005048
Swami, A., Khan, L., Chen, H., Choo, K. K. R., & Gu, D. (2018-2024). AI in Cybersecurity: Threats and Opportunities. Computers & Security. https://doi.org/10.1016/j.compsec.2021.102250
Tramèr, F., Papernot, N., Carlini, N., Brendel, W., Madry, A., & Goodfellow, I. J. (2017-2024). Robustness of Machine Learning Models. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3243734.3243809
Yang, Q., Wu, Y., Ren, F., & Li, C. (2016-2023). Machine Learning for Internet of Things Security. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2021.3051279
Yuan, Y., Zhu, D., Wang, S., & Xing, C. (2015-2021). Cyber-Physical Attacks and Defenses. Proceedings of the ACM Conference on Computer and Communications Security. https://doi.org/10.1145/3225058.3225081
Zhang, C., Liu, J., Li, C., & Shi, W. (2019-2023). Deep Reinforcement Learning for Network Security. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2021