Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms: This 2025 review presents an in-depth survey of state-of-the-art AI/ML techniques applied to cybersecurity tasks — intrusion detection, malware classification, behavioral analysis, threat intelligence. It highlights both the progress and critical gaps: for example, lack of explainability, adversarial ML risks, scalability and privacy issues. The paper also maps out future paradigms (e.g. federated learning, quantum-AI convergence. (N. Mohamed et al.) From Knowledge and Information Systems (2025)
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations: This paper reviews how generative AI (GAI / LLMs) is transforming cybersecurity: not only for defense (e.g. threat detection, anomaly detection, automation of responses) but also how attackers may leverage GAI for social engineering, malware, phishing, and more. It discusses limitations (misuse potential, incorrect outputs, high resource/training cost) and calls for balanced, cautious adoption. (Mueen Uddin, Muhammad Saad Irshad, Irfan Ali, Fuhid Alanazi, Fahad Ahmed, Muhammad Maaz, Saddam Hussain, Syed Sajid Ullah) From Artificial Intelligence Review 58 (2025)
Organizational Adaptation to Generative AI in Cybersecurity: A Systematic Review: This 2025 systematic review studies how real-world organizations are adapting their cybersecurity operations to integrate generative AI. It analyses 25 studies (2022–2025) and identifies patterns: adoption of LLMs in threat detection, automation of incident response, hybrid human–AI workflows. The paper also discusses challenges: explainability, data quality, bias, training, governance. It offers a roadmap for secure and responsible GenAI deployment in enterprise cyber-defense. (Christopher Nott)
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation: A systematic review of how generative adversarial networks (GANs) can be used—not just to mount attacks, but as defenses. The paper surveys studies (2021–August 2025) on using GAN-based techniques for network intrusion detection, malware analysis, IoT security. It lays out a taxonomy (defensive function, GAN architecture, threat model, cybersecurity domain) and discusses strengths (improved detection accuracy, resilience) and persistent challenges (instability, lack of explainability, high computational cost, absence of standard benchmarks). (Tharcisse Ndayipfukamiye, Jianguo Ding, Doreen Sebastian Sarwatt, Adamu Gaston Philipo, Huansheng Ning)