Red Teaming with Artificial Intelligence-Driven Cyberattacks: A Scoping Review (Mays Al-Azzawi; Dung Doan; Tuomo Sipola; Jari Hautamäki; Tero Kokkonen) This scoping review analyzes how artificial intelligence is being operationalized in offensive cybersecurity contexts, particularly red teaming. Screening 470 records, the authors identify AI-enabled attack vectors including automated penetration, data exfiltration, credential harvesting, and social engineering. The paper highlights how AI accelerates reconnaissance and exploitation phases while lowering attacker skill thresholds. It also frames AI-driven red teaming as a defensive necessity for simulating next-generation threats.
Securing the AI Frontier: Urgent Ethical and Regulatory Imperatives for AI-Driven Cybersecurity (Vikram Kulothungan): This article examines governance and regulatory tensions emerging from AI integration into cybersecurity systems. It surveys global regulatory frameworks (including EU risk-based models), then analyzes ethical risks such as algorithmic bias, privacy erosion, transparency deficits, and accountability gaps. The author argues for harmonized international policy and increased public AI literacy to ensure responsible deployment of AI-enabled cyber defense technologies.
Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation (Tharcisse Ndayipfukamiye; Jianguo Ding; Doreen Sebastian Sarwatt; Adamu Gaston Philipo; Huansheng Ning): This systematic review synthesizes 185 peer-reviewed studies on Generative Adversarial Networks (GANs) in cybersecurity. It proposes a taxonomy covering defensive functions, architectures, domains, and threat models. Findings show GANs improving intrusion detection, malware classification, and IoT security resilience. However, issues such as training instability, benchmarking gaps, computational cost, and explainability remain barriers to operational deployment.
Zero Trust Cybersecurity: Procedures and Considerations in Context (Brady D. Lund; Tae Hee Lee; Ziang Wang; Ting Wang; Nishith Reddy Mannuru):This paper evaluates Zero Trust Architecture (ZTA) as a response to increasingly sophisticated, AI-augmented threat landscapes. It details implementation principles such as continuous authentication, least-privilege access, and breach-assumption design. Case analysis focuses on high-information-exchange environments (e.g., libraries, educational institutions), illustrating how ZTA mitigates lateral movement and insider risk.
Advancing Cybersecurity Through Machine Learning: A Scientometric Analysis of Global Research Trends and Influential Contributions (Kamran Razzaq; Mahmood Shah) Using scientometric and bibliometric techniques, this study maps global research output at the intersection of machine learning and cybersecurity. It identifies publication growth, leading institutions, collaboration networks, and dominant subfields (e.g., intrusion detection, malware analytics). The authors highlight ML’s accelerating role in predictive defense and automated threat intelligence while noting concentration of influence among a small cluster of research hubs.
Integrating Artificial Intelligence into the Cybersecurity Curriculum in Higher Education: A Systematic Literature Review (Jing Tian) This systematic literature review examines how universities are embedding AI into cybersecurity education. It evaluates curriculum models, competency frameworks, lab environments, and interdisciplinary integration. The paper concludes that AI literacy is becoming foundational for cyber workforce readiness, recommending expanded hands-on training in automated defense, adversarial ML, and AI risk governance.