{"id":143017,"date":"2025-01-23T11:24:06","date_gmt":"2025-01-23T09:24:06","guid":{"rendered":"https:\/\/azbuki.bg\/?p=143017"},"modified":"2025-09-17T14:24:58","modified_gmt":"2025-09-17T11:24:58","slug":"artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions","status":"publish","type":"post","link":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/","title":{"rendered":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions"},"content":{"rendered":"<p><strong>Maria Mpitsi<\/strong><br \/>\n<em>Faculty of Mathematics and Natural Sciences<\/em><br \/>\n<em>South-West University \u2013 Blagoevgrad (Bulgaria)<\/em><\/p>\n<p><a href=\"https:\/\/doi.org\/10.53656\/math2024-6-7-art\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.53656\/math2024-6-7-art<\/a><\/p>\n<p><strong>Abstract.<\/strong> This paper offers a critical review of the applications of AI in cybersecurity, focusing on the recent trends of automation in threat detection, enhancement of response strategies, and prediction of vulnerabilities.<br \/>\nThe methodology is based on a thorough analysis of empirical studies up to 2021 as per the efficiency of AI malware detection, insider threat identification, and mitigation of zero-day vulnerabilities. In particular, machine learning- and deep learning-based methodologies of artificial intelligence ensure clear advantages over conventional models concerning the precision in detection and reduction of false positives. However, challenges persist regarding explainability, scalability, and ethical concerns around data bias and quality. Finally, this paper concludes by pointing out some areas of future research with regard to needing XAI techniques and methods related to bias reduction to establish better trust in the efficacy of AI-driven cybersecurity frameworks.<br \/>\n<em>Keywords:<\/em> artificial intelligence, cybersecurity, machine learning, explainable AI, anomaly detection<\/p>\n<a href=\"https:\/\/foreignlanguages.azbuki.bg\/en\/member-login\/\">Log in to read the full text<\/a>","protected":false},"excerpt":{"rendered":"<p>Maria Mpitsi Faculty of Mathematics and Natural Sciences South-West University \u2013 Blagoevgrad (Bulgaria) https:\/\/doi.org\/10.53656\/math2024-6-7-art Abstract. This paper offers a critical review of the applications of AI in cybersecurity, focusing on the recent trends of automation in threat detection, enhancement of response strategies, and prediction of vulnerabilities. The methodology is based on a thorough analysis of [&hellip;]<\/p>","protected":false},"author":124332423427287,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":[],"jnews_primary_category":[]},"categories":[1],"tags":[9604,4879,9602,9603,8025],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"og:description\" content=\"Maria Mpitsi Faculty of Mathematics and Natural Sciences South-West University \u2013 Blagoevgrad (Bulgaria) https:\/\/doi.org\/10.53656\/math2024-6-7-art Abstract. This paper offers a critical review of the applications of AI in cybersecurity, focusing on the recent trends of automation in threat detection, enhancement of response strategies, and prediction of vulnerabilities. The methodology is based on a thorough analysis of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Azbuki55\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-23T09:24:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T11:24:58+00:00\" \/>\n<meta name=\"author\" content=\"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\"},\"author\":{\"name\":\"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c\",\"@id\":\"https:\/\/azbuki.bg\/en\/#\/schema\/person\/de220d282eaa494f914ce0fd838645dd\"},\"headline\":\"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions\",\"datePublished\":\"2025-01-23T09:24:06+00:00\",\"dateModified\":\"2025-09-17T11:24:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\"},\"wordCount\":206,\"publisher\":{\"@id\":\"https:\/\/azbuki.bg\/en\/#organization\"},\"keywords\":[\"anomaly detection\",\"artificial intelligence\",\"cybersecurity\",\"explainable AI\",\"machine learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\",\"url\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\",\"name\":\"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/azbuki.bg\/en\/#website\"},\"datePublished\":\"2025-01-23T09:24:06+00:00\",\"dateModified\":\"2025-09-17T11:24:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/history.azbuki.bg\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azbuki.bg\/en\/#website\",\"url\":\"https:\/\/azbuki.bg\/en\/\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"description\":\"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430\",\"publisher\":{\"@id\":\"https:\/\/azbuki.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azbuki.bg\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azbuki.bg\/en\/#organization\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"url\":\"https:\/\/azbuki.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azbuki.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"contentUrl\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"width\":250,\"height\":70,\"caption\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\"},\"image\":{\"@id\":\"https:\/\/azbuki.bg\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Azbuki55\/\",\"https:\/\/www.instagram.com\/nion_azbuki\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azbuki.bg\/en\/#\/schema\/person\/de220d282eaa494f914ce0fd838645dd\",\"name\":\"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azbuki.bg\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d08ccbd951212deb604aa2d403575d4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d08ccbd951212deb604aa2d403575d4e?s=96&d=mm&r=g\",\"caption\":\"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c\"},\"sameAs\":[\"https:\/\/azbuki.bg\/\"],\"url\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/author\/azbuki_ekip\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438","og_description":"Maria Mpitsi Faculty of Mathematics and Natural Sciences South-West University \u2013 Blagoevgrad (Bulgaria) https:\/\/doi.org\/10.53656\/math2024-6-7-art Abstract. This paper offers a critical review of the applications of AI in cybersecurity, focusing on the recent trends of automation in threat detection, enhancement of response strategies, and prediction of vulnerabilities. The methodology is based on a thorough analysis of [&hellip;]","og_url":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/","og_site_name":"\u0410\u0437-\u0431\u0443\u043a\u0438","article_publisher":"https:\/\/www.facebook.com\/Azbuki55\/","article_published_time":"2025-01-23T09:24:06+00:00","article_modified_time":"2025-09-17T11:24:58+00:00","author":"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c","twitter_card":"summary_large_image","twitter_misc":{"Written by":"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#article","isPartOf":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/"},"author":{"name":"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c","@id":"https:\/\/azbuki.bg\/en\/#\/schema\/person\/de220d282eaa494f914ce0fd838645dd"},"headline":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions","datePublished":"2025-01-23T09:24:06+00:00","dateModified":"2025-09-17T11:24:58+00:00","mainEntityOfPage":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/"},"wordCount":206,"publisher":{"@id":"https:\/\/azbuki.bg\/en\/#organization"},"keywords":["anomaly detection","artificial intelligence","cybersecurity","explainable AI","machine learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/","url":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/","name":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions - \u0410\u0437-\u0431\u0443\u043a\u0438","isPartOf":{"@id":"https:\/\/azbuki.bg\/en\/#website"},"datePublished":"2025-01-23T09:24:06+00:00","dateModified":"2025-09-17T11:24:58+00:00","breadcrumb":{"@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azbuki.bg\/en\/uncategorized\/artifi-cial-intelligence-in-cybersecurity-rigorous-critical-review-methodological-challenges-and-future-research-directions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/history.azbuki.bg\/en\/"},{"@type":"ListItem","position":2,"name":"Artificial Intelligence in Cybersecurity: Rigorous Critical Review, Methodological Challenges and Future Research Directions"}]},{"@type":"WebSite","@id":"https:\/\/azbuki.bg\/en\/#website","url":"https:\/\/azbuki.bg\/en\/","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","description":"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430","publisher":{"@id":"https:\/\/azbuki.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azbuki.bg\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azbuki.bg\/en\/#organization","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","url":"https:\/\/azbuki.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azbuki.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","contentUrl":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","width":250,"height":70,"caption":"\u0410\u0437-\u0431\u0443\u043a\u0438"},"image":{"@id":"https:\/\/azbuki.bg\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Azbuki55\/","https:\/\/www.instagram.com\/nion_azbuki\/"]},{"@type":"Person","@id":"https:\/\/azbuki.bg\/en\/#\/schema\/person\/de220d282eaa494f914ce0fd838645dd","name":"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azbuki.bg\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d08ccbd951212deb604aa2d403575d4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d08ccbd951212deb604aa2d403575d4e?s=96&d=mm&r=g","caption":"\u201e\u0410\u0437-\u0431\u0443\u043a\u0438\u201c"},"sameAs":["https:\/\/azbuki.bg\/"],"url":"https:\/\/foreignlanguages.azbuki.bg\/en\/author\/azbuki_ekip\/"}]}},"_links":{"self":[{"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/143017"}],"collection":[{"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/users\/124332423427287"}],"replies":[{"embeddable":true,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/comments?post=143017"}],"version-history":[{"count":4,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/143017\/revisions"}],"predecessor-version":[{"id":165100,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/143017\/revisions\/165100"}],"wp:attachment":[{"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/media?parent=143017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/categories?post=143017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/foreignlanguages.azbuki.bg\/en\/wp-json\/wp\/v2\/tags?post=143017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}