{"id":"https://openalex.org/W4415990381","doi":"https://doi.org/10.3390/a18110709","title":"Foundational Algorithms for Modern Cybersecurity: A Unified Review on Defensive Computation in Adversarial Environments","display_name":"Foundational Algorithms for Modern Cybersecurity: A Unified Review on Defensive Computation in Adversarial Environments","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4415990381","doi":"https://doi.org/10.3390/a18110709"},"language":"en","primary_location":{"id":"doi:10.3390/a18110709","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18110709","pdf_url":"https://www.mdpi.com/1999-4893/18/11/709/pdf?version=1762504142","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/18/11/709/pdf?version=1762504142","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023344080","display_name":"Paul A. Gagniuc","orcid":"https://orcid.org/0000-0001-9350-1530"},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Paul A. Gagniuc","raw_affiliation_strings":["Faculty of Engineering in Foreign Languages, National University of Science and Technology Politehnica Bucharest, RO-060042 Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering in Foreign Languages, National University of Science and Technology Politehnica Bucharest, RO-060042 Bucharest, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5023344080"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40063627,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"11","first_page":"709","last_page":"709"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07490000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07490000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.07410000264644623,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.03889999911189079,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47679999470710754},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4375},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4332999885082245},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4235999882221222},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4117000102996826},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.3653999865055084},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.3434000015258789}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8032000064849854},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4975000023841858},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47679999470710754},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4375},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4332999885082245},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4235999882221222},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4117000102996826},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4115000069141388},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3653999865055084},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.29670000076293945},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.28610000014305115},{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.2802000045776367},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.251800000667572},{"id":"https://openalex.org/C195344581","wikidata":"https://www.wikidata.org/wiki/Q2555318","display_name":"Automated reasoning","level":2,"score":0.2515999972820282},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/a18110709","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18110709","pdf_url":"https://www.mdpi.com/1999-4893/18/11/709/pdf?version=1762504142","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4ce7c3e54c97445ebd7194831bd76f4e","is_oa":true,"landing_page_url":"https://doaj.org/article/4ce7c3e54c97445ebd7194831bd76f4e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 18, Iss 11, p 709 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/a18110709","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18110709","pdf_url":"https://www.mdpi.com/1999-4893/18/11/709/pdf?version=1762504142","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4415990381.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W147005573","https://openalex.org/W1518705996","https://openalex.org/W1580559113","https://openalex.org/W1971421925","https://openalex.org/W2003736153","https://openalex.org/W2007572995","https://openalex.org/W2036378739","https://openalex.org/W2064675550","https://openalex.org/W2099964107","https://openalex.org/W2119821739","https://openalex.org/W2134007228","https://openalex.org/W2134826720","https://openalex.org/W2145339207","https://openalex.org/W2149342630","https://openalex.org/W2149600645","https://openalex.org/W2150423842","https://openalex.org/W2156204309","https://openalex.org/W2167989228","https://openalex.org/W2342408547","https://openalex.org/W2354711464","https://openalex.org/W2806540472","https://openalex.org/W2890991187","https://openalex.org/W2911964244","https://openalex.org/W2912213068","https://openalex.org/W2919115771","https://openalex.org/W2963857521","https://openalex.org/W2974642615","https://openalex.org/W4211166364","https://openalex.org/W4213060883","https://openalex.org/W4231286867","https://openalex.org/W4232836212","https://openalex.org/W4234989302","https://openalex.org/W4235646468","https://openalex.org/W4247200422","https://openalex.org/W4293106276","https://openalex.org/W4299796063","https://openalex.org/W4403722482","https://openalex.org/W4408580801","https://openalex.org/W4409653774","https://openalex.org/W4411534291","https://openalex.org/W4411889996","https://openalex.org/W4412201642","https://openalex.org/W4412423696","https://openalex.org/W4412777124","https://openalex.org/W4413862582","https://openalex.org/W4414787636"],"related_works":[],"abstract_inverted_index":{"Cyber":[0],"defense":[1,126,150],"has":[2],"evolved":[3],"into":[4,119],"an":[5],"algorithmically":[6],"intensive":[7],"discipline":[8],"where":[9],"mathematical":[10],"rigor":[11],"and":[12,18,40,52,60,68,74,86,96,107,116,134,145,166,175,180,189,195,198,217],"adaptive":[13,155],"computation":[14,162],"underpin":[15],"the":[16,26,63,207],"robustness":[17],"continuity":[19],"of":[20,66,210],"digital":[21],"infrastructures.":[22],"This":[23,177],"review":[24,178],"consolidates":[25],"algorithmic":[27],"spectrum":[28],"that":[29,37,46,172,214],"supports":[30],"modern":[31],"cyber":[32,149,211],"defense,":[33],"from":[34,79,151,187],"cryptographic":[35],"primitives":[36],"ensure":[38],"confidentiality":[39,67],"integrity":[41],"to":[42,88,154,169,191],"behavioral":[43],"intelligence":[44,147],"algorithms":[45,129],"provide":[47],"predictive":[48],"security.":[49],"Classical":[50],"symmetric":[51],"asymmetric":[53],"schemes":[54],"such":[55,92,103,139],"as":[56,93,98,100,104,140,202,206],"AES,":[57],"ChaCha20,":[58],"RSA,":[59],"ECC":[61],"define":[62],"computational":[64],"backbone":[65],"authentication":[69],"in":[70],"current":[71],"systems.":[72],"Intrusion":[73],"anomaly":[75],"detection":[76],"mechanisms":[77],"range":[78],"deterministic":[80,161],"pattern":[81],"matchers":[82],"exemplified":[83],"by":[84],"Aho-Corasick":[85],"Boyer-Moore":[87],"probabilistic":[89],"inference":[90,168],"models":[91],"Markov":[94],"Chains":[95],"HMMs,":[97],"well":[99],"deep":[101],"architectures":[102,158],"CNNs,":[105],"RNNs,":[106],"Autoencoders.":[108],"Malware":[109],"forensics":[110],"combines":[111],"graph":[112],"theory,":[113],"entropy":[114],"metrics,":[115],"symbolic":[117],"reasoning":[118],"a":[120],"unified":[121],"diagnostic":[122],"framework,":[123],"while":[124],"network":[125],"employs":[127],"graph-theoretic":[128],"for":[130],"routing,":[131],"flow":[132],"control,":[133],"intrusion":[135],"propagation.":[136],"Behavioral":[137],"paradigms":[138],"reinforcement":[141],"learning,":[142],"evolutionary":[143],"computation,":[144],"swarm":[146],"transform":[148],"reactive":[152],"automation":[153],"cognition.":[156],"Hybrid":[157],"now":[159],"merge":[160],"with":[163],"distributed":[164],"learning":[165],"explainable":[167],"create":[170],"systems":[171],"act,":[173],"reason,":[174],"adapt.":[176],"identifies":[179],"contextualizes":[181],"over":[182],"50":[183],"foundational":[184],"algorithms,":[185],"ranging":[186],"AES":[188],"RSA":[190],"LSTMs,":[192],"graph-based":[193],"models,":[194],"post-quantum":[196],"cryptography,":[197],"redefines":[199],"them":[200],"not":[201],"passive":[203],"utilities,":[204],"but":[205],"cognitive":[208],"genome":[209],"defense:":[212],"entities":[213],"shape,":[215],"sustain,":[216],"evolve":[218],"resilience":[219],"within":[220],"adversarial":[221],"environments.":[222]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-11-07T00:00:00"}
