techniques and future paradigms, Knowledge and Information Systems, 2025, 67, 6969–7055, doi:
10.1007/s10115-025-02429-y.
[8] M. Malatji, A. Tolah, Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for
understanding adversarial and offensive AI, AI Ethics, 2024, doi: 10.1007/s43681-024-00427-4.
[9] M. F. A. Sheikh, S. Gaur, H. Desai, S. K. Sharma, A study of performance evaluation of cryptographic algorithm,
In: Emerging Trends in Expert Applications and Security (ICETEAS 2018), Advances in Intelligent Systems and
Computing Series, 2018, 841, 379–384.
[10] T. Choithani, A. Chowdhury, S. Patel, P. Patel, D. Patel, M. Shah, A comprehensive study of artificial intelligence
and cybersecurity on bitcoin, cryptocurrency and banking system, Annals of Data Science, 2024, 11, 103–135,
10.1007/s40745-022-00433-5.
[11] N. Sharma, N. Jindal, Emerging artificial intelligence applications: metaverse, IoT, cybersecurity, healthcare-an
overview, Multimedia Tools and Applications, 2024, 83, 57317–57345, doi: 10.1007/s11042-023-17890-6.
[12] D. K. Sharma, J. Mishra, A. Singh, R. Govil, G. Srivastava, J. C. W. Lin, Explainable artificial intelligence for
cybersecurity, Computers & Electrical Engineering, 2022, 103, 108356, doi:
10.1016/j.compeleceng.2022.108356.
[13] R. Das, R. Sandhane, Artificial intelligence in cybersecurity, Journal of Physics: Conference Series, 2021, 1964,
042072, doi: 10.1088/1742-6596/1964/4/042072.
[14] G. Rjoub, J. Bentahar, O. A. Wahab, R. Mizouni, A. Song, R. Cohen, H. Otrok, A. Mourad, A survey on
explainable artificial intelligence for cybersecurity, IEEE Transactions on Network and Service Management,
2023, 20, 5115–5140, doi: 10.1109/TNSM.2023.3282740.
[15] K. Michael, R. Abbas, G. Roussos, AI in cybersecurity: the paradox, IEEE Transactions on Technology and
Society, 2023, 4, 104–109, doi: 10.1109/TTS.2023.3280109.
[16] Symantec, Internet Security Threat Report (ISTR-19), 2019, 24.
[17] S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and
System Security, 2000, 3, 186–205, doi: 10.1145/357830.357849.
[18] R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, In:
31st IEEE Symposium on Security and Privacy, 2010, 305–316, doi: 10.1109/SP.2010.25.
[19] ENISA, Threat landscape report, European Union Agency for Cybersecurity, 2022, doi: 10.2824/764318.
[20] A. L. Buczak, E. Guven, A survey of data mining and machine learning methods for cybersecurity intrusion
detection, IEEE Communications Surveys & Tutorials, 2016, 18, 1153–1176, doi: 10.1109/COMST.2015.2494502.
[21] ENISA, Artificial intelligence and cybersecurity: challenges and opportunities, 2020, doi: 10.2824/808362.
[22] M. Chouhan, S. Gour, A hybrid machine learning framework for proactive threat detection in cybersecurity using
intelligent feature, Smart Innovation, Systems and Technologies, Springer Singapore, 2026, 124, 629–640, doi:
10.1007/978-981-95-1353-6_49.
[23] V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey, ACM Computing Surveys, 2009, 41, 1–72, doi:
10.1145/1541880.1541882.
[24] G. Kim, S. Lee, S. Kim, A novel hybrid intrusion detection method integrating anomaly detection with misuse
detection, Expert Systems with Applications, 2014, 41, 1690–1700.
[25] S. Gour, V. Khanna, Assessment of efficiency of machine learning algorithms in loan-default prediction,
International Journal of Engineering and Designing Innovation, 2025, 7, 01–06, doi: 10.2019/IJEDI/202511001.
[26] S. Gour, P. Soni, Loan default prediction using ensemble machine learning algorithms, Journal of Smart Sensor
and Computing, 2025, 1, 25215, doi: 10.64189/ssc.25215.
[27] D. Dave, G. Sawhney, P. Aggarwal, N. Silswal, D. Khut, The new frontier of cybersecurity: emerging threats and
innovations, arXiv preprint, 2023, doi: 10.48550/arXiv.2311.02630.
[28] S. T. Erukude, V. C. Marella, S. R. Veluru, AI-driven cybersecurity threats: a survey of emerging risks and
defensive strategies, arXiv preprint, 2026, arXiv:2601.03304.
[29] V. K. Kushi, S. R. Gadag, M. U. Pasha, Sushmitha E., M. Kotari, Emerging threats and innovative solutions in
cybersecurity: a comprehensive review, International Journal of Advances in Computer Science and Technology,
2024, 13, 47–54, doi: 10.30534/ijacst/2024/091312024.
[30] A. I. Jony, S. A. Hamim, Navigating the cyber threat landscape: a comprehensive analysis of attacks and security
in the digital age, Journal of Information Technology and Cyber Security, 2023, 1, 53–67, doi: 10.30996/jitcs.9715.
[31] S. Razaulla, C. Fachkha, C. Markarian, A. Gawanmeh, W. Mansoor, B. C. M. Fung, C. Assi, The age of
ransomware: a survey on the evolution, taxonomy, and research directions, IEEE Access, 2023, 11, 40698–40723,
doi: 10.1109/ACCESS.2023.3268535.
[32] A. K. Jain, B. B. Gupta, A survey of phishing attack techniques, defence mechanisms and open research
challenges, Enterprise Information Systems, 2022, 16, 527–565, doi: 10.1080/17517575.2021.1896786.
[33] R. Zieni, L. Massari, M. C. Calzarossa, Phishing or not phishing? a survey on the detection of phishing websites,
IEEE Access, 2023, 11, 18499–18519, doi: 10.1109/ACCESS.2023.3247135.
[34] M. Gniewkowski, An overview of DoS and DDoS attack detection techniques, In: Zamojski, W., Mazurkiewicz,
J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Applications of Dependable Computer Systems.
DepCoS-RELCOMEX 2020. Advances in Intelligent Systems and Computing, vol 1173. Springer, Cham. doi: