Open Access
Table 2.
Directions for research and development in cybersecurity for critical infrastructures.
| Research area | Description | Expected impact |
|---|---|---|
| Intelligent threat detection systems | Development of AI/ML-based models for real-time anomaly detection and behavioral threat forecasting | Faster, more accurate incident detection and reduced false positives |
| Quantum cryptography and post-quantum security | Integration of quantum key distribution (QKD) and post-quantum encryption algorithms | Future-proof data confidentiality in the age of quantum computing |
| Resilience modeling and recovery strategies | Simulation-based analysis of infrastructure resilience and recovery under cascading failure scenarios | Improved system robustness and reduced downtime following cyber incidents |
| Socio-technical and behavioral research | Study of human factors, insider threat prevention, and security awareness training | Decreased risk of user-related breaches and enhanced security culture |
| Global cybersecurity governance and legal harmonization | Creation of international standards and cooperative response frameworks | Stronger multinational coordination and faster response to cross-border threats |
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.