Artificial Intelligence in Cybersecurity. Chronicle. Issue 1
Abstract
In this document, we present an overview of current events related to the general direction - the use of Artificial Intelligence (AI) in cybersecurity. This will be a regularly published document that will describe new developments in this area. Currently, we are focused on three aspects. First, these are incidents related to the use of AI in cybersecurity. For example, known attacks on machine learning models, identified problems with generative AI, etc. Second, these are new global and local standards, and regulatory documents regarding various aspects of the use of AI in cybersecurity. And third, the review will include interesting publications in this area. Of course, all materials selected for each issue reflect the views and preferences of the authors-compilers.
Full Text:
PDF (Russian)References
Namiot, D. E., E. A. Il'jushin, and I. V. Chizhov. "Iskusstvennyj intellekt i kiberbezopasnost'." International Journal of Open Information Technologies 10.9 (2022): 135-147.
Namiot, D. E., and E. A. Il'jushin. "O kiberriskah generativnogo iskusstvennogo intellekta." International Journal of Open Information Technologies 12.10 (2024): 109-119.
Namiot, D. E., and E. V. Zubareva. "O rabote AI Red Team." International Journal of Open Information Technologies 11.10 (2023): 130-139.
Lebed, S. V., et al. "Large Language Models in Cyberattacks." Doklady Mathematics. Vol. 110. No. Suppl 2. Moscow: Pleiades Publishing, 2024.
Qiu, Jianing, et al. "Emerging cyber attack risks of medical ai agents." arXiv preprint arXiv:2504.03759 (2025).
Waseem, Saima, et al. "DeepFake on face and expression swap: A review." IEEE Access 11 (2023): 117865-117906.
Rehaan, Mansi, Nirmal Kaur, and Staffy Kingra. "Face manipulated deepfake generation and recognition approaches: A survey." Smart Science 12.1 (2024): 53-73.
Tripathi, Jayesh, Heitor Gomes, and Marcus Botacin. "Towards Explainable Drift Detection and Early Retrain in ML-Based Malware Detection Pipelines." International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Cham: Springer Nature Switzerland, 2025.
Namiot, D. E. "Chto LLM znaet o kiberbezopasnosti." International Journal of Open Information Technologies 13.7 (2025): 37-46.
Cemri, Mert, et al. "Why do multi-agent llm systems fail?." arXiv preprint arXiv:2503.13657 (2025).
Maloyan, Narek, Bislan Ashinov, and Dmitry Namiot. "Investigating the Vulnerability of LLM-as-a-Judge Architectures to Prompt-Injection Attacks." arXiv preprint arXiv:2505.13348 (2025).
Grini, Anass, et al. "Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability." arXiv preprint arXiv:2505.01328 (2025).
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность ИБП для ЦОД СНЭ
ISSN: 2307-8162