{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T16:07:54Z","timestamp":1779379674356,"version":"3.53.1"},"reference-count":154,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:00:00Z","timestamp":1758585600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Topsector ICT"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>Digital transformation embeds smart cities, e-health, and Industry 4.0 into critical infrastructures, thereby increasing reliance on digital systems and exposure to cyber threats and boosting complexity and dependency. Research involving over 200 executives reveals that under rising complexity, only 15% of cyber risk investments are effective, leaving most organizations misaligned or vulnerable. In this context, the role of artificial intelligence (AI) in cybersecurity requires systemic scrutiny. This study analyzes how AI reshapes systemic structures in cyber risk management through a multi-method approach: literature review, expert workshops with practitioners and policymakers, and a structured kill chain analysis of the Colonial Pipeline attack. The findings reveal three new feedback loops: (1) deceptive defense structures that misdirect adversaries while protecting assets, (2) two-step success-to-success attacks that disable defenses before targeting infrastructure, and (3) autonomous proliferation when AI applications go rogue. These dynamics shift cyber risk from linear patterns to adaptive, compounding interactions. The principal conclusion is that AI both amplifies and mitigates systemic risk. The core recommendation is to institutionalize deception in security standards and address drifting AI-powered systems. Deliverables include validated systemic structures, policy options, and a foundation for creating future simulation models to support strategic cyber risk management investment.<\/jats:p>","DOI":"10.3390\/systems13100835","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T15:54:54Z","timestamp":1758642894000},"page":"835","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["How Does AI Transform Cyber Risk Management?"],"prefix":"10.3390","volume":"13","author":[{"given":"Sander","family":"Zeijlemaker","sequence":"first","affiliation":[{"name":"Cyber Security at MIT Sloan, Sloan School of Management, Massachusetts Institute of Technology, 245 First St., E94-1567, Cambridge, MA 02142, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Yaphet K.","family":"Lemiesa","sequence":"additional","affiliation":[{"name":"Cyber Security at MIT Sloan, Sloan School of Management, Massachusetts Institute of Technology, 245 First St., E94-1567, Cambridge, MA 02142, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2952-5228","authenticated-orcid":false,"given":"Saskia Laura","family":"Schr\u00f6er","sequence":"additional","affiliation":[{"name":"Data and Application Security, University of Liechtenstein, F\u00fcrst-Franz-Josef-Strasse, 9490 Vaduz, Liechtenstein"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Abhishta","family":"Abhishta","sequence":"additional","affiliation":[{"name":"Industrial Engineering and Business Information Systems, University of Twente, Ravelijn (Building No. 10), Room 3351, Hallenweg 17, 7522 NH Enschede, The Netherlands"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Michael","family":"Siegel","sequence":"additional","affiliation":[{"name":"Cyber Security at MIT Sloan, Sloan School of Management, Massachusetts Institute of Technology, 245 First St., E94-1567, Cambridge, MA 02142, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Bornet, P., Barkin, I., and Wirtz, J. (2020). Intelligent Automation: Welcome to the World of Hyperautomation: Learn How to Harness Artificial Intelligence to Boost Business & Make Our World More Human, World Scientific Publishing. Full, Paperback, EN.","DOI":"10.1142\/12239"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1049\/sfw2.12074","article-title":"Industry 4.0 and Healthcare: Context, Applications, Benefits, and Challenges","volume":"17","author":"Kotzias","year":"2023","journal-title":"IET Softw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11948-016-9864-0","article-title":"Cyber-attacks and Terrorism: A Twenty-First-Century Conundrum","volume":"25","author":"Albahar","year":"2019","journal-title":"Sci. Eng. Ethics"},{"key":"ref_4","unstructured":"Davies, V. (2025, January 06). The History of Cybersecurity. Cyber Magazine. Available online: https:\/\/cybermagazine.com\/cyber-security\/history-cybersecurity."},{"key":"ref_5","first-page":"81","article-title":"The \u201cIterated Weakest Link\u201d Model of Adaptive Security Investment","volume":"7","author":"Moore","year":"2016","journal-title":"J. Inf. Secur."},{"key":"ref_6","unstructured":"Clayton, R., Moore, T., and Christin, N. (2015, January 22\u201324). Concentrating Correctly on Cybercrime Concentration. Proceedings of the Workshop on Economics in Information Security, Delft, The Netherlands."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Martinez-Moyano, I.J., Morrison, D., and Sallach, D. (2015, January 6\u20139). Modeling Adversarial Dynamics. Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, CA, USA.","DOI":"10.1109\/WSC.2015.7408352"},{"key":"ref_8","unstructured":"Costa, J. (2024, May 07). Counter AI Attacks with AI Defense. Palo Alto Networks. Available online: https:\/\/www.paloaltonetworks.com\/blog\/2024\/05\/counter-with-ai-defense\/."},{"key":"ref_9","unstructured":"(2024, May 09). Acronis 2024 Cybersecurity Trends: Key Steps, Strategies and Guidance. Acronis. Available online: https:\/\/www.acronis.com\/en\/blog\/posts\/cyber-security-trends\/."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Redefining Cyber Defense (2024). The Evolution of Threat Detection with Artificial Intelligence. Res. Mach. Learn. Cybersecur., 5, 35\u201341.","DOI":"10.46632\/rmc\/5\/2\/7"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rajasegar, M., Shanthi, R., Nitin, M., and Sasi, K. (2023, January 5\u20136). A New Era of Cybersecurity: The Influence of Artificial Intelligence. Proceedings of the 2023 International Conference on Networking and Communications (ICNWC), Chennai, India.","DOI":"10.1109\/ICNWC57852.2023.10127453"},{"key":"ref_12","unstructured":"Federal Bureau of Investigation (FBI) (2024, May 08). FBI Warns of Increasing Threat of Cyber Criminals Utilizing Artificial Intelligence. FBI San Francisco, Available online: https:\/\/www.fbi.gov\/contact-us\/field-offices\/sanfrancisco\/news\/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence."},{"key":"ref_13","first-page":"11","article-title":"Understanding and Mitigating AI-powered Cyber-Attacks","volume":"6","author":"Aggrey","year":"2024","journal-title":"Int. J. Multidiscip. Res."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Schr\u00f6er, S.L., Apruzzese, G., Human, S., Laskov, P., Anderson, H.S., Bernroider, E.W.N., Fass, A., Nassi, B., Rimmer, V., and Roli, F. (2025, January 9\u201311). SoK: On the Offensive Potential of AI. Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, Copenhagen, Denmark.","DOI":"10.1109\/SaTML64287.2025.00021"},{"key":"ref_15","unstructured":"(2025, January 06). Redaction. Email-based Phishing Attacks Have Surged 464% in 2023. Indian Times. Available online: https:\/\/ciosea.economictimes.indiatimes.com\/news\/security\/email-based-phishing-attacks-has-surged-464-in-2023-."},{"key":"ref_16","unstructured":"Macaulay, T. (2025, January 06). Deepfake Fraud Attempts are Up 3000% in 2023\u2014Here\u2019s Why. Next Web. Available online: https:\/\/thenextweb.com\/news\/deepfake-fraud-rise-amid-cheap-generative-ai-boom."},{"key":"ref_17","unstructured":"Montalbano, E. (2025, January 06). AI-powered \u2018BlackMamba\u2019 Keylogging Attack Evades Modern EDR Security. DarkReading. Available online: https:\/\/www.darkreading.com\/endpoint-security\/ai-blackmamba-keylogging-edr-security."},{"key":"ref_18","unstructured":"The Grungq (2025, January 06). The Triple A Threat: Aggressive Autonomous Agents. BlackHat. Available online: https:\/\/www.blackhat.com\/docs\/webcast\/12142017-the-triple-a-threat.pdf."},{"key":"ref_19","unstructured":"Bloomberg (2025, January 06). The World\u2019s Third-largest Economy Has Bad Intentions\u2014and It\u2019s Only Getting Bigger. Bloomberg. Available online: https:\/\/sponsored.bloomberg.com\/quicksight\/check-point\/the-worlds-third-largest-economy-has-bad-intentions-and-its-only-getting-bigger."},{"key":"ref_20","unstructured":"Petrosyan, A. (2025, January 15). Estimated Cost of Cybercrime Worldwide 2018\u20132029, statusta.com. Available online: https:\/\/www.statista.com\/forecasts\/1280009\/cost-cybercrime-worldwide."},{"key":"ref_21","unstructured":"Hall, B. (2025, September 01). How AI-Driven Fraud Challenges the Global Economy and Ways to Combat It. World Economic Forum. Available online: https:\/\/www.weforum.org\/stories\/2025\/01\/how-ai-driven-fraud-challenges-the-global-economy-and-ways-to-combat-it\/."},{"key":"ref_22","unstructured":"Leclair, J. (2025, January 06). Testimony of Dr. Jane Leclair Before the U.S. House of Representatives Committee on Small Business, Available online: https:\/\/smallbusiness.house.gov\/uploadedfiles\/4-22-2015__dr.__leclair__testimony.pdf."},{"key":"ref_23","unstructured":"Cyentia Institute (2025, January 06). Information Risk Insights Study: A Clearer Vision for Assessing the Risk of Cyber Incidents. Available online: https:\/\/www.cyentia.com\/wp-content\/uploads\/IRIS2020_cyentia.pdf."},{"key":"ref_24","unstructured":"IBM Security (2025, January 06). Cost of a Data Breach Report 2022. Available online: https:\/\/community.ibm.com\/community\/user\/events\/event-description?CalendarEventKey=7097fd42-4875-4abe-9ff6-d556af01688b&CommunityKey=96f617c5-4f90-4eb0-baec-2d0c4c22ab50&Home=%2Fcommunity%2Fuser%2Fhome."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1111\/risa.13715","article-title":"Systemic Cyber Risk and Aggregate Impacts","volume":"42","author":"Welburn","year":"2022","journal-title":"Risk Anal."},{"key":"ref_26","unstructured":"Zeijlemaker, S., Siegel, M., Khan, S., and Goldsmith, S. (2025, January 06). How to Align Cyber Risk Management with Business Needs. World Economic Forum, Cyber Security Working Group. Available online: https:\/\/www.weforum.org\/stories\/2022\/08\/how-to-align-cyber-risk-management-with-business-needs\/."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zeijlemaker, S., Eti\u00ebnne, A.J.A.R., Cunico, G., Armenia, S., and Von Kutzschenbach, M. (2022). Decision-makers\u2019 Understanding of Cybersecurity\u2019s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers. Systems, 10.","DOI":"10.3390\/systems10020049"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zeijlemaker, S., and Siegel, M. (2023, January 3\u20136). Capturing the dynamic nature of cyber risk: Evidence from an explorative case study. Proceedings of the Hawaii International Conference on System Sciences (HICSS)\u201356, Maui, HI, USA.","DOI":"10.24251\/HICSS.2023.738"},{"key":"ref_29","unstructured":"Sterman, J. (2021, December 21). Teaching Takes Off: Flight Simulators for Management Education\u2014\u201cThe Beer Game\u201d. MIT Sloan School of Management. Available online: http:\/\/web.mit.edu\/jsterman\/www\/SDG\/beergame.html."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1287\/mnsc.35.3.321","article-title":"Modeling managerial behavior: Misperceptions of Feedback in a Dynamic Decision-making Experiment","volume":"35","author":"Sterman","year":"1989","journal-title":"Manag. Sci."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.jsis.2018.09.003","article-title":"Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment","volume":"28","author":"Jalali","year":"2019","journal-title":"J. Strateg. Inf. Syst."},{"key":"ref_32","unstructured":"Anderson, R. (2001, January 10\u201314). Why Information Security is Hard: An Economic Perspective. Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, LA, USA."},{"key":"ref_33","unstructured":"Zeijlemaker, S., Pal, R., Proudfoot, J., and Siegel, M. (2025, September 01). Advancing Cyber Risk by Reducing Strategic Control Gaps. In AMCIS 2025 Proceedings; 2025; p. 28. Available online: https:\/\/aisel.aisnet.org\/amcis2025\/sig_sec\/sig_sec\/28."},{"key":"ref_34","unstructured":"Kim, G., Zeijlemaker, S., Proudfoot, J., Pal, R., and Siegel, M. (2025, September 01). Balancing Risk and Reward in Cybersecurity Investment Decisions. In AMCIS 2025; Proceedings 4. Available online: https:\/\/aisel.aisnet.org\/amcis2025\/sig_sec\/sig_sec\/4."},{"key":"ref_35","first-page":"1","article-title":"A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities","volume":"17","year":"2021","journal-title":"J. Simul."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"113580","DOI":"10.1016\/j.dss.2021.113580","article-title":"A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs","volume":"147","author":"Armenia","year":"2021","journal-title":"Decis. Support Syst."},{"key":"ref_37","unstructured":"Centre of Internet Security (CIS) (2021). CIS Controls V8, CIS."},{"key":"ref_38","unstructured":"Government Chief Information Officer (GCIO) (2020). An Overview of ISO\/IEC 27000 Family of Information Security Management System Standards, (Original work published April 2015, updated May 2020)."},{"key":"ref_39","unstructured":"Muneer, F. (2021). Cybersecurity Capability Maturity Model, Version 2.0."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Pascoe, C.E. (2023). Public Draft: The NIST Cybersecurity Framework 2.0, NIST.","DOI":"10.6028\/NIST.SP.1304.ipd"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/rmir.12169","article-title":"Cyber Risk Management: History and Future Research Directions","volume":"24","author":"Eling","year":"2021","journal-title":"Risk Manag. Insur. Rev."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1111\/risa.12844","article-title":"Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies","volume":"38","author":"Kuypers","year":"2018","journal-title":"Risk Anal."},{"key":"ref_43","unstructured":"Zeijlemaker, S., Hetner, C., and Siegel, M. (2025, January 08). Four Areas of Cyber Risk That Boards Need to Address. Harvard Business Review. Available online: https:\/\/hbr.org\/2023\/06\/4-areas-of-cyber-risk-that-boards-need-to-address."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Meurs, T., Cartwright, E., Cartwright, A., Junger, M., Hoheisel, R., Tews, E., and Abhishta, A. (2023, January 15\u201317). Ransomware economics: A two-step approach to model ransom paid. Proceedings of the 2023 APWG Symposium on Electronic Crime Research (eCrime), Barcelona, Spain.","DOI":"10.1109\/eCrime61234.2023.10485506"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Luo, X., and Liao, Q. (2009). Ransomware: A new cyber hijacking threat to enterprises. Handbook of Research on Information Security and Assurance, IGI Global.","DOI":"10.4018\/978-1-59904-855-0.ch001"},{"key":"ref_46","unstructured":"Gardiner, J., Cova, M., and Nagaraja, S. (2014). Command and Control: Understanding, Denying, and Detecting, University of Birmingham, Centre for the Protection of Natural Infrastructure."},{"key":"ref_47","unstructured":"Antrosio, J.V., and Fulp, E.W. (2005, January 23\u201324). Malware Defense Using Network Security Authentication. Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA\u201905), College Park, MD, USA."},{"key":"ref_48","first-page":"10","article-title":"Defending Connected Vehicles Against Malware: Challenges and a Solution Framework","volume":"1","author":"Zhang","year":"2014","journal-title":"IEEE Trans. Ind. Technol."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"128060","DOI":"10.1016\/j.jclepro.2021.128060","article-title":"Combining Life Cycle Assessment and System Dynamics to Improve Impact Assessment: A Systematic Review","volume":"315","author":"McAvoy","year":"2021","journal-title":"J. Clean. Prod."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"265","DOI":"10.2307\/3094806","article-title":"Capability Traps and Self-confirming Attribution Errors in the Dynamics of Process Improvement","volume":"47","author":"Repenning","year":"2002","journal-title":"Adm. Sci. Q."},{"key":"ref_51","unstructured":"Zeijlemaker, S., Pal, R., and Siegel, M. (2024, January 15\u201317). Strengthening Managerial Foresight to Defeat Cyber Threats. Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, AMCIS 2024, Salt Lake City, UT, USA."},{"key":"ref_52","unstructured":"European Union Agency for Cyber Security (ENISA) (2025, January 06). ENISA Threat Landscape. Available online: https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023."},{"key":"ref_53","unstructured":"Chapman, R. (2025, January 08). Ransomware Cases Increased by 73% in 2023 Showing Our Actions Have Not Been Enough to Thwart the Threat. SANS Institute. Available online: https:\/\/www.sans.org\/blog\/ransomware-cases-increased-greatly-in-2023\/."},{"key":"ref_54","unstructured":"Morgan, S. (2025, January 08). Global Ransomware Damage Costs Predicted to Exceed $265 Billion by 2031. Cybersecurity Ventures. Available online: https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/."},{"key":"ref_55","unstructured":"Zeng, W., and Germanos, V. (2025, January 08). Modelling Hybrid Cyber Kill Chain. PNSE@Petri Nets\/ACSD. Available online: https:\/\/www.semanticscholar.org\/paper\/Modelling-Hybrid-Cyber-Kill-Chain-Zeng-Germanos\/f5cb1f80c669562d3dd61b4dcbc6410a5d015c62."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Yadav, T., and Rao, A.M. (2015). Technical Aspects of Cyber Kill Chain. Security in Computing and Communications, Springer International Publishing. Available online: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-22915-7_40.","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref_57","unstructured":"Cybereason (2022). Ransomware: The True Cost to Business 2022, Cybereason. Available online: https:\/\/www.cybereason.com\/blog\/report-ransomware-attacks-and-the-true-cost-to-business-2022."},{"key":"ref_58","unstructured":"Sganga, N., and Bidar, M. (2025, January 08). 80% of Ransomware Victims Suffer Repeat Attacks, According to the New Report. CBS News. Available online: https:\/\/www.cbsnews.com\/news\/ransomware-victims-suffer-repeat-attacks-new-report\/."},{"key":"ref_59","unstructured":"Scrotxon, A. (2025, January 10). Overinvestment Breeds Overconfidence Among Security Pros. Computer Weekly, TechTarget. Available online: https:\/\/www.computerweekly.com\/news\/252471326\/Overinvestment-breeds-overconfidence-among-security-pros."},{"key":"ref_60","unstructured":"Reed, A. (2025, January 10). Don\u2019t Be the Business Prevention Department. BAtimes\u2013Resources for Business Analytics. Available online: https:\/\/www.batimes.com\/articles\/dont-be-the-business-prevention-department\/."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Zhang, C., Pal, R., Nicholson, C., and Siegel, M. (2024, January 8\u201311). (Gen) AI Versus (Gen) AI in Industrial Control Cybersecurity. Proceedings of the 2024 Winter Simulation Conference (WSC), Savannah, GA, USA.","DOI":"10.1109\/WSC63780.2024.10838831"},{"key":"ref_62","unstructured":"Pols, P., and Dom\u00ednguez, F. (2024, September 16). The Unified Kill Chain. Publishers Panel. Available online: https:\/\/thepolicereview.akademiapolicji.eu\/resources\/html\/article\/details?id=614644&language=en."},{"key":"ref_63","unstructured":"McGuiness, T. (2021). Defense in Depth, SANS Institute. SANS Reading Room, White Paper."},{"key":"ref_64","unstructured":"Ferazza, F.M. (2022). Cyber Kill Chain, MITRE ATT&CK, and the Diamond Model: A Comparison of Cyber Intrusion Analysis Models, Information Security Group, Royal Holloway University of London. Available online: https:\/\/www.royalholloway.ac.uk\/media\/20188\/techreport-2022-5.pdf.pdf."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Beerman, J., Berent, D., Falter, Z., and Bhunia, S. (2023, January 1\u20134). A Review of Colonial Pipeline Ransomware Attack. Proceedings of the 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India. Available online: https:\/\/sbhunia.me\/publications\/manuscripts\/ccgrid23.pdf.","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"103329","DOI":"10.1016\/j.frl.2022.103329","article-title":"Commodity Market Exposure to Energy-firm Distress: Evidence from the Colonial Pipeline Ransomware Attack","volume":"51","author":"Goodell","year":"2023","journal-title":"Financ. Res. Lett."},{"key":"ref_67","unstructured":"Krebs, B. (2024, September 16). A Closer Look at the DarkSide Ransomware Gang. Krebs on Security. Available online: https:\/\/krebsonsecurity.com\/2021\/05\/a-closer-look-at-the-darkside-ransomware-gang\/."},{"key":"ref_68","unstructured":"Shimol, S.B. (2024, September 16). Return of the DarkSide: Analysis of a Large-Scale Data Theft Campaign. Varonis. Available online: https:\/\/www.varonis.com\/blog\/darkside-ransomware."},{"key":"ref_69","unstructured":"Agcaoili, J., and Earnshaw, E. (2024, September 16). Locked, Loaded, and in the Wrong Hands: Legitimate Tools Weaponized for Ransomware in 2021. Trend Micro. Available online: https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/locked-loaded-and-in-the-wrong-hands-legitimate-tools-weaponized-for-ransomware-in-2021."},{"key":"ref_70","unstructured":"Kerner, S.M. (2024, September 16). Colonial Pipeline Hack Explained: Everything You Need to Know. TechTarget. Available online: https:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you-need-to-know."},{"key":"ref_71","unstructured":"Kleymenov, A. (2024, September 16). Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works. Nozomi Networks. Available online: https:\/\/www.nozominetworks.com\/blog\/colonial-pipeline-ransomware-attack-revealing-how-darkside-works."},{"key":"ref_72","unstructured":"(2024, September 16). Zenarmor Anatomy of APT: Advanced Persistent Threat Guide. Zenarmor. Available online: https:\/\/www.zenarmor.com\/docs\/network-security-tutorials\/what-is-advanced-persistent-threat-apt."},{"key":"ref_73","unstructured":"(2024, September 16). ExpirerColonial Pipeline Cyber Attack Shows the Importance of Multi-Factor Authentication in 2021. Stratodesk. Available online: https:\/\/www.stratodesk.com\/colonial-pipeline-cyber-attack-shows-the-importance-of-multi-factor-authentication\/."},{"key":"ref_74","unstructured":"Gonzales, M., and Dominquez, J. (2024, September 16). Inside DarkSide, the Ransomware that Attacked Colonial Pipeline. Metabase Q. Available online: https:\/\/www.cybereason.com\/blog\/inside-the-darkside-ransomware-attack-on-colonial-pipeline."},{"key":"ref_75","unstructured":"ExtraHop (2024, September 16). DCSync Attacks\u2014Definition, Examples, & Detection. ExtraHop. Available online: https:\/\/www.extrahop.com\/resources\/attacks\/dcsync."},{"key":"ref_76","unstructured":"Chen, X., Andersen, J., Mao, Z.M., Bailey, M., and Nazario, J. (2008, January 24\u201327). Towards an Understanding of Anti-virtualization and Anti-debugging Behavior in Modern Malware. Proceedings of the 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), Anchorage, AK, USA."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"153","DOI":"10.3390\/jcp4020008","article-title":"ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET environments","volume":"4","author":"Rose","year":"2024","journal-title":"J. Cybersecur. Priv."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Cordis, G.A., Costea, F.-M., Pecherle, G., Gy\u0151r\u00f6di, R.\u015e., and Gy\u0151r\u00f6di, C.A. (2023, January 9\u201310). Considerations in Mitigating Kerberos Vulnerabilities for Active Directory. Proceedings of the International Conference on Engineering of Modern Electric Systems, Oradea, Romania.","DOI":"10.1109\/EMES58375.2023.10171623"},{"key":"ref_79","first-page":"8","article-title":"Comments: Complexity of Cyber Crime Skyrockets","volume":"73","author":"Boschee","year":"2021","journal-title":"J. Pet. Technol."},{"key":"ref_80","unstructured":"(2024, September 16). Threat Intelligence TeamDarkSide Ransomware Analysis Report. Brandefense. Available online: https:\/\/brandefense.io\/wp-content\/uploads\/2023\/01\/DarkSide-Ransomware-Analysis-Report.pdf."},{"key":"ref_81","unstructured":"TrendMicro (2024, September 16). What We Know About the DarkSide Ransomware and the US Pipeline Attack. TrendMicro Research. Available online: https:\/\/www.trendmicro.com\/en_us\/research\/21\/e\/what-we-know-about-darkside-ransomware-and-the-us-pipeline-attac.html."},{"key":"ref_82","unstructured":"Brash, R. (2024, September 16). Lessons Learned from the Colonial Pipeline Attack. Control Engineering. Available online: https:\/\/www.industrialcybersecuritypulse.com\/facilities\/lessons-learned-from-the-colonial-pipeline-attack\/."},{"key":"ref_83","unstructured":"Englund, W., Nakashima, E., and Telford, T. (2024, September 16). Colonial Pipeline Ransomware Attack Shows Cyber Vulnerabilities of U.S. Energy Grid, The Washington Post, Available online: https:\/\/www.washingtonpost.com\/business\/2021\/05\/10\/colonial-pipeline-gas-oil-markets\/."},{"key":"ref_84","unstructured":"Russon, B.M.A. (2024, September 16). US Fuel Pipeline Hackers \u201cDidn\u2019t Mean to Create Problems\u201d. BBC News. Available online: https:\/\/www.bbc.com\/news\/business-57050690."},{"key":"ref_85","unstructured":"Eaton, C., and Volz, D. (2024, September 16). Colonial Pipeline CEO tells why he paid hackers a $4.4 million ransom. The Wall Street Journal. Available online: https:\/\/www.wsj.com\/articles\/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Hasegawa, H., Yamaguchi, Y., Shimada, H., and Takakura, H. (2014, January 21\u201325). A Countermeasure Recommendation System Against Targeted Attacks While Preserving Continuity of Internal Networks. Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference, V\u00e4ster\u00e5s, Sweden.","DOI":"10.1109\/COMPSAC.2014.63"},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"319","DOI":"10.34190\/eccws.21.1.196","article-title":"Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: A Legal Perspective","volume":"21","author":"Watney","year":"2022","journal-title":"Eur. Conf. Cyber Warf. Secur."},{"key":"ref_88","unstructured":"Expert Briefings (2024, September 16). Efforts to Curb Ransomware Crimes Face Limits. Emerald Expert Briefings. Available online: https:\/\/www.semanticscholar.org\/paper\/Efforts-to-curb-ransomware-crimes-face-limits\/381be69e12b854fc469c3a9b3e53451c59547e31."},{"key":"ref_89","unstructured":"Cyber Security Management Symposium (2025, January 06). Industrial Engineering and Business Information Systems, University of Twente. Symposium Held at Ravelijn, University of Twente, Enschede, Netherlands. Retrieved from University of Twente Website. Available online: https:\/\/www.utwente.nl\/en\/bms\/iebis\/events\/2024\/11\/1821797\/cyber-security-management-symposium."},{"key":"ref_90","unstructured":"IBM (2025, January 13). 2024: Cost of a Data Breach Report. Available online: https:\/\/www.ibm.com\/reports\/data-breach."},{"key":"ref_91","unstructured":"OpenAI (2025, January 13). An Update on Disrupting Deceptive Uses of AI. OpenAI. Available online: https:\/\/openai.com\/global-affairs\/an-update-on-disrupting-deceptive-uses-of-ai\/."},{"key":"ref_92","unstructured":"Ilascu, I. (2025, March 03). Malicious PowerShell Script Pushing Malware Looks AI-Written. Bleeding Computer. Available online: https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-powershell-script-pushing-malware-looks-ai-written\/."},{"key":"ref_93","unstructured":"Toulas, B. (2025, March 03). Hackers Deploy AI-Written Malware in Targeted Attacks. Bleeping Computer. Available online: https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-deploy-ai-written-malware-in-targeted-attacks\/."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Rigaki, M., and Garcia, S. (2018, January 24). Bringing a GAN to a Knife-Fight: Adapting Malware Communication to Avoid Detection. Proceedings of the IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00019"},{"key":"ref_95","unstructured":"Heiding, F., Schneier, B., and Visheanath, A. (2025, January 13). AI Will Increase the Quantity\u2014and Quality\u2014of Phishing Scams. Harvard Business Review. Available online: https:\/\/hbr.org\/2024\/05\/ai-will-increase-the-quantity-and-quality-of-phishing-scams."},{"key":"ref_96","first-page":"427","article-title":"The Impact of AI on Cybersecurity Defense Mechanisms: Future Trends and Challenges","volume":"12","author":"Gilbert","year":"2024","journal-title":"Glob. Sci. J."},{"key":"ref_97","unstructured":"FreakyClown (2025, March 03). The Rise, Use, and Future of Malicious Al: A Hacker\u2019s Insight. Available online: https:\/\/wordpress.app.vib.community\/le\/the-rise-use-and-future-of-malicious-al-a-hackers-insight\/."},{"key":"ref_98","unstructured":"(2025, March 03). NCSC The Near-Term Impact of AI on the Cyber Threat, Teport, NCSC.GOV.UK, Available online: https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat."},{"key":"ref_99","unstructured":"Ph, M., Stoecklin, J., Jang, J., and Kirat, D. (2024, September 16). DeepLocker: How AI Can Power a Stealthy New Breed of Malware. Security Intelligence. Available online: https:\/\/securityintelligence.com\/deeplocker-how-ai-can-power-a-stealthy-new-breed-of-malware\/."},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Lin, Z., Shi, Y., and Xue, Z. (2022). IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. Lecture Notes in Computer Science, Springer International Publishing.","DOI":"10.1007\/978-3-031-05981-0_7"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"e40699","DOI":"10.1016\/j.heliyon.2024.e40699","article-title":"Impact of AI on the Cyber Kill Chain: A Systematic Review","volume":"10","author":"Kazimierczak","year":"2024","journal-title":"Heliyon"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Darshan, S.L.S., Kumara, M.A.A., and Jaidhar, C.D. (2016, January 3\u20134). Windows Malware Detection Based on Cuckoo Sandbox Generated Report Using Machine Learning Algorithm. Proceedings of the 2016 11th International Conference on Industrial and Information Systems (ICIIS), Roorkee, India.","DOI":"10.1109\/ICIINFS.2016.8262998"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"6377","DOI":"10.1109\/TIFS.2024.3414339","article-title":"MTDroid: A Moving Target Defense-based Android Malware Detector against Evasion Attacks","volume":"19","author":"Zhou","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Yang, K.-C., and Menczer, F. (2023). Anatomy of an AI-powered Malicious Social Botnet. arXiv.","DOI":"10.51685\/jqd.2024.icwsm.7"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Liang, J., Wang, R., Feng, C., and Chang, C.-C. (2023). A survey on federated learning poisoning attacks and defenses. arXiv.","DOI":"10.21203\/rs.3.rs-1900743\/v1"},{"key":"ref_106","unstructured":"Belova, K. (2024, September 16). What Is Federated Learning: Key Benefits, Applications, and Working Principles Explained. PixelPlex. Available online: https:\/\/pixelplex.io\/blog\/federated-learning-guide\/."},{"key":"ref_107","unstructured":"Koelemij, S. (2024, September 16). Artificial Intelligence: How Can It Help and Harm Us? Industrial Cyber. Available online: https:\/\/industrialcyber.co\/expert\/artificial-intelligence-how-can-it-help-and-harm-us\/."},{"key":"ref_108","unstructured":"Sims, J. (2024, September 16). BlackMamba: Using AI to Generate Polymorphic Malware. Hyas. Available online: https:\/\/www.hyas.com\/blog\/blackmamba-using-ai-to-generate-polymorphic-malware."},{"key":"ref_109","unstructured":"Hays (2025, January 14). EyeSpy: Proof-of-Concept. Hays. Available online: https:\/\/www.hyas.com\/read-the-eyespy-proof-of-concept."},{"key":"ref_110","unstructured":"13o-bbr-bbq (2024, December 20). Machine Learning Security\u2014Deep Generator [GitHub Repository]. GitHub. Available online: https:\/\/github.com\/13o-bbr-bbq\/machine_learning_security\/tree\/master\/Generator."},{"key":"ref_111","unstructured":"Joshi, J. (2025, January 14). The Impact of AI on Endpoint Detection and Response. Proficio. Available online: https:\/\/www.proficio.com\/blog\/ai-endpoint-detection-and-response-edr\/."},{"key":"ref_112","unstructured":"Becker, N., Reti, D., Ntagiou, E.V., Wallum, M., and Schotten, H.D. (2024). Evaluation of Reinforcement Learning for Autonomous Penetration Testing using A3C, Q-learning and DQN. arXiv."},{"key":"ref_113","unstructured":"Cyware (2025, January 14). SOAR and AI in Cybersecurity: Reshaping Your Security Operations. Cyware. Available online: https:\/\/cyware.com\/security-guides\/security-orchestration-automation-and-response\/from-insight-to-action-how-ai-and-soar-are-reshaping-security-operations-13d9."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","article-title":"attackGAN: Adversarial Attack Against Black-box IDS using Generative Adversarial Networks","volume":"187","author":"Zhao","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Hu, W., and Tan, Y. Generating Adversarial Malware Examples for Black-box Attacks based on GAN. Proceedings of the International Conference on Data Mining and Big Data, Beijing, China, 21\u201324 November 2022.","DOI":"10.1007\/978-981-19-8991-9_29"},{"key":"ref_116","unstructured":"Freed, A.M. (2024, September 16). AI-Driven XDR: Defeating the Most Complex Attack Sequences. Cybereason. Available online: https:\/\/www.cybereason.com\/blog\/ai-driven-xdr-defeating-the-most-complex-attack-sequences."},{"key":"ref_117","unstructured":"ABN (2025, January 14). ABN AMRO First Buyer of Innovative Self-Healing Cybersecurity Software. ABN AMRO. Available online: https:\/\/www.abnamro.com\/en\/news\/abn-amro-first-buyer-of-innovative-self-healing-cybersecurity-software."},{"key":"ref_118","unstructured":"Sibanda, I. (2025, January 14). Automated Patch Management: A Proactive Way to Stay Ahead of Threats. ComputerWeekly. Available online: https:\/\/www.computerweekly.com\/feature\/Automated-patch-management-A-proactive-way-to-stay-ahead-of-threats."},{"key":"ref_119","unstructured":"The Hacker News (2025, January 14). How AI Is Transforming IAM and Identity Security. The Hacker News. Available online: https:\/\/thehackernews.com\/2024\/11\/how-ai-is-transforming-iam-and-identity.html."},{"key":"ref_120","first-page":"980","article-title":"AI-driven Vulnerability Management and Automated Threat Mitigation","volume":"10","author":"Komaragiri","year":"2022","journal-title":"Int. J. Sci. Res. Manag. (IJSRM)"},{"key":"ref_121","first-page":"1","article-title":"Cyber Attack Surface Management System","volume":"3","author":"Vindhya","year":"2023","journal-title":"Int. J. Adv. Res. Sci. Commun. Technol. (IJARSCT)"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"108668","DOI":"10.1016\/j.comnet.2021.108668","article-title":"Deep Data Plane Programming and AI for Zero-trust Self-driven Networking in Beyond 5G","volume":"203","author":"Hireche","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1353\/jod.2023.a907692","article-title":"AI and Catastrophic Risk","volume":"34","author":"Bengio","year":"2023","journal-title":"J. Democr."},{"key":"ref_124","unstructured":"Pistono, F., and Yampolskiy, R.V. (2016). Unethical Research: How to Create a Malevolent Artificial Intelligence. arXiv."},{"key":"ref_125","unstructured":"McManus, S. (2025, September 01). How to Stop AI Agents Going Rogue, BBC. Available online: https:\/\/www.bbc.com\/news\/articles\/cq87e0dwj25o."},{"key":"ref_126","unstructured":"Robinson, B. (2025, September 01). AI Goes Rogue: Do 5 Things If Your Chatbot Lies, Schemes or Threatens. Forbes. Available online: https:\/\/www.forbes.com\/sites\/bryanrobinson\/2025\/07\/03\/ai-goes-rogue-do-5-things-if-your-chatbot-lies-schemes-or-threatens\/."},{"key":"ref_127","unstructured":"Admin-HTS (2024, September 16). What Is CylanceProtect? HTS Blog Articles. Available online: https:\/\/www.hts-tx.com\/blog?p=what-is-cylanceprotect-240109."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Sikarwar, P., Gupta, D., Singhal, A., Raghuwanshi, S., and Hasan, A. (2023, January 12\u201313). Transformative Dynamics: Unveiling the Influence of Artificial Intelligence, Cybersecurity and Advanced Technologies in Bitcoin. Proceedings of the 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM), Noida, India.","DOI":"10.1109\/ICCAKM58659.2023.10478540"},{"key":"ref_129","unstructured":"DarkTrace (2024, September 16). Enterprise Immune System. Available online: https:\/\/d1.awsstatic.com\/Marketplace\/solutions-center\/downloads\/AWS-Datasheet-Darktrace.pdf."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Djenna, A., Bouridane, A., Rubab, S., and Marou, I.M. (2023). Artificial Intelligence-based Malware Detection, Analysis, and Mitigation. Symmetry, 15.","DOI":"10.3390\/sym15030677"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"210","DOI":"10.9734\/ajrcos\/2023\/v16i3357","article-title":"Cyber Kill Chain Analysis Using Artificial Intelligence","volume":"16","author":"Shehu","year":"2023","journal-title":"Asian J. Res. Comput. Sci."},{"key":"ref_132","unstructured":"Sen, M.A. (2024). Attention-GAN for Anomaly Detection: A Cutting-edge Approach to Cybersecurity Threat Management. arXiv."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"3233","DOI":"10.1007\/s10586-020-03083-5","article-title":"Can Machine Learning Models with Static Features be Fooled? An Adversarial Machine Learning Approach","volume":"23","author":"Taheri","year":"2020","journal-title":"Clust. Comput."},{"key":"ref_134","unstructured":"Musman, S., Booker, L., Applebaum, A., and Edmonds, B. (2024, September 16). Steps Toward a Principled Approach to Automating Cyber Responses. SPIE Digital Library. Available online: https:\/\/www.spiedigitallibrary.org\/conference-proceedings-of-spie\/11006\/2518976\/Steps-toward-a-principled-approach-to-automating-cyber-responses\/10.1117\/12.2518976.full#=."},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Geiger, A., Liu, D., Alnegheimish, S., Cuesta-Infante, A., and Veeramachaneni, K. (2020, January 10\u201313). TadGAN: Time Series Anomaly Detection Using Generative Adversarial Networks. Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA.","DOI":"10.1109\/BigData50022.2020.9378139"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"55","DOI":"10.22161\/ijaers.105.8","article-title":"Enhancing Cybersecurity: The Power of Artificial Intelligence in Threat Detection and Prevention","volume":"10","author":"Rizvi","year":"2023","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref_137","first-page":"1","article-title":"A Comprehensive Review of Artificial Intelligence Applications in Enhancing Cybersecurity Threat Detection and Response Mechanisms","volume":"3","author":"Sankaram","year":"2024","journal-title":"Glob. Mainstream J. Bus. Econ. Dev. Proj. Manag."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Freitas, S., Kalajdjieski, J., Gharib, A., and McCann, R. (2024). AI-driven Guided Response for Security Operation Centers with Microsoft Copilot for Security. arXiv.","DOI":"10.1145\/3701716.3715209"},{"key":"ref_139","first-page":"143","article-title":"The Role of AI in Cybersecurity: Addressing Threats in the Digital Age","volume":"3","author":"Camacho","year":"2024","journal-title":"J. Artif. Intell. Gen. Sci. (JAIGS)"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"6","DOI":"10.22161\/ijaers.116.3","article-title":"Improving Cybersecurity: Artificial Intelligence\u2019s Ability to Detect and Stop Threats","volume":"11","author":"Laxmi","year":"2024","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.arcontrol.2022.01.001","article-title":"Reinforcement Learning for Feedback-enabled Cyber Resilience","volume":"53","author":"Huang","year":"2022","journal-title":"Annu. Rev. Control"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.30574\/wjarr.2024.21.1.0313","article-title":"Artificial Intelligence in Cybersecurity: Protecting National Infrastructure: A USA Review","volume":"21","author":"Adewusi","year":"2024","journal-title":"World J. Adv. Res. Rev."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Soussi, W., Christopoulou, M., G\u00fcr, G., and Stiller, B. (2023, January 6). MERLINS\u2014Moving Target Defense Enhanced with Deep-RL for NFV In-Depth Security. Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany.","DOI":"10.1109\/NFV-SDN59219.2023.10329594"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Cybenko, G., Liu, P., Wang, C., and Wellman, M. (2019). Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control-and Game-Theoretic Approaches to Cybersecurity, Springer Nature.","DOI":"10.1007\/978-3-030-30719-6"},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Reti, D., Fraunholz, D., Elzer, K., Schneider, D., and Schotten, H.D. (2022, January 7). Evaluating Deception and Moving Target Defense with Network Attack Simulation. Proceedings of the 9th ACM Workshop on Moving Target Defense, Los Angeles, CA, USA. Available online: https:\/\/arxiv.org\/pdf\/2301.10629.","DOI":"10.1145\/3560828.3564006"},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Clark, A., Sun, K., Bushnell, L., and Poovendran, R. (2015). A Game-theoretic Approach to IP Address Randomization in Decoy-based Cyber Defense. Decision and Game Theory for Security, Springer.","DOI":"10.1007\/978-3-319-25594-1_1"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Duy, P.T., Hoang, H.D., Khoa, N.H., Hien, D.T., and Pham, V. (2022, January 27\u201330). Fool Your Enemies: Enable Cyber Deception and Moving Target Defense for Intrusion Detection in SDN. Proceedings of the 2022 21st International Symposium on Communications and Information Technologies (ISCIT), Xi\u2019an, China.","DOI":"10.1109\/ISCIT55906.2022.9931208"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Bilinski, M., diVita, J., Ferguson-Walter, K., Fugate, S., Gabrys, R., Mauger, J., and Souza, B. (2020). Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity, Springer International Publishing. Available online: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-64793-3_5.","DOI":"10.1007\/978-3-030-64793-3_5"},{"key":"ref_149","unstructured":"Cohen, S., Bitton, R., and Nassi, B. (2024). Here Comes the AI Worm: Unleashing Zero-click Worms that Target GenAI-powered Applications. arXiv."},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Weinz, M., Schr\u00f6er, S.L., and Apruzzese, G. (2025, March 03). \u201cHey Google, Remind Me to be Phished\u201d: Exploiting the Google (AI) Assistant Ecosystem for Social Engineering Attacks. Available online: https:\/\/www.giovanniapruzzese.com\/files\/papers\/GoogleAssistantPhishing.pdf.","DOI":"10.1109\/eCrime66200.2024.00014"},{"key":"ref_151","unstructured":"Lakshmanan, R. (2025, March 03). Researchers Reveal \u2018Deceptive Delight\u2019 Method to Jailbreak AI models. Available online: https:\/\/thehackernews.com\/2024\/10\/researchers-reveal-deceptive-delight.html."},{"key":"ref_152","unstructured":"Yahalom, R. (2025, September 01). What the 2024 CrowdStrike Glitch Can Teach Us About Cyber Risk, Harvard Business Review. Available online: https:\/\/hbr.org\/2025\/01\/what-the-2024-crowdstrike-glitch-can-teach-us-about-cyber-risk."},{"key":"ref_153","unstructured":"Doll, J., McCarthy, C., McDougall, H., and Bhunia, S. (2025). Unraveling Log4Shell: Analyzing the Impact and Response to the Log4j Vulnerabil. arXiv."},{"key":"ref_154","unstructured":"Chen, C. (2025, March 03). Everyone in AI Is Talking About Manus. We Put It to the Test. Artificial Intelligence, MIT Technology Review. Available online: https:\/\/www.technologyreview.com\/2025\/03\/11\/1113133\/manus-ai-review\/."}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/13\/10\/835\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:48:24Z","timestamp":1760035704000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/13\/10\/835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,23]]},"references-count":154,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["systems13100835"],"URL":"https:\/\/doi.org\/10.3390\/systems13100835","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,23]]}}}