Logo do repositório
 
A carregar...
Miniatura
Publicação

GENERATIVE AI MUTABILITY IN CYBERSECURITY: A BIBLIOMETRIC REVIEW

Utilize este identificador para referenciar este registo.
Nome:Descrição:Tamanho:Formato: 
Politécnica 25 no layout (2)-117-133.pdf864.98 KBAdobe PDF Ver/Abrir

Orientador(es)

Resumo(s)

The expansion of generative AI (GenAI) is forcing us to rethink cybersecurity, expanding both de-fensive automation and scalable offensive techniques. This bibliometric review maps the change driven by GenAI in cybersecurity through a PRISMA-guided selection of 154 documents from The Lens (20 December 2025). The current state is summarized by scientific mapping results (co-author-ship, co-word, and co-citation networks, and thematic evolution) to identify dominant architectures, thematic clusters, and collaboration patterns, and implications for governance and auditing. We note the exponential growth of publications in 2022. We notice the trend. The authors group publications into several architectures: large language models (LLMs), generative networks (GANs), and diffu-sion models. These focus on common topics, (i) large-scale phishing and social engineering, (ii) mutability, obfuscation, and adversarial evasion of malware, and (iii) intrusion detection and cyber threat intelligence using synthetic data. Co-citation networks and keywords show that adversarial robustness, red teaming, and benchmarking are interconnected. We find that explainability and hu-man-in-the-loop defense exist as minor but growing topics. One risk is the BlackMamba case, which transmits an LLM-assisted pipeline capable of generating more than 10,000 semantically identical but structurally distinct mutations per hour and achieving a 98.2% evasion rate against commercial EDR solutions. Risk mitigation should prioritize benchmarking and standardized reporting, continu-ous red teaming, and telemetry monitoring, incorporated into dynamic audit frameworks, supported by explicit international governance for high-risk GenAI cybersecurity applications.

Descrição

Palavras-chave

Adversarial AI AI-driven cyber threats Polymorphic and metamorphic mal-ware Synthetic data Intrusion detection systems.

Contexto Educativo

Citação

Oliveira, P., Lousã, M., & Morais, J. (2026).

Projetos de investigação

Unidades organizacionais

Fascículo

Editora

ISPGAYA

Licença CC

Métricas Alternativas