Federated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy-Preserving and Real-Time Threat Detection Capabilities (Milad Rahmati): This paper proposes a decentralized cybersecurity architecture tailored to IoT ecosystems using federated learning. Instead of aggregating sensitive telemetry in a central repository, models are trained locally on edge devices and securely aggregated using homomorphic encryption. The framework leverages recurrent neural networks to detect anomalies such as DDoS attacks while preserving data privacy. Reported detection accuracy exceeds 98%, with improved energy efficiency relative to centralized approaches. The study addresses scalability, privacy preservation, and real-time detection—three persistent bottlenecks in IoT security.
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection (Sina Ahmadi): This research introduces machine-learning firewalls capable of continual retraining in production environments. Unlike static rule-based systems, these firewalls adapt to emergent threat signatures using reinforcement and continual learning pipelines. The architecture supports distributed micro-services deployments, integrates with Zero Trust models, and optimizes latency and throughput. The work frames adaptive perimeter defense as essential given polymorphic malware and AI-assisted intrusion techniques.
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation (Tharcisse Ndayipfukamiye; Jianguo Ding; Doreen Sebastian Sarwatt; Adamu Gaston Philipo; Huansheng Ning): This systematic review analyzes 185 peer-reviewed studies on the dual use of Generative Adversarial Networks in cyber offense and defense. It proposes a four-dimensional taxonomy covering GAN architectures, defensive roles, threat models, and cybersecurity domains. Findings show GANs improve intrusion detection, malware classification, and synthetic threat simulation but suffer from training instability, explainability deficits, and computational overhead. The paper outlines a research roadmap emphasizing hybrid GAN models and defenses against LLM-driven cyberattacks.
Algorithmic Segmentation and Behavioral Profiling for Ransomware Detection Using Temporal-Correlation Graphs (Ignatius Rollere; Caspian Hartsfield; Seraphina Courtenay; Lucian Fenwick; Aurelia Grunwald): This article presents a graph-analytics framework for ransomware detection based on temporal-correlation modeling of system behaviors. By mapping encryption activity, process lineage, and anomaly timing, the system distinguishes malicious from benign operations in real time. Experimental evaluations show superior precision and recall compared to signature-based and heuristic tools, particularly against polymorphic ransomware strains. The architecture is designed for enterprise scalability and modular SOC integration.
Generative AI Revolution in Cybersecurity: A Comprehensive Review of Threat Intelligence and Operations (Mueen Uddin; Muhammad Saad Irshad; Irfan Ali Kandhro; et al.): This review examines how generative AI is transforming cyber threat intelligence, SOC automation, and attack simulation. It surveys applications including automated phishing detection, malware generation analysis, vulnerability discovery, and incident response orchestration. The authors also evaluate risk externalities—such as AI-enabled social engineering and autonomous attack tooling—positioning generative models as both defensive accelerants and threat multipliers.
Keeping Up with the KEMs: Stronger Security Notions for KEMs and Automated Analysis of KEM-based Protocols (Cas Cremers; Alexander Dax; Niklas Medinger): Focused on post-quantum cryptography, this award-winning paper advances formal security models for Key Encapsulation Mechanisms (KEMs), a foundational primitive in hybrid and quantum-resistant encryption schemes. The authors introduce stronger security definitions and automated symbolic analysis techniques to validate KEM-based protocols. The work is highly relevant as governments and critical infrastructure sectors prepare for quantum decryption threats.