<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence</title></titleStmt>
			<publicationStmt>
				<publisher></publisher>
				<date>02/18/2023</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10435796</idno>
					<idno type="doi">10.1007/s10796-023-10372-y</idno>
					<title level='j'>Information Systems Frontiers</title>
<idno>1387-3326</idno>
<biblScope unit="volume"></biblScope>
<biblScope unit="issue"></biblScope>					

					<author>Sagar Samtani</author><author>Ziming Zhao</author><author>Ram Krishnan</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[Over the past half-decade, numerous federal funding agencies such as the National Science Foundation (NSF), National Academies of Science (NAS), and National Security and Technology Council (NSTC) have noted the significant role that Artificial Intelligence (AI)-enabled analytics techniques such as deep learning, machine learning, network science, generative models, reinforcement learning, text analytics, and other techniques could play for Secure Knowledge Management (SKM), and more broadly, cybersecurity. Despite significant interest in the subject, how to design, develop, and evaluate AI-enabled analytics techniques to execute fundamental SKM and cybersecurity tasks, including the systematic process of gathering, synthesizing, organizing data in a secure fashion, malware analysis, incident report generation, password management, risk management, and many other application areas.In October 2021, the Secure Knowledge Management (SKM) Conference convened many of scholars and practitioners to discuss and share ideas about the use and development of AI for SKM and cybersecurity. Based on the successes of the conference, we launched a special issue to further solidify and attract additional contributions to the rapidly growing and exciting area of research with significant practical impact. In this editorial, we provide a brief background on the role that AI can play in SKM and cybersecurity. We also summarize the papers that were]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background on Artificial Intelligence for Cybersecurity and Secure Knowledge Management (SKM)</head><p>Recent academic literature has clearly summarized that there are several key areas of cybersecurity and SKM that could be significantly enhanced through the development of novel AI-enabled analytics techniques <ref type="bibr">(Bertino et al., 2021;</ref><ref type="bibr">S. Samtani et al. 2020a;</ref><ref type="bibr">S. Samtani et al. 2020b</ref><ref type="bibr">S. Samtani et al. , 2021</ref><ref type="bibr">S. Samtani et al. , 2022))</ref>. In summary, the major themes of work include (1) Cyber Threat Intelligence that focuses on identifying emerging threats and key threat actors to help enable effective cybersecurity decision making processes, (2) Disinformation and Computational Propaganda that seeks to identify how fake and/or misleading content proliferates through cyberspace, (3) Security Operations Centers that aims to produce operational cybersecurity capabilities for many organizations and encompasses tasks such as vulnerability management, password management, and others, and (4) Adversarial Machine Learning to Robustify Cyber-Defenses that aims to leverage techniques such as reinforcement learning or generative modeling to synthesize new attack vectors that could evade existing cyber-defenses. Since past research papers and editorials have already described each of these themes in depth, we do not repeat the specific tasks or techniques relevant to each theme. Instead, we point to some promising areas of recent AI development that could have significant benefits for SKM and cybersecurity. to help reduce the efforts of CTI and SOC analysts. &#8226; Multi-modal analytics: Often due to the lack of data, many AI algorithms are often trained on a single modality of data. However, organizations often have diverse data sources that human analysts need to consider when developing SKM practices carefully. Multi-modal analytics techniques such as multi-view learning and multi-task learning can help to combine multiple data sources together to produce unified representations to support decision-making processes <ref type="bibr">(Cao et al., 2021;</ref><ref type="bibr">Li et al., 2019;</ref><ref type="bibr">Zhang &amp; Yang, 2022)</ref>. Integrating attention mechanisms into these architectures can help models favor or weight specific categories of data more strongly than others during the learning process or maintain model robustness over time <ref type="bibr">(Vaswani et al., 2017</ref>). &#8226; Self-Supervised Learning (SSL): Establishing and maintaining gold-standard datasets to train supervised models is often one of the most time-consuming and labor-intensive tasks in SKM. SSL is an emerging paradigm of machine learning research that seeks to automatically process unlabeled data through (1) pretext classification task to attain pseudo-labels for data points to help initialize a model's parameters and (2) leveraging the model for downstream analytics tasks. SSL hold significant promise for SKM and cybersecurity tasks such as anomaly detection, vulnerability detection, bitcoin fraud detection, and others, as many datasets are difficult to manually label and are rapidly evolving.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Papers in this Special Issue</head><p>Papers for this special issue were primarily drawn from the 2021 Secure Knowledge Management Conference, which was held virtually (originally scheduled for San Antonio, TX) due to the Covid-19 pandemic. In summary, 11 papers were accepted to the SKM conference. 13 total submissions were submitted to the special issue, with seven of the submissions coming from the SKM conference (papers significantly extended). Although each paper was urged to have a component of AI in their work, this was not an explicit requirement. Thus, papers more broadly studying SKM or cybersecurity were also considered. Each submitted paper received at least one round of peer review. Ten papers were ultimately accepted for this Special Issue. The accepted papers for the special issue could be broadly categorized into four major themes: (1) Cyber-Training and Cybersecurity Education, (2) Social Media Analytics for Disinformation Detection and Topic Detection, (3) Permission and Password Management, and (4) Enhancing Model and Cybersecurity Control Robustness. Papers in each theme had a component of AI that was based in one or more of the major themes of extant AI-enabled cybersecurity and SKM research summarized in the previous section. We provide a summary of the papers accepted to each major theme in the following sub-sections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Cyber-Training and Cybersecurity Education</head><p>Despite the best efforts of academia, industry, and government, the cybersecurity workforce faces a significant shortfall. Moreover, significant efforts are required to define specific cybersecurity roles more carefully for the next generation of cyber threats. The papers in this theme seek to help address these issues. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Social Media Analytics for Disinformation Detection and Topic Detection</head><p>Papers in this theme sought to leverage computational approaches to mine the rich, yet largely unstructured data in social media platforms to derive insights for various social media analytics applications. Papers in this theme largely focused on detecting and/or categorizing disinformation, fake news, or other content on social media platforms with automated AI-enabled analytics methods.</p><p>&#8226; In their paper entitled "A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media," <ref type="bibr">Chung et al. (2023)</ref> sought to detect disinformation in social media through a validated deep learning approach entitled TRNN that is based on social and psychological theories and leverages a series of temporal and contextual information and multiple series of Long Short-Term Memory units to identify disinformation in over 745 K financial social media messages for four US high-tech company stocks. &#8226; In their paper entitled "Do Fake News in Different Languages Tell the Same Story? An Analysis of Multi-level Thematic and Emotional Characteristics of News about COVID-19," <ref type="bibr">Zhou et al. (2023)</ref> sought to explore the role of capturing thematic and emotional characteristics of fake news at different levels. The proposed topic modeling approach introduces a divergence measure design to ascertain the importance of thematic characteristics for fake news detection in multiple languages. &#8226; In their paper entitled "Heterogeneous Information Fusion based Topic Detection from Social Media Data," Rani and Kumar (2023) developed a topic detection framework with a transformer-based approach for topic modeling and topic-based video retrieval that specifically leverages textual metadata to find web video topics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Permission and Password Management</head><p>In this theme, papers sought to help tackle the age-old SKM problem of managing permissions and passwords.</p><p>&#8226; In their paper "DyPolDroid: Protecting Against Permission-Abuse Attacks in Android," Rubio-Medrano et al. ( <ref type="formula">2023</ref>) present a semi-automated security framework that allows for users and administrators to design and enforce a user-friendly abstraction (counter-policies) to restrict the set of permissions granted to malicious applications. The source code of their framework is publicly accessible and open-source. &#8226; In their paper "Password and Passphrase Guessing with Recurrent Neural Networks," <ref type="bibr">Nosenko et al. (2023)</ref> developed a rule-based approach that delegated rule derivation, classification, and prediction to a Recurrent Neural Network to guess passwords in a dataset containing 28.8 million users and their 61.5 million passwords. The predictions of their approach can succeed in under 5,000 attempts, a 100% improvement over existing algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Enhancing Model and Cybersecurity Control Robustness</head><p>An increasing body of research is seeking to help robustify cyber-defenses and controls by leveraging deep reinforcement learning, adversarial learning, and automated perturbations. Research in this theme seeks to make contributions to these areas. </p></div></body>
		</text>
</TEI>
