{"id":"https://openalex.org/W7118192450","doi":"https://doi.org/10.1109/access.2026.3650833","title":"Agentic Intelligence for Unified Cyber Defense: A Self-Adaptive Framework for Threat Detection Across Cloud, Edge, and IoT Systems","display_name":"Agentic Intelligence for Unified Cyber Defense: A Self-Adaptive Framework for Threat Detection Across Cloud, Edge, and IoT Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118192450","doi":"https://doi.org/10.1109/access.2026.3650833"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3650833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3650833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3650833","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121927255","display_name":"B. Vijetha","orcid":null},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. Vijetha","raw_affiliation_strings":["Department of Computer Science and Engineering, NMAM Institute of Technology (NMAMIT), NITTE (Deemed to be University), Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology (NMAMIT), NITTE (Deemed to be University), Karnataka, India","institution_ids":["https://openalex.org/I1333540553"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5121927255"],"corresponding_institution_ids":["https://openalex.org/I1333540553"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05607072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"5104","last_page":"5118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9128999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9128999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.010599999688565731,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.009600000455975533,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.7954999804496765},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.42910000681877136},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.42329999804496765},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.3912999927997589},{"id":"https://openalex.org/keywords/concept-drift","display_name":"Concept drift","score":0.3862999975681305},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.37599998712539673},{"id":"https://openalex.org/keywords/novelty-detection","display_name":"Novelty detection","score":0.3732999861240387},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.36230000853538513}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8264999985694885},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.7954999804496765},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.451200008392334},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.448199987411499},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.42910000681877136},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3912999927997589},{"id":"https://openalex.org/C60777511","wikidata":"https://www.wikidata.org/wiki/Q3045002","display_name":"Concept drift","level":3,"score":0.3862999975681305},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C2778924833","wikidata":"https://www.wikidata.org/wiki/Q7064603","display_name":"Novelty detection","level":3,"score":0.3732999861240387},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3594000041484833},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30709999799728394},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.29269999265670776},{"id":"https://openalex.org/C2781020372","wikidata":"https://www.wikidata.org/wiki/Q533093","display_name":"On the fly","level":2,"score":0.27720001339912415},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.274399995803833},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2718999981880188},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.267300009727478},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2026.3650833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3650833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e0e7a730ced14cd4b32266fa31ab70d2","is_oa":true,"landing_page_url":"https://doaj.org/article/e0e7a730ced14cd4b32266fa31ab70d2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 5104-5118 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3650833","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3650833","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8053188920021057}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2064675550","https://openalex.org/W2076063813","https://openalex.org/W2099419573","https://openalex.org/W2118978333","https://openalex.org/W2143991132","https://openalex.org/W2278186031","https://openalex.org/W2282821441","https://openalex.org/W2560647685","https://openalex.org/W2751596245","https://openalex.org/W2754134359","https://openalex.org/W2756359217","https://openalex.org/W2786577118","https://openalex.org/W2898017895","https://openalex.org/W2919115771","https://openalex.org/W2963748489","https://openalex.org/W3138202081","https://openalex.org/W3164005523","https://openalex.org/W4205947138","https://openalex.org/W4212863985","https://openalex.org/W4247200422","https://openalex.org/W4378471417","https://openalex.org/W4385245566","https://openalex.org/W4389617183","https://openalex.org/W4396949749","https://openalex.org/W4403937349","https://openalex.org/W4412629193","https://openalex.org/W4414157027"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"expansion":[2],"of":[3,8,18],"cloud,":[4],"edge,":[5],"and":[6,16,51,67,74,92,134,148,158,168,178,186,204],"Internet":[7],"Things":[9],"environments":[10],"has":[11],"increased":[12],"both":[13],"the":[14,43,110,192],"scale":[15],"complexity":[17],"modern":[19],"cyber-attacks.":[20],"Conventional":[21],"detection":[22,54],"systems":[23],"that":[24,88,127],"operate":[25],"effectively":[26],"under":[27],"stationary":[28],"conditions":[29],"often":[30],"degrade":[31],"when":[32],"attacker":[33],"behaviour":[34,190],"or":[35],"underlying":[36],"data":[37],"distributions":[38],"change.":[39],"This":[40],"work":[41],"introduces":[42],"Agentic":[44],"Intelligence":[45],"Self-Adaptive":[46],"Framework":[47],"(AISAF),":[48],"a":[49,63,199],"unified":[50],"self-adjusting":[52],"threat":[53,136],"model":[55],"designed":[56],"for":[57],"heterogeneous":[58],"computing":[59],"environments.":[60],"AISAF":[61,138,181],"employs":[62],"hybrid":[64],"CNN,":[65],"LSTM,":[66],"Transformer":[68],"backbone":[69],"to":[70],"capture":[71],"spatial,":[72],"temporal,":[73],"contextual":[75],"dependencies":[76],"in":[77,95,165],"network":[78],"traffic.":[79],"Concept":[80],"drift":[81,100,169],"is":[82,101,139],"detected":[83],"through":[84],"lightweight":[85],"behavioural":[86],"monitoring":[87],"tracks":[89],"latent-space":[90],"deviations":[91],"prediction-confidence":[93],"variations":[94],"streaming":[96],"data.":[97],"When":[98],"meaningful":[99],"detected,":[102],"an":[103],"agentic":[104],"meta-optimization":[105],"controller":[106],"selectively":[107],"updates":[108],"only":[109],"affected":[111],"submodules,":[112],"reducing":[113],"retraining":[114],"cost":[115],"while":[116],"preventing":[117],"catastrophic":[118],"forgetting.":[119],"An":[120],"attention-based":[121],"explanation":[122],"layer":[123],"provides":[124],"feature-level":[125],"interpretability":[126],"remains":[128],"consistent":[129,163],"during":[130],"adaptation,":[131],"supporting":[132],"transparent":[133,188],"auditable":[135],"reasoning.":[137],"evaluated":[140],"on":[141],"six":[142],"benchmark":[143],"datasets":[144],"spanning":[145],"financial,":[146],"network,":[147],"IoT":[149],"domains:":[150],"PaySim,":[151],"IEEE-CIS":[152],"Fraud":[153],"Detection,":[154],"CICIDS2018,":[155],"UNSW-NB15,":[156],"CICIDS2017,":[157],"BoT-IoT.":[159],"Experimental":[160],"results":[161],"show":[162],"improvements":[164],"adaptability,":[166],"robustness,":[167],"recovery":[170],"compared":[171],"with":[172],"classical":[173],"machine":[174],"learning,":[175,177],"deep":[176],"adaptive":[179],"baselines.":[180],"achieves":[182],"reliable":[183],"cross-domain":[184],"generalization":[185],"maintains":[187],"decision":[189],"throughout":[191],"adaptation":[193],"process,":[194],"highlighting":[195],"its":[196],"potential":[197],"as":[198],"practical":[200],"step":[201],"toward":[202],"autonomous":[203],"interpretable":[205],"cybersecurity":[206],"systems.":[207]},"counts_by_year":[],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2026-01-05T00:00:00"}
