Reinforcement Learning for Cyber Security: Methods and Applications
A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".
Deadline for manuscript submissions: 31 December 2025 | Viewed by 96
Special Issue Editors
2. Cybersecurity Institute, University of Liverpool, Liverpool, UK
Interests: cyber security; digital forensics; Internet of Things; reinforcement learning; large language models; forensics; risk management and governance
Interests: reinforcement learning; formal methods for security; authorisation and accountability; artificial intelligence for security, verification, and embedded systems
Special Issue Information
Dear Colleagues,
Modern cybersecurity faces escalating threats from AI-driven attacks, zero-day exploits, and complex attack surfaces. Traditional rule-based systems struggle with adaptability, while reliance on human experts is costly and unscalable. Reinforcement learning (RL) has emerged as a transformative alternative, enabling autonomous and adaptive decision-making through exploratory learning—simulating attack–defend dynamics to uncover novel strategies. Its ability to iteratively optimize actions in uncertain environments makes RL ideal for proactive defence, reducing dependency on manual intervention. Applications span cyber investigation and forensics (e.g., automated log analysis, attack traceability), cybersecurity by design (embedding RL into system architectures for real-time resilience), and risk/vulnerability assessment (predictive modelling of threat landscapes). This Special Issue invites research advancing RL-driven solutions for modern challenges.
Topics Include:
- RL for threat detection, penetration testing, and incident response;
- Autonomous cyber forensics and adversarial traceability;
- Cybersecurity-by-design frameworks with embedded RL;
- Risk assessment, vulnerability prioritization, and compliance automation;
- RL in Industrial Internet of Things (IIoT) security and critical infrastructure protection;
- Exploratory RL for simulating advanced persistent threats (APTs);
- Privacy-aware RL in threat intelligence sharing;
- Scalable RL for zero-day exploit detection;
- Cyber incident response.
We are seeking theoretical breakthroughs, real-world case studies, and interdisciplinary approaches that integrate RL with game theory, digital twins, or explainable AI. Studies addressing ethical AI use, robustness against adversarial RL, and regulatory alignment (e.g., NIST, GDPR) are encouraged.
Dr. Mohamed Chahine Ghanem
Prof. Dr. Dominik Wojtczak
Prof. Dr. Vassil Vassilev
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- reinforcement learning
- cyber security
- autonomous defence
- Markov chain
- cyber forensics
- threat detection
- vulnerability assessment
- Internet of Things security
- compliance automation
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue policies can be found here.