<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Future Cybersecurity Landscape Exploration with CAX in the Age of AI</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Zlatogor Minchev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of ICT, Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 25A, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematics &amp; Informatics, Bulgarian Academy of Sciences</institution>
          ,
          <addr-line>Acad. Georgi Bonchev Str., Bl. 8, Sofia, 1113</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Provisional understanding of the future cybersecurity landscape in the new age of AI is a quite challenging task due to multiple dynamic socio-technological factors. However, with the progressive development of AI technologies, the task becomes even more complex, joining both human and machine intelligence, while having diferent evolutionary levels of maturing. The study outlines an almost 10-year efort (since 2015) for a successful cybersecurity landscape predictive outlining with progressive identification of future socio-technological transcendents (threats, challenges, opportunities, etc.), implementing Computer Assisted eXercises (CAX) in the loop. Additionally, some generative AI elements have been recently added, trying to achieve an extended holistic analytical framework with a flexible and futuristic scenario-based exploration context. Both machine and human multimodal feedbacks have been successfully implemented in the study, bringing out a comprehensive enough monitoring &amp; quantitative assessment of the future cyberspace evolution with the new age of AI immersion in our new extended reality of living, joining both humans and machines in a new symbiotic human-machine ecosystem.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cybersecurity</kwd>
        <kwd>CAX</kwd>
        <kwd>AI</kwd>
        <kwd>Socio-technological dynamics</kwd>
        <kwd>Symbiotic human-machine ecosystem</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Getting provisional knowledge about the future has always been a dream of human civilization. With
the fast technological development of the new 21st digital century the AI technologies are already
entering our new socio-technological reality, transforming it in an unprecedented manner [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. The
new digitally extended &amp; mixed world is getting more and more smart and this tendency is even expected
to take an autonomous character with the not so far future of 15 years ahead with sentient &amp; General AI
[
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. We are already living in the “Age of AI” [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] mostly due to deep learning &amp; generative AI solutions
presently accessed via (4G/5G mobile, wireless &amp; satellite) with smart wearable IoTs &amp; cloud services.
The dreams of a joint human-machine symbiotic existence in the Society 5.0 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] is already evolving
towards Society 6.0 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The last could significantly afect the future socio-technological dynamics due
to potential domination of AI or at least dependable need of AI, due to the necessity of multiple data
sources huge volume and ultrahigh speed of processing and handling towards knowledge analytical
production for both humans and machines.
      </p>
      <p>However, successful exploration of the future digital societies organizational concepts is becoming
quite challenging due to multiple unknown issues. Apart of all these facts the future cybersecurity
landscape is also evolving, whilst expected to be successfully handled with the AI assistance (though the
idea could be somewhat arguable) either completely dominated with the autonomization of
machine-tomachine &amp; machine-to-human communications.</p>
      <p>Successful identification of these cybersecurity perspectives (threats, challenges, opportunities,
divides, etc., called in brief “transcendents”) could significantly benefit with the joint human-machine
intellect analytical &amp; validation mixing.</p>
      <p>Further in the paper, an ad-hoc exploration framework successful implementations within the last
10-15 years will be given, providing also a further comprehensive viewpoint for the near future towards
2037, i.e. giving similar perspective ahead.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Exploration Framework</title>
      <p>
        The presented framework hereafter is generalizing some of the methodological approaches, outlined in [
        <xref ref-type="bibr" rid="ref4 ref8 ref9">4,
8, 9</xref>
        ], but accentuate on three diferent outlooks to the problem at hand – future cybersecurity landscape
multiaspect exploration via Computer Assisted eXercises – CAX [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. As far as this incorporates live,
virtual &amp; constructive simulations, together with some computational and analytical eforts the three
diferent outlooks (Analytical, Simulated &amp; Mixed) have been chosen as a comprehensive enough
combination with practically proven results for proactive exploration studies.
      </p>
      <p>More details on the presented framework, regarding diferent outlooks for cybersecurity future
landscape exploration will be given within the next section of the present work.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Implementation Details</title>
      <p>In this section the triplet of analytical, simulated &amp; mixed outlooks (see Fig. 1) to the future cybersecurity
landscape exploration will be given in detail with selected illustrative practical examples.</p>
      <sec id="sec-3-1">
        <title>3.1. Analytical Outlook</title>
        <p>
          This exploration outlook combines both morphological &amp; system analysis, while mostly relying on
expert support, thus having a somewhat subjective nature in general. In brief, the analytical part relies
on well-known techniques for unstructured data processing like "morphological analysis" that are
modified with the idea to tailor future uncertainties and establish a scenario pool of plausible and
implausible combinations in a discrete software environment, while handling uncertainty [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Further,
the results are used for deeper system-of-systems modelling and assessment towards the future, adding
causality and achieving a holistic system overview. Selected examples with this section could be outlined
with CYREX 2018 &amp; CYREX 2023, considering the future smart homes &amp; smart cities with further
system sensitivity analysis and prognostic findings.
        </p>
        <p>Both studies clearly outline aggregated future trends for AI autonomization and mixing with
infrastructure, producing numerous smart services. Apart of this, future people are also transforming with
AI-assisted capabilities, concerning future homes and cities. This however has a dual nature establishing
at the same time a smart cyber security landscape with dual ofensive and defensive roles for both
humans &amp; machines. Though sounding quite sci-fi-oriented these findings are already getting visibility
with AI progressive implementations. So, some further results’ dynamic assessments, adding machine
algorithms intelligence together with the human ones will be presented next.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Simulated Outlook</title>
        <p>
          Being somehow static the outlined analytical findings in Section 3.1 are explored also dynamically
taking in to account the ideas from [13, 14]. In brief, the accomplished ideas could be aggregated on each
of the system model relations with an S-shaped probabilistic exploration. The last is approximated using
Quasi-Monte Carlo scenario-based integration within the four stages (assuming the Kondratiev’s society
dynamics assumptions) of evolution [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Whilst this approach is quite useful, some unexpected events
as transitional jumps (to mark COVID-19 or other unexpected man-made either natural cataclysms)
have been recently added, taking the quantum tunneling ideas practical use, assuring simulation of
interstages jumps [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Mixed Outlook</title>
        <p>The organization of this stage is quite complex as it combines both (i) messages exchanged amongst the
CAX participants (following an agent-based multirole architecture), together with their (ii) engagement
&amp; response assessment within the training process (measured by a battery of psycho &amp; biometrics).
Additionally, with the progressive development of AI, (iii) generative &amp; indexing smart tools have been
also recently implemented from a machine perspective. Social verification (because of the prognostic
nature of the task) is also applicable via diferent events like workshops, summer schools, conferences,
etc. (see e.g. [17]) Some recent illustrations of the above-mentioned mixed outlook, taking the CYREX
2024 organization [18], extended reality verification mini-lab (with heart rate, respiration, GSR set
dynamics with HTC VIVE XR Elite &amp; Bitalino/Plux wearable biomonitoring box, i.e. and IoT device)
and joint human-machine multicriteria assessment, following the experience with [16], but adding also
ChatGPT generative AI feedback are given below.</p>
        <p>What is important to note here is the presence of AI within this mixed outlook stage. This actually
should be taken with the assumption for human extensive control. In any case, it is important to
note that both AI-generated scenarios (for CYREX 2024 &amp; the Society 6.0 context, by Invideo AI)
demonstrate constant striving algorithmic subjectiveness towards machine domination. It should be
noted that the AI-observed data was taken completely from human recent discussions during “Digital
Transformation in the Age of AI” training at SRS’2024 [19]. Apart of these, the event assessment amongst
the participants and via AI was also somewhat challenging as the machine-generated responses have a
diferent, autonomous viewpoint, even with exclusive human interests’ context requesting.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>Properly understanding the future cybersecurity landscape certainly requires a complex outlook from
both static and dynamic analytical perspectives. In this sense however, it is extremely important to
note the role of AI that if it becomes out of control could find a dominant position, especially with
the generation of completely unknown, or very uncommon new cyber threats, either inclined
feedback results. Luckily, the process is still dominated by the human intellect and could be significantly
supported with AI assistance that has no-dominative behavior, i.e. semiautonomous AI, and completely
takes the human beings leading decision-making &amp; responsibility position. Whether this position is
right or wrong is a really philosophical moment that from a technical perspective has no particular
meaning, at least for the present technological level of our new digital society aiming for joint symbiotic
human-machine co-existence.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>The study is granting special appreciation for the extended reality mini-lab establishment and further
exploration funding support to the National Scientific Programme “Security &amp; Defense”. Additional
gratitude for the international expert support is given to EDIH Trakia &amp; the initiative “Securing Digital
Future 21” with more than sixty countries now, spread around the world, https://securedfuture21.org/.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The author has not employed any Generative AI tools.
[13] K. R. Dark, The waves of time: long-term change and international relations, Bloomsbury
Publishing, 2016.
[14] D. Meadows, J. Randers, D. Meadows, A synopsis: Limits to growth: The 30-year update, Estados</p>
      <p>Unidos: Chelsea Green Publishing Company 381 (2004).
[15] Z. Minchev, Malicious future of ai: transcendents in the digital age, in: The 12th International</p>
      <p>Conference on Business Information Security (BISEC-2021), 2021, pp. 18–22.
[16] Z. M. Minchev, L. Boyanov, Future of smart cities security challenges – proactive modelling &amp;
identification, in: The 14th International Conference on Business Information Security
(BISEC2023), 2024, pp. 12–17.
[17] Web Forum Initiative, Secure digital future 21, 2024. URL: https://securedfuture21.org/.
[18] CYREX 2024, Cyber research exercise 2024, 2024. URL: https://securedfuture21.org/cyrex_2024/
cyrex_2024.html.
[19] Digital Transformation in the Age of AI, Video Report, SRS’2024, Varna, Bulgaria, 2024. URL:
https://youtu.be/xnXkrPkgrDQ.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Leonhard</surname>
          </string-name>
          ,
          <article-title>Technology vs</article-title>
          . Humanity:
          <article-title>The coming clash between man and machine</article-title>
          ,
          <source>FutureScapes Lodge</source>
          , UK,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Harari</surname>
          </string-name>
          ,
          <article-title>Nexus: A brief history of information networks from the stone age to AI</article-title>
          , Signal,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kurzweil</surname>
          </string-name>
          ,
          <article-title>The singularity is nearer: When we merge with AI</article-title>
          , Penguin,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          , et al.,
          <article-title>Digital transformation in the post-information age</article-title>
          ,
          <source>Institute of ICT, Bulgarian Academy of Sciences &amp; Softtrade</source>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Kissinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Huttenlocher</surname>
          </string-name>
          ,
          <article-title>The age of AI: and our human future</article-title>
          ,
          <string-name>
            <surname>Hachette</surname>
            <given-names>UK</given-names>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wahlers</surname>
          </string-name>
          ,
          <source>The Digital Future</source>
          ,
          <volume>1</volume>
          ,
          <string-name>
            <given-names>International</given-names>
            <surname>Reports</surname>
          </string-name>
          , Konrad Adenauer Stiftung,
          <year>2018</year>
          . URL: https://goo.gl/8CLcvn.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bousri</surname>
          </string-name>
          ,
          <source>Embracing society 6</source>
          .
          <article-title>0: A technological renaissance for human living and economies, 2023</article-title>
          . URL: https://www.linkedin.com/pulse/ embracing-society-60
          <string-name>
            <surname>-</surname>
          </string-name>
          technological
          <article-title>-renaissance-human-living-bousri-1f/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Boyanov</surname>
          </string-name>
          , et al.,
          <article-title>Future digital society resilience in the informational age</article-title>
          , Sofia: SoftTrade &amp; Institute of ICT, Bulgarian Academy of Sciences (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <article-title>Proactive identification of future cyber threats</article-title>
          .,
          <source>in: BISEC</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Minchev</surname>
          </string-name>
          ,
          <article-title>Human factor role for cyber threats resilience</article-title>
          ,
          <source>in: Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, IGI global</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>377</fpage>
          -
          <lpage>402</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>[11] CYREX</source>
          <year>2018</year>
          , Cyber research exercise
          <year>2018</year>
          ,
          <year>2018</year>
          . URL: https://securedfuture21.org/cyrex_2018/ cyrex_2018.html.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[12] CYREX</source>
          <year>2023</year>
          , Cyber research exercise 2023 - clip,
          <year>2023</year>
          . URL: https://youtu.be/m7mTfvtmtFc.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>