{"id":"https://openalex.org/W7134060352","doi":"https://doi.org/10.48550/arxiv.2603.05068","title":"Cyber Threat Intelligence for Artificial Intelligence Systems","display_name":"Cyber Threat Intelligence for Artificial Intelligence Systems","publication_year":2026,"publication_date":"2026-03-05","ids":{"openalex":"https://openalex.org/W7134060352","doi":"https://doi.org/10.48550/arxiv.2603.05068"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2603.05068","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128239371","display_name":"Natalia Krawczyk","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Krawczyk, Natalia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128227956","display_name":"Mateusz Szczepkowski","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Szczepkowski, Mateusz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117255665","display_name":"Adrian Brodzik","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Brodzik, Adrian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5009316420","display_name":"Krzysztof Bocianiak","orcid":"https://orcid.org/0009-0004-8644-6771"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bocianiak, Krzysztof","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5128239371"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3224000036716461,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.3224000036716461,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1404000073671341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.11999999731779099,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5169000029563904},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.42239999771118164},{"id":"https://openalex.org/keywords/collective-intelligence","display_name":"Collective intelligence","score":0.3919000029563904},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.3781000077724457},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.3684000074863434},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.3659999966621399},{"id":"https://openalex.org/keywords/ambient-intelligence","display_name":"Ambient intelligence","score":0.3529999852180481}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6211000084877014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5171999931335449},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5169000029563904},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.42239999771118164},{"id":"https://openalex.org/C89057211","wikidata":"https://www.wikidata.org/wiki/Q432197","display_name":"Collective intelligence","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.3781000077724457},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.3684000074863434},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36489999294281006},{"id":"https://openalex.org/C201638289","wikidata":"https://www.wikidata.org/wiki/Q457396","display_name":"Ambient intelligence","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C105409693","wikidata":"https://www.wikidata.org/wiki/Q5937824","display_name":"Human intelligence","level":2,"score":0.33230000734329224},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C2779018934","wikidata":"https://www.wikidata.org/wiki/Q1129653","display_name":"Everyday life","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C157170001","wikidata":"https://www.wikidata.org/wiki/Q4781507","display_name":"Applications of artificial intelligence","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3057999908924103},{"id":"https://openalex.org/C2767350","wikidata":"https://www.wikidata.org/wiki/Q6662173","display_name":"Business intelligence","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.2711000144481659},{"id":"https://openalex.org/C44464901","wikidata":"https://www.wikidata.org/wiki/Q6770893","display_name":"Marketing and artificial intelligence","level":3,"score":0.25850000977516174}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2603.05068","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2603.05068","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.05068","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2603.05068","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"artificial":[1],"intelligence":[2,37,58,91,155],"(AI)":[3],"becomes":[4],"deeply":[5],"embedded":[6],"in":[7,142],"critical":[8],"services":[9],"and":[10,53,68,73,107,109,130,139,145],"everyday":[11],"products,":[12],"it":[13],"is":[14],"increasingly":[15],"exposed":[16],"to":[17,27,41,158],"security":[18,80,118],"threats":[19],"which":[20],"traditional":[21],"cyber":[22,35],"defenses":[23],"were":[24],"not":[25],"designed":[26],"handle.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32,85,121],"investigate":[33],"how":[34,111],"threat":[36,57,90,154],"(CTI)":[38],"may":[39],"evolve":[40],"address":[42],"attacks":[43],"that":[44],"target":[45],"AI":[46,79,104,133],"systems.":[47],"We":[48,70],"first":[49],"analyze":[50],"the":[51,60,75],"assumptions":[52],"workflows":[54],"of":[55,62,78,99],"conventional":[56],"with":[59],"needs":[61],"AI-focused":[63],"defense,":[64],"highlighting":[65],"AI-specific":[66],"assets":[67],"vulnerabilities.":[69],"then":[71],"review":[72,136],"organize":[74],"current":[76],"landscape":[77],"knowledge.":[81],"Based":[82],"on":[83],"this,":[84],"outline":[86],"what":[87],"an":[88],"AI-oriented":[89],"knowledge":[92,114],"base":[93,115],"should":[94],"contain,":[95],"describing":[96],"concrete":[97],"indicators":[98,129],"compromise":[100],"(IoC)":[101],"for":[102,124],"different":[103],"supply-chain":[105],"phases":[106],"artifacts,":[108],"showing":[110],"such":[112],"a":[113,152],"could":[116],"support":[117],"tools.":[119],"Finally,":[120],"discuss":[122],"techniques":[123],"measuring":[125],"similarity":[126],"between":[127],"collected":[128],"newly":[131],"observed":[132],"artifacts.":[134],"The":[135],"reveals":[137],"gaps":[138],"quality":[140],"issues":[141],"existing":[143],"resources":[144],"identifies":[146],"potential":[147],"future":[148],"research":[149],"directions":[150],"toward":[151],"practical":[153],"framework":[156],"tailored":[157],"AI.":[159]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-03-07T00:00:00"}
