[1] Akinbowale O.E., Klingelhöfer H.E., and Zerihun M.F., 2020. Analysis of cyber-crime effects on the banking sector using the balanced score card: a survey of literature. Journal of Financial Crime,27(3), pp. 945-958. [2] Akhtar Z.B., and Rawol A.T., 2024. Enhancing cybersecurity through AI-powered security mechanisms. IT Journal Research and Development,9(1), pp. 50-67. [3] Akhtar Z.B.,2024. Securing operating systems (OS): a comprehensive approach to security with best practices and techniques. [4] AL-Dosari K., Fetais N., and Kucukvar M., 2024. Artificial intelligence and cyber defense system for banking industry: A qualitative study of AI applications and challenges. Cybernetics and Systems,55(2), pp. 302-330. [5] Aslan Ö., Aktuğ S.S., Ozkan-Okay M., Yilmaz A.A., and Akin E., 2023. A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions.Electronics, 12(6), 1333. [6] Crothers E.N., Japkowicz N., and Viktor H.L., 2023. Machine-generated text: A comprehensive survey of threat models and detection methods.IEEE Access, 11, pp. 70977-71002. [7] Feijóo C., Kwon Y., Bauer J.M., Bohlin E., Howell B., Jain R., Potgieter P., Vu K., Whalley J., and Xia J., 2020. Harnessing artificial intelligence (AI) to increase wellbeing for all: the case for a new technology diplomacy.Telecommunications Policy, 44(6), 101988. [8] Guembe B., Azeta A., Misra S., Osamor V.C., Fernandez-Sanz L., and Pospelova V., 2022. The emerging threat of ai-driven cyber attacks: A review.Applied Artificial Intelligence, 36(1), 2037254. [9] Hammi B., Zeadally S., and Nebhen J., 2023. Security threats, countermeasures, and challenges of digital supply chains. ACM Computing Surveys,55(14s), pp. 1-40. [10] Korobenko D., Nikiforova A., and Sharma R., 2024. Towards a privacy and security-aware framework for ethical AI: guiding the development and assessment of AI systems. InProceedings of the 25th Annual International Conference on Digital Government Research, pp. 740-753. [11] Malatji M., and Tolah A., 2025. Artificial intelligence (AI) cybersecurity dimensions: a comprehensive framework for understanding adversarial and offensive AI. AI and Ethics,5(2), pp. 883-910. [12] Mamillapalli S.K.,2024. Adversarial and offensive AI in cyber security. IJSAT-International Journal on Science and Technology,15(4). [13] Maurer F., and Fritzsche A., 2023. Layered structures of robustness and resilience: evidence from cybersecurity projects for critical infrastructures in central europe. Strategic Change,32(6), pp. 195-208. [14] Michael J.B., and Wingfield T.C., 2021. Defensive AI: the future is yesterday. Computer,54(9), pp. 90-96. [15] Mirsky Y., Demontis A., Kotak J., Shankar R., Gelei D., Yang L., Zhang X., Pintor M., Lee W., Elovici Y., and Biggio B., 2023. The threat of offensive ai to organizations.Computers & Security, 124, 103006. [16] Mohammed A.,2025. Artificial intelligence-powered cyber attacks: adversarial machine learning.Authorea Preprints. [17] Radanliev P.,2025. AI ethics: integrating transparency, fairness, and privacy in AI development.Applied Artificial Intelligence, 39(1), 2463722. [18] Reuter C., Haunschild J., Hollick M., Mühlhäuser M., Vogt J., and Kreutzer M., 2020. Towards secure urban infrastructures: cyber security challenges for information and communication technology in smart cities. InMensch Und Computer 2020-Workshopband, pp. 10-18420. [19] Rosenberg I., Shabtai A., Elovici Y., and Rokach L., 2021. Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys (CSUR),54(5), pp. 1-36. [20] Sadaf M., Iqbal Z., Javed A.R., Saba I., Krichen M., Majeed S., and Raza A., 2023. Connected and automated vehicles: infrastructure, applications, security, critical challenges, and future aspects.Technologies, 11(5), 117. [21] Safitra M.F., Lubis M., and Fakhrurroja H., 2023. Counterattacking cyber threats: A framework for the future of cybersecurity.Sustainability, 15(18), 13369. [22] Salahuddin M.A., Bari M.F., Alameddine H.A., Pourahmadi V., and Boutaba R., 2020. Time-based anomaly detection using autoencoder. In2020 16th International Conference on Network and Service Management (CNSM), pp. 1-9. [23] Schreiber A., and Schreiber I., 2025. AI for cyber-security risk: harnessing AI for automatic generation of company-specific cybersecurity risk profiles.Information & Computer Security. [24] Syed S.A.,2025. Adversarial AI and cybersecurity: defending against AI-powered cyber threats. Iconic Research and Engineering Journals,8(9), pp. 1030-1041. [25] Praveen T.,2024. AI and cybersecurity in 2024: navigating new threats and unseen opportunities. [26] Vassilev A., Oprea A., Fordyce A., and Andersen H., 2024. Adversarial machine learning: A taxonomy and terminology of attacks and mitigations. [27] Veluru, C.S., 2024. Responsible artificial intelligence on large scale data to prevent misuse, unethical challenges and security breaches. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-349. DOI: Doi.Org/10.47363/JAICC/2024 (3), 331, pp. 2-6. [28] World Economic Forum, Artificial intelligence and cybersecurity: Balancing risks and rewards, https://reports.weforum.org/docs/WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf, accessed on December 1, 2025. [29] Yedalla J.,2024. AI-generated cyber threats the rise of autonomous hacking systems.International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 13(12), 7. |