Skip to content
Publish & Distribute
Publishing Solutions
Distribution Solutions
Library Services
Subjects
Architecture and Design
Arts
Business and Economics
Chemistry
Classical and Ancient Near Eastern Studies
Computer Sciences
Cultural Studies
Engineering
General Interest
Geosciences
History
Industrial Chemistry
Jewish Studies
Law
Library and Information Science, Book Studies
Life Sciences
Linguistics and Semiotics
Literary Studies
Materials Sciences
Mathematics
Medicine
Music
Pharmacy
Philosophy
Physics
Social Sciences
Sports and Recreation
Theology and Religion
Publications
Journals
Books
Proceedings
Publishers
Journal Matcher
Blog
Contact
Search
English
English
Deutsch
Polski
Español
Français
Italiano
Cart
Home
Journals
Cybernetics and Information Technologies
Volume 25 (2025): Issue 3 (September 2025)
Open Access
Cybersecurity and Artificial Intelligence: Triad-Based Analysis and Attacks Review
Olena Veprytska
Olena Veprytska
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”
Kharkiv, Ukraine
Search for this author on
Sciendo
|
Google Scholar
Veprytska, Olena
,
Vyacheslav Kharchenko
Vyacheslav Kharchenko
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”
Kharkiv, Ukraine
Search for this author on
Sciendo
|
Google Scholar
Kharchenko, Vyacheslav
and
Oleg Illiashenko
Oleg Illiashenko
Department of Computer Systems, Networks and Cybersecurity, National Aerospace University “KhAI”
Kharkiv, Ukraine
School of Built Environment, Engineering and Computing, Leeds Beckett University
Leeds, United Kingdom
Search for this author on
Sciendo
|
Google Scholar
Illiashenko, Oleg
Sep 25, 2025
Cybernetics and Information Technologies
Volume 25 (2025): Issue 3 (September 2025)
About this article
Previous Article
Next Article
Abstract
References
Authors
Articles in this Issue
Preview
PDF
Cite
Share
Download Cover
Published Online:
Sep 25, 2025
Page range:
156 - 185
Received:
Aug 07, 2025
Accepted:
Sep 01, 2025
DOI:
https://doi.org/10.2478/cait-2025-0028
Keywords
Cybersecurity
,
Artificial Intelligence (AI)
,
Machine Learning (ML)
,
Cyberattacks
,
Countermeasures
© 2025 Olena Veprytska et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.