You are currently viewing a new version of our website. To view the old version click .

Cybersecurity Symmetry: Encryption, AI, and Attack Patterns

Topic Information

Dear Colleagues,

Cybersecurity currently exists in a dynamic state of symmetry, where both attackers and defenders leverage similar technologies—particularly encryption and artificial intelligence (AI)—in a constant strategic tug-of-war. Encryption remains a foundational tool for securing data, but emerging threats like quantum computing and AI-generated attack patterns challenge its integrity. AI plays a dual role—enhancing defense through automated threat detection and prediction, while also enabling sophisticated attacks such as data poisoning and zero-day exploit discovery. The concept of symmetry is further explored in mirrored tactics used by ethical hackers and malicious actors, raising ethical questions about autonomous defensive systems. Although there is a theoretical balance, in practice, cybersecurity often remains asymmetric, with attackers holding the advantage of surprise and agility. Future solutions may rely on privacy-preserving technologies like homomorphic encryption and more resilient AI models to restore equilibrium in the digital battlefield.

Prof. Dr. Mobyen Uddin Ahmed
Dr. Azidine Guezzaz
Topic Editors

Keywords

  • artificial intelligence (AI)
  • encryption
  • attack patterns
  • defensive AI
  • data poisoning
  • zero-day exploits
  • neural cryptography
  • threat detection
  • adversarial machine learning
  • cyber threat intelligence
  • cyber offense–defense symmetry
  • machine learning security
  • AI-driven attacks

Participating Journals

AI
Open Access
665 Articles
Launched in 2020
5.0Impact Factor
6.9CiteScore
21 DaysMedian Time to First Decision
Q1Highest JCR Category Ranking
Future Internet
Open Access
3,176 Articles
Launched in 2009
3.6Impact Factor
8.3CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Micromachines
Open Access
12,723 Articles
Launched in 2010
3.0Impact Factor
6.0CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Symmetry
Open Access
16,522 Articles
Launched in 2009
2.2Impact Factor
5.3CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Cryptography
Open Access
438 Articles
Launched in 2017
2.1Impact Factor
5.0CiteScore
23 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking

Published Papers