{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:14:52Z","timestamp":1762514092898,"version":"build-2065373602"},"reference-count":88,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Cyber defense has evolved into an algorithmically intensive discipline where mathematical rigor and adaptive computation underpin the robustness and continuity of digital infrastructures. This review consolidates the algorithmic spectrum that supports modern cyber defense, from cryptographic primitives that ensure confidentiality and integrity to behavioral intelligence algorithms that provide predictive security. Classical symmetric and asymmetric schemes such as AES, ChaCha20, RSA, and ECC define the computational backbone of confidentiality and authentication in current systems. Intrusion and anomaly detection mechanisms range from deterministic pattern matchers exemplified by Aho-Corasick and Boyer-Moore to probabilistic inference models such as Markov Chains and HMMs, as well as deep architectures such as CNNs, RNNs, and Autoencoders. Malware forensics combines graph theory, entropy metrics, and symbolic reasoning into a unified diagnostic framework, while network defense employs graph-theoretic algorithms for routing, flow control, and intrusion propagation. Behavioral paradigms such as reinforcement learning, evolutionary computation, and swarm intelligence transform cyber defense from reactive automation to adaptive cognition. Hybrid architectures now merge deterministic computation with distributed learning and explainable inference to create systems that act, reason, and adapt. This review identifies and contextualizes over 50 foundational algorithms, ranging from AES and RSA to LSTMs, graph-based models, and post-quantum cryptography, and redefines them not as passive utilities, but as the cognitive genome of cyber defense: entities that shape, sustain, and evolve resilience within adversarial environments.<\/jats:p>","DOI":"10.3390\/a18110709","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T10:56:45Z","timestamp":1762513005000},"page":"709","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Foundational Algorithms for Modern Cybersecurity: A Unified Review on Defensive Computation in Adversarial Environments"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9350-1530","authenticated-orcid":false,"given":"Paul A.","family":"Gagniuc","sequence":"first","affiliation":[{"name":"Faculty of Engineering in Foreign Languages, National University of Science and Technology Politehnica Bucharest, RO-060042 Bucharest, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,7]]},"reference":[{"key":"ref_1","unstructured":"Bishop, M. (2018). Security, Computer Security: Art and Science, Addison-Wesley. [2nd ed.]."},{"key":"ref_2","unstructured":"Paul, A.G. (2024). Antivirus Engines: From Methods to Innovations and Applications, Elsevier Syngress."},{"key":"ref_3","unstructured":"Stallings, W. (2023). Cryptography and Network Security: Principles and Practice, Pearson. [8th ed.]."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/357830.357849","article-title":"The base-rate fallacy and its implications for the difficulty of intrusion detection","volume":"3","author":"Axelsson","year":"1999","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_5","unstructured":"Bishop, C. (2006). Pattern Recognition and Machine Learning, Springer."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1186\/s40537-025-01157-y","article-title":"Application of Deep Learning in Malware Detection: A. Review","volume":"12","author":"Song","year":"2025","journal-title":"J. Big Data"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_8","first-page":"12252","article-title":"A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions","volume":"12","author":"Akin","year":"2024","journal-title":"IEEE Access"},{"key":"ref_9","unstructured":"Boneh, D., and Shoup, V. (2020). A Graduate Course in Applied Cryptography, Stanford University."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 22\u201326). Towards evaluating the robustness of neural networks. Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_11","unstructured":"Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons. [2nd ed.]."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Daemen, J., and Rijmen, V. (2002). The Design of Rijndael: AES\u2014The Advanced Encryption Standard, Springer.","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"ref_13","unstructured":"(2001). Advanced Encryption Standard (AES) (Standard No. FIPS PUB 197)."},{"key":"ref_14","unstructured":"Bernstein, D.J. (2008). ChaCha, a Variant of Salsa20 Workshop Record of SASC 2008, The University of Illinois at Chicago. The State of the Art of Stream Ciphers."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","article-title":"A Modification of the RSA Public-Key Encryption Procedure","volume":"26","author":"Williams","year":"1980","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Miller, V.S. (1986). Use of Elliptic Curves in Cryptography. Advances in Cryptology\u2014CRYPTO \u201985 Proceedings, Springer.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-642-38348-9_19","article-title":"Keccak","volume":"Volume 7881","author":"Johansson","year":"2013","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2013"},{"key":"ref_19","unstructured":"O\u2019Connor, J., Aumasson, J.P., Neves, S., and Wilcox-O\u2019Hearn, Z. (2025, October 20). BLAKE3: One Function, Fast Everywhere Cryptology ePrint Archive, Report 2020\/014. Available online: https:\/\/autoblog.suumitsu.eu\/autoblogs\/sebsauvagenetlinks_f5730e92d2c28615f2f44758a6d249f605e9c0ae\/media\/f32098b6.blake3.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Dinu, D., and Khovratovich, D. (2016, January 21\u201324). Argon2: The memory-hard function for password hashing and other applications. Proceedings of the IEEE EuroS&P, Saarbruecken, Germany.","DOI":"10.1109\/EuroSP.2016.31"},{"key":"ref_21","unstructured":"Leo, D., Tancrede, L., Vadim, L., Peter, S., Gregor, S., and Damien, S. (2025, January 12). CRYSTALS\u2014Dilithium: Digital Signatures from Module Lattices. IACR ePrint Archive, 2017\/633. Available online: https:\/\/eprint.iacr.org\/2017\/633."},{"key":"ref_22","unstructured":"Bernstein, D.J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.-L., H\u00fclsing, A., Kampanakis, P., K\u00f6lbl, S., Lange, T., and Lauridsen, M.M. (2020). SPHINCS+: Submission to the NIST Post-Quantum Cryptography Project, Eindhoven University of Technology. NIST PQC Round 3 Submission."},{"key":"ref_23","first-page":"283","article-title":"A decade of lattice cryptography. Found. Trends Theor","volume":"10","author":"Peikert","year":"2016","journal-title":"Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Farhan, M., Waheed Ud Din, H., Ullah, S., Hussain, M.S., Khan, M.A., Mazhar, T., and Jaghdam, I.H. (2025). Network-based intrusion detection using deep learning technique. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-08770-0"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","article-title":"Efficient string matching: An aid to bibliographic search","volume":"18","author":"Aho","year":"1975","journal-title":"Commun. ACM"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","article-title":"A fast string searching algorithm","volume":"20","author":"Boyer","year":"1977","journal-title":"Commun. ACM"},{"key":"ref_27","first-page":"258","article-title":"Network intrusion detection using Naive Bayes","volume":"7","author":"Panda","year":"2007","journal-title":"Int. J. Comput. Sci. Netw. Secur"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Gagniuc, P.A. (2017). Markov Chains: From Theory to Implementation and Experimentation, John Wiley & Sons, Inc.","DOI":"10.1002\/9781119387596"},{"key":"ref_29","unstructured":"Kim, K.L., and Kuperman, B.A. (2006, January 8\u201311). Using Hidden Markov Models for intrusion detection. Proceedings of the IEEE Systems Man and Cybernetics Society, Taipei, Taiwan."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_34","unstructured":"An, J., and Cho, S. (2015). Variational Autoencoder Based Anomaly Detection Using Reconstruction Probability, Seoul National University. SNU Data Mining Center Technology Report."},{"key":"ref_35","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2014, January 14\u201316). Intriguing properties of neural networks. Proceedings of the ICLR, Banff, AB, Canada."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"173168","DOI":"10.1109\/ACCESS.2024.3485706","article-title":"A Survey on Android Malware Detection Techniques Using Supervised Machine Learning","volume":"12","author":"Altaha","year":"2024","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Kirda, E., Mutz, D., Robertson, W., and Vigna, G. (2005, January 7\u20139). Polymorphic worm detection using structural information of executables. Proceedings of the RAID, Seattle, WA, USA.","DOI":"10.1007\/11663812_11"},{"key":"ref_38","unstructured":"Nielson, F., Nielson, H.R., and Hankin, C. (2005). Principles of Program Analysis, Springer."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Vasudevan, A. (2009, January 19\u201322). Re-inforced Stealth Breakpoints. Proceedings of the 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France.","DOI":"10.1109\/CRISIS.2009.5411978"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2007.48","article-title":"Using entropy analysis to find encrypted and packed malware","volume":"5","author":"Lyda","year":"2007","journal-title":"IEEE Secur. Privacy"},{"key":"ref_41","unstructured":"Christodorescu, M., and Jha, S. (2003, January 4\u20138). Static analysis of executables to detect malicious patterns. Proceedings of the USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Aboaoja, F.A., Zainal, A., Ghaleb, F.A., Al-Rimy, B.A.S., Eisa, T.A.E., and Elnour, A.A.H. (2022). Malware Detection Issues, Challenges, and Future Directions: A Survey. Appl. Sci., 12.","DOI":"10.3390\/app12178482"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Berrios, S., Leiva, D., Olivares, B., Allende-Cid, H., and Hermosilla, P. (2025). Systematic Review: Malware Detection and Classification in Cybersecurity. Appl. Sci., 15.","DOI":"10.3390\/app15147747"},{"key":"ref_44","unstructured":"Moura, L., and Bj\u00f8rner, N. (April, January 29). Z3: An Efficient SMT Solver. Proceedings of the TACAS, Budapest, Hungary."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"E\u00e9n, N., and S\u00f6rensson, N. (2003, January 5\u20138). An Extensible SAT-Solver. Proceedings of the SAT, Santa Margherita Ligure, Italy.","DOI":"10.1007\/978-3-540-24605-3_37"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Salwan, J., Bardin, S., and Potet, M.L. (2018). Symbolic Deobfuscation: From Virtualized Code Back to the Original. DIMVA 2018: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer.","DOI":"10.1007\/978-3-319-93411-2_17"},{"key":"ref_47","unstructured":"Dullien, T. (June, January 30). Graph-Based Comparison of Executable Objects (Reloaded). Proceedings of the Symposium Sur la S\u00e9curit\u00e9 des Technologies de L\u2019information et des Communications, Rennes, France."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Newman, M. (2010). Networks: An Introduction, Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199206650.003.0001"},{"key":"ref_49","first-page":"775","article-title":"Distributed signal processing in self-organizing sensor networks","volume":"24","author":"Barbarossa","year":"2007","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_50","first-page":"103152","article-title":"A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges","volume":"125","author":"Zhong","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/367766.368168","article-title":"Algorithm 97: Shortest path","volume":"5","author":"Floyd","year":"1962","journal-title":"Commun. ACM"},{"key":"ref_52","unstructured":"Shapiro, J., and Sandhu, R.S. (2010, January 23\u201327). A Weighted Shortest-Path Approach to Network Security Metrics. Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"399","DOI":"10.4153\/CJM-1956-045-5","article-title":"Maximal flow through a network","volume":"8","author":"Ford","year":"1956","journal-title":"Canad. J. Math."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1145\/321694.321699","article-title":"Theoretical improvements in algorithmic efficiency for network flow problems","volume":"19","author":"Edmonds","year":"1972","journal-title":"J. ACM"},{"key":"ref_55","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., and Stiller, B. (2011, January 23\u201327). Flow-Based Intrusion Detection: From Theory to Practice. Proceedings of the International Workshop on Recent Advances in Intrusion Detection (RAID), Dublin, Ireland."},{"key":"ref_56","first-page":"1441","article-title":"Botnet detection using improved PageRank algorithm","volume":"36","author":"Yu","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"Girvan","year":"2002","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_58","first-page":"1533","article-title":"Detecting coordinated attacks in large networks using community detection","volume":"14","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","article-title":"Issues and future directions in traffic classification","volume":"26","author":"Dainotti","year":"2012","journal-title":"IEEE Netw."},{"key":"ref_60","first-page":"1649","article-title":"Reinforcement learning in network security: A comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_61","unstructured":"Sutton, R.S., and Barto, A.G. (2018). Reinforcement Learning: An Introduction, MIT Press. [2nd ed.]."},{"key":"ref_62","first-page":"279","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"key":"ref_64","unstructured":"Zhu, H., Wang, W., and Kim, H. (2020, January 21). Adaptive cyber defense using deep reinforcement learning. Proceedings of the IEEE Security Privacy Workshops (SPW), Genoa, Italy."},{"key":"ref_65","unstructured":"Goldberg, D.E. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley."},{"key":"ref_66","unstructured":"De Castro, L.N., and Von Zuben, F.J. (1999). Artificial Immune Systems: Part I\u2014Basic Theory and Applications, State University. Technical Report TR-DCA 01\/99."},{"key":"ref_67","unstructured":"Forrest, S., Perelson, A.S., Allen, L., and Cherukuri, R. (1994, January 16\u201318). Self-Nonself Discrimination in a Computer. Proceedings of the IEEE Symposium Security Privacy, Oakland, CA, USA."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Dorigo, M., and St\u00fctzle, T. (2004). Ant Colony Optimization, MIT Press.","DOI":"10.7551\/mitpress\/1290.001.0001"},{"key":"ref_69","unstructured":"Kennedy, J., and Eberhart, R. (December, January 27). Particle Swarm Optimization. Proceedings of the IEEE Conference on Neural Networks, Perth, WA, Australia."},{"key":"ref_70","first-page":"118011","article-title":"A hybrid swarm intelligence approach for network intrusion detection","volume":"206","author":"Paranjape","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_71","unstructured":"Bridges, S.M., and Vaughn, R.B. (2000, January 16\u201319). Fuzzy data mining and genetic algorithms applied to intrusion detection. Proceedings of the 12th Annual Canadian Information Technology Security Symposium. Workshop, Baltimore, MD, USA."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10207-025-01004-4","article-title":"Human\u2013AI Enhancement of Cyber Threat Intelligence","volume":"24","author":"Cohen","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1186\/s13677-025-00764-7","article-title":"SmartTrust: A hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture","volume":"14","author":"Lilhore","year":"2025","journal-title":"J. Cloud Comput."},{"key":"ref_74","first-page":"73182","article-title":"Hybrid intrusion detection using deep neural networks and Markov models","volume":"9","author":"Kim","year":"2021","journal-title":"IEEE Access"},{"key":"ref_75","first-page":"41","article-title":"A survey on malware detection using data mining and machine learning","volume":"50","author":"Ye","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Han, Z., Niyato, D., Saad, W., and Ba\u015far, T. (2019). Game Theory for Next Generation Wireless and Communication Networks, Cambridge University Press.","DOI":"10.1017\/9781108277402"},{"key":"ref_77","unstructured":"Kone\u010dn\u00fd, J., McMahan, H.B., Ramage, D., and Richt\u00e1rik, P. (2016). Federated Optimization: Distributed Machine Learning for on-Device Intelligence. arXiv."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref_79","first-page":"233","article-title":"Cloud-based distributed intrusion detection using ensemble learning","volume":"19","author":"Mo","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Guo, W., Mu, D., Xu, J., Su, P., Wang, G., and Xing, X. (2018, January 15). LEMNA: Explaining Deep Learning based Security Applications. Proceedings of the 2018 ACM SIGSAC Conference on Computer & Communications Security (CCS \u201918), Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243792"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: Ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Tagarev, T., and Sharkov, G. (2019, January 21\u201322). Computationally Intensive Functions in Designing and Operating Distributed Cyber Secure and Resilient Systems. Proceedings of the 20th International Conference on Computer Systems and Technologies (CompSysTech), New York, NY, USA.","DOI":"10.1145\/3345252.3345255"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Bhattacharya, R., Rathore, Y.K., Tran, T.A., and Swarnkar, S.K. (2025). A Survey of Anomaly Detection in Graphs: Algorithms and Applications. Graph Mining, Springer.","DOI":"10.1007\/978-3-031-93802-3"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"110649","DOI":"10.1016\/j.compeleceng.2025.110649","article-title":"Next-generation quantum security: The impact of quantum computing on cybersecurity-Threats, mitigations, and solutions","volume":"128","author":"Ali","year":"2025","journal-title":"Comput. Electr. Eng."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1007\/s11227-025-07850-2","article-title":"Toward using cyber threat intelligence with machine and deep learning for IoT security: A comprehensive study","volume":"81","author":"Lima","year":"2025","journal-title":"J. Supercomput."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10462-025-11292-w","article-title":"Adaptive anomaly detection for identifying attacks in cyber-physical systems: A systematic literature review","volume":"58","author":"Moriano","year":"2025","journal-title":"Artif. Intell. Rev."},{"key":"ref_88","first-page":"4","article-title":"Cybersecurity Assessment and Certification of Critical Infrastructures","volume":"86","author":"Bogdan","year":"2024","journal-title":"Univ. Politeh. Buchar. Sci. Bull. Ser. C"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/11\/709\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T11:09:11Z","timestamp":1762513751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/18\/11\/709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,7]]},"references-count":88,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["a18110709"],"URL":"https:\/\/doi.org\/10.3390\/a18110709","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2025,11,7]]}}}