Logo do repositório
 
Publicação

GENERATIVE AI MUTABILITY IN CYBERSECURITY: A BIBLIOMETRIC REVIEW

dc.contributor.authorOliveira, Pedro
dc.contributor.authorDias Lousã, Mário Jorge
dc.contributor.authorDias Lousã, Mário Jorge
dc.contributor.authorPereira de Morais, José Carlos
dc.contributor.authorPereira de Morais, José Carlos
dc.contributor.editorMorais, José Carlos
dc.contributor.editorLousã, Mário
dc.date.accessioned2026-01-29T18:05:46Z
dc.date.available2026-01-29T18:05:46Z
dc.date.issued2026-01-01
dc.description.abstractThe expansion of generative AI (GenAI) is forcing us to rethink cybersecurity, expanding both de-fensive automation and scalable offensive techniques. This bibliometric review maps the change driven by GenAI in cybersecurity through a PRISMA-guided selection of 154 documents from The Lens (20 December 2025). The current state is summarized by scientific mapping results (co-author-ship, co-word, and co-citation networks, and thematic evolution) to identify dominant architectures, thematic clusters, and collaboration patterns, and implications for governance and auditing. We note the exponential growth of publications in 2022. We notice the trend. The authors group publications into several architectures: large language models (LLMs), generative networks (GANs), and diffu-sion models. These focus on common topics, (i) large-scale phishing and social engineering, (ii) mutability, obfuscation, and adversarial evasion of malware, and (iii) intrusion detection and cyber threat intelligence using synthetic data. Co-citation networks and keywords show that adversarial robustness, red teaming, and benchmarking are interconnected. We find that explainability and hu-man-in-the-loop defense exist as minor but growing topics. One risk is the BlackMamba case, which transmits an LLM-assisted pipeline capable of generating more than 10,000 semantically identical but structurally distinct mutations per hour and achieving a 98.2% evasion rate against commercial EDR solutions. Risk mitigation should prioritize benchmarking and standardized reporting, continu-ous red teaming, and telemetry monitoring, incorporated into dynamic audit frameworks, supported by explicit international governance for high-risk GenAI cybersecurity applications.eng
dc.identifier.citationOliveira, P., Lousã, M., & Morais, J. (2026).
dc.identifier.doihttps://doi.org/10.58086/w1yd-0829
dc.identifier.issn0874-8799
dc.identifier.urihttp://hdl.handle.net/10400.26/61315
dc.language.isoeng
dc.peerreviewedyes
dc.publisherISPGAYA
dc.relation.ispartofseriesPolitécnica
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectAdversarial AI
dc.subjectAI-driven cyber threats
dc.subjectPolymorphic and metamorphic mal-ware
dc.subjectSynthetic data
dc.subjectIntrusion detection systems.
dc.titleGENERATIVE AI MUTABILITY IN CYBERSECURITY: A BIBLIOMETRIC REVIEWeng
dc.typetext
dspace.entity.typePublication
oaire.citation.endPage136
oaire.citation.issue1
oaire.citation.startPage117
oaire.citation.titlePolitécnica
oaire.citation.volume32
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85
person.familyNameDias Lousã
person.familyNamePereira de Morais
person.givenNameMário Jorge
person.givenNameJosé Carlos
person.identifier.ciencia-id471D-D183-2BDE
person.identifier.ciencia-idD412-2DF0-6747
person.identifier.orcid0000-0001-7776-5528
person.identifier.orcid0000-0002-7924-5902
relation.isAuthorOfPublication890c1788-42db-480a-aa2d-e1aa19b98ebb
relation.isAuthorOfPublication15f8ed06-6876-4d00-ac07-2822e0c5454e
relation.isAuthorOfPublication.latestForDiscovery890c1788-42db-480a-aa2d-e1aa19b98ebb

Ficheiros

Principais
A mostrar 1 - 1 de 1
A carregar...
Miniatura
Nome:
Politécnica 25 no layout (2)-117-133.pdf
Tamanho:
864.98 KB
Formato:
Adobe Portable Document Format
Licença
A mostrar 1 - 1 de 1
Miniatura indisponível
Nome:
license.txt
Tamanho:
1.85 KB
Formato:
Item-specific license agreed upon to submission
Descrição: