Skip to main content

EDITORIAL article

Front. Big Data
Sec. Cybersecurity and Privacy
Volume 7 - 2024 | doi: 10.3389/fdata.2024.1537878
This article is part of the Research Topic Cybersecurity and Artificial Intelligence: Advances, Challenges, Opportunities, Threats View all 6 articles

Editorial: Cybersecurity and Artificial Intelligence: Advances, Challenges, Opportunities, Threats

Provisionally accepted
  • 1 Edinburgh Napier University, Edinburgh, United Kingdom
  • 2 Norwegian University of Science and Technology Gjøvik, Gjøvik, Norway

The final, formatted version of the article will be published soon.

    Cybersecurity and AI have become increasingly important in today's interconnected world. Developments 2 in them and because of them find their way regularly not only to the scientific literature but to the media 3 as well. Notwithstanding the benefits of AI, the increasing use of and reliance on AI, including Machine 4 Learning (ML), have created a complex threat landscape. On the other hand, cybercriminals have become 5 more sophisticated and organized, targeting not only individuals but also organizations and even nations. These threat actors use advanced tactics, techniques, and procedures to exploit vulnerabilities to attack AI-7 powered systems. To mitigate these threats, it is essential to enhance our understanding of the risks involved 8 and to develop effective, specially targeted, cybersecurity strategies and robust defensive mechanisms. The increasing pervasiveness of AI and related technologies, coupled with the growing sophistication of 10 cybercriminals, has created a challenging threat landscape that requires innovative solutions to mitigate.

    Keywords: Cybersecurity (CS), artificial intelligence, adversarial machine learning, advances, Challenges, opportunities, threats

    Received: 01 Dec 2024; Accepted: 17 Dec 2024.

    Copyright: © 2024 Papadopoulos, Katsikas and Pitropakis. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence:
    Pavlos Papadopoulos, Edinburgh Napier University, Edinburgh, United Kingdom
    Sokratis Katsikas, Norwegian University of Science and Technology Gjøvik, Gjøvik, Norway
    Nikolaos Pitropakis, Edinburgh Napier University, Edinburgh, United Kingdom

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.