{"id":"https://openalex.org/W7123244786","doi":"https://doi.org/10.48550/arxiv.2601.05293","title":"A Survey of Agentic AI and Cybersecurity: Challenges, Opportunities and Use-case Prototypes","display_name":"A Survey of Agentic AI and Cybersecurity: Challenges, Opportunities and Use-case Prototypes","publication_year":2026,"publication_date":"2026-01-08","ids":{"openalex":"https://openalex.org/W7123244786","doi":"https://doi.org/10.48550/arxiv.2601.05293"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.05293","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.05293","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.05293","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122806139","display_name":"Sahaya Jestus Lazer","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lazer, Sahaya Jestus","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005398538","display_name":"Kshitiz Aryal","orcid":"https://orcid.org/0000-0001-8000-1086"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aryal, Kshitiz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102483629","display_name":"Maanak Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gupta, Maanak","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122814516","display_name":"Elisa Bertino","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bertino, Elisa","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5122806139"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2409999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.2409999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.0722000002861023,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.059700001031160355,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5838000178337097},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.5752000212669373},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5564000010490417},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4779999852180481},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.3693999946117401},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.34540000557899475},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3441999852657318}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5838000178337097},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.5752000212669373},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5564000010490417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5533999800682068},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4779999852180481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37229999899864197},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3540000021457672},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3513999879360199},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.34540000557899475},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3441999852657318},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3391000032424927},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3296999931335449},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31360000371932983},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.304500013589859},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C2780440489","wikidata":"https://www.wikidata.org/wiki/Q5227278","display_name":"Data-driven","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.28380000591278076},{"id":"https://openalex.org/C198477413","wikidata":"https://www.wikidata.org/wiki/Q7647069","display_name":"Survey data collection","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2687000036239624},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2614000141620636},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.25870001316070557},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.05293","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.05293","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.05293","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.05293","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8036614060401917}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Agentic":[0],"AI":[1,47,106,151],"marks":[2],"an":[3],"important":[4],"transition":[5],"from":[6],"single-step":[7],"generative":[8],"models":[9],"to":[10,123],"systems":[11,32],"capable":[12],"of":[13,45],"reasoning,":[14],"planning,":[15],"acting,":[16],"and":[17,27,65,82,95,104,119,126,137,157,164],"adapting":[18],"over":[19],"long-lasting":[20],"tasks.":[21],"By":[22],"integrating":[23],"memory,":[24],"tool":[25],"use,":[26],"iterative":[28],"decision":[29],"cycles,":[30],"these":[31,110],"enable":[33,56],"continuous,":[34],"autonomous":[35,59],"workflows":[36],"in":[37,91,153],"real-world":[38],"environments.":[39],"This":[40],"survey":[41,113],"examines":[42],"the":[43,51,71],"implications":[44],"agentic":[46,54,124,150],"for":[48,102],"cybersecurity.":[49],"On":[50],"defensive":[52],"side,":[53],"capabilities":[55],"continuous":[57],"monitoring,":[58],"incident":[60],"response,":[61],"adaptive":[62],"threat":[63,115],"hunting,":[64],"fraud":[66],"detection":[67],"at":[68],"scale.":[69],"Conversely,":[70],"same":[72],"properties":[73],"amplify":[74],"adversarial":[75],"power":[76],"by":[77],"accelerating":[78],"reconnaissance,":[79],"exploitation,":[80],"coordination,":[81],"social-engineering":[83],"attacks.":[84],"These":[85],"dual-use":[86],"dynamics":[87],"expose":[88],"fundamental":[89],"gaps":[90],"existing":[92],"governance,":[93],"assurance,":[94],"accountability":[96],"mechanisms,":[97],"which":[98],"were":[99],"largely":[100],"designed":[101],"non-autonomous":[103],"short-lived":[105],"systems.":[107],"To":[108],"address":[109],"challenges,":[111],"we":[112,141],"emerging":[114],"models,":[116],"security":[117],"frameworks,":[118],"evaluation":[120],"pipelines":[121],"tailored":[122],"systems,":[125],"analyze":[127],"systemic":[128],"risks":[129],"including":[130],"agent":[131],"collusion,":[132],"cascading":[133],"failures,":[134],"oversight":[135],"evasion,":[136],"memory":[138],"poisoning.":[139],"Finally,":[140],"present":[142],"three":[143],"representative":[144],"use-case":[145],"implementations":[146],"that":[147],"illustrate":[148],"how":[149,158],"behaves":[152],"practical":[154],"cybersecurity":[155],"workflows,":[156],"design":[159],"choices":[160],"shape":[161],"reliability,":[162],"safety,":[163],"operational":[165],"effectiveness.":[166]},"counts_by_year":[],"updated_date":"2026-01-13T12:58:16.504669","created_date":"2026-01-13T00:00:00"}
