Neuro-Symbolic AI for Cybersecurity: State of the Art, Challenges, and Opportunities
Pith reviewed 2026-05-18 18:00 UTC · model grok-4.3
The pith
Neuro-symbolic AI combines learning with logical reasoning to outperform single-method approaches in cybersecurity tasks.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper establishes that deeper neuro-symbolic integration, especially via multi-agent and structured architectures, produces measurable gains in capability across cybersecurity domains, with causal reasoning enabling proactive rather than reactive defenses and knowledge-guided learning improving efficiency and transparency, while a dual-use review reveals autonomous offensive systems already achieving zero-day exploitation at lower cost.
What carries the argument
Three-tier taxonomy of deep integration, structured interaction, and contextual baselines, together with the Grounding-Instructibility-Alignment analytical lens.
If this is right
- Multi-agent architectures will be required for effective handling of complex, multi-stage cyber threats.
- Causal reasoning will shift defenses from correlation-based detection to proactive identification of attack chains.
- Knowledge-guided learning will lower data requirements while raising the explainability of security decisions.
- Integration depth will continue to correlate with capability improvements across intrusion detection, malware analysis, and penetration testing.
- Autonomous offensive capabilities will advance rapidly, increasing the urgency of defensive alignment measures.
Where Pith is reading between the lines
- The same integration patterns may transfer to other safety-critical domains such as autonomous systems or medical diagnostics where both pattern recognition and rule-based verification are needed.
- Standardized benchmarks proposed in the roadmap could be tested first in open-source intrusion-detection environments to measure real deployment gains.
- The dual-use findings imply that any public release of neuro-symbolic penetration tools should include built-in monitoring for misuse indicators.
Load-bearing premise
The 103 publications selected through April 2026 represent the full neuro-symbolic AI for cybersecurity literature without major selection or categorization bias.
What would settle it
A later survey that re-samples the literature with different inclusion criteria and finds no consistent performance edge for multi-agent or structured-integration architectures over single-agent baselines.
Figures
read the original abstract
Cybersecurity demands both rapid pattern recognition and deliberative reasoning, yet purely neural or purely symbolic approaches each address only one side of this duality. Neuro-Symbolic (NeSy) AI bridges this gap by integrating learning and logic within a unified framework. This systematic review analyzes 103 publications across the neural-symbolic integration spectrum in cybersecurity through April 2026, organizing them via a three-tier taxonomy -- deep integration, structured interaction, and contextual baselines -- and a Grounding-Instructibility-Alignment (G-I-A) analytical lens. We find that multi-agent and structured-integration architectures across the surveyed spectrum substantially outperform single-agent approaches in complex scenarios, causal reasoning enables proactive defense beyond correlation-based detection, and knowledge-guided learning improves both data efficiency and explainability. These findings span intrusion detection, malware analysis, vulnerability discovery, and autonomous penetration testing, revealing that integration depth often correlates with capability gains across domains. A first-of-its-kind dual-use analysis further shows that autonomous offensive systems in the broader survey corpus are already achieving notable zero-day exploitation success at significantly reduced cost, fundamentally reshaping threat landscapes. However, critical barriers persist: evaluation standardization remains nascent, computational costs constrain deployment, and effective human-AI collaboration is underexplored. We distill these findings into a prioritized research roadmap emphasizing community-driven benchmarks, responsible development practices, and defensive alignment to guide the next generation of NeSy cybersecurity systems.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper is a systematic review synthesizing 103 publications on neuro-symbolic AI for cybersecurity through April 2026. It introduces a three-tier taxonomy (deep integration, structured interaction, contextual baselines) and a Grounding-Instructibility-Alignment (G-I-A) lens to organize the literature across domains including intrusion detection, malware analysis, vulnerability discovery, and penetration testing. Central findings are that multi-agent and structured-integration approaches substantially outperform single-agent ones in complex scenarios, causal reasoning supports proactive defense, and knowledge-guided learning boosts data efficiency and explainability; a dual-use analysis highlights offensive zero-day capabilities, while noting barriers such as nascent evaluation standardization and proposing a research roadmap.
Significance. If the comparative synthesis holds after addressing evidence gaps, the work offers a timely organizing framework and prioritized roadmap for an emerging interdisciplinary area, potentially accelerating responsible integration of neural and symbolic methods in cybersecurity while flagging dual-use risks.
major comments (2)
- [Abstract] Abstract: The load-bearing claim that 'multi-agent and structured-integration architectures across the surveyed spectrum substantially outperform single-agent approaches in complex scenarios' (and parallel claims for causal reasoning and knowledge-guided learning) relies on cross-paper comparisons. However, the abstract itself states that 'evaluation standardization remains nascent' as a critical barrier, with no mention of explicit normalization, meta-regression, or restriction to shared benchmarks across the 103 works. This leaves open the possibility that observed differences arise from dataset choice, threat models, or metric selection rather than integration depth, directly weakening the inference from the three-tier taxonomy to capability gains.
- [Taxonomy and G-I-A lens sections] Taxonomy and G-I-A lens sections: The three-tier taxonomy plus G-I-A framework is presented as an unbiased and complete organizing structure, yet the abstract provides no quantitative details on selection criteria, inclusion/exclusion rules, or inter-rater reliability for categorizing the 103 publications. Without these, the representativeness assumption (that the corpus captures the full literature without significant selection or categorization bias) cannot be evaluated, undermining the generalizability of the performance and dual-use findings.
minor comments (2)
- [Abstract] Abstract: The cutoff date 'April 2026' is forward-looking relative to the arXiv identifier; clarify whether this reflects a projected search or requires updating.
- [References] Throughout: Ensure every one of the 103 surveyed works receives a clear citation in the reference list so readers can independently verify the synthesis and taxonomy assignments.
Simulated Author's Rebuttal
We thank the referee for these constructive comments on our systematic review. They correctly identify areas where the abstract could better qualify our synthesis claims and provide transparency on review methods. We respond to each point below and indicate planned revisions.
read point-by-point responses
-
Referee: [Abstract] Abstract: The load-bearing claim that 'multi-agent and structured-integration architectures across the surveyed spectrum substantially outperform single-agent approaches in complex scenarios' (and parallel claims for causal reasoning and knowledge-guided learning) relies on cross-paper comparisons. However, the abstract itself states that 'evaluation standardization remains nascent' as a critical barrier, with no mention of explicit normalization, meta-regression, or restriction to shared benchmarks across the 103 works. This leaves open the possibility that observed differences arise from dataset choice, threat models, or metric selection rather than integration depth, directly weakening the inference from the three-tier taxonomy to capability gains.
Authors: We agree that the nascent state of evaluation standardization limits the strength of cross-paper inferences, as we already note in the barriers discussion. Our abstract claims summarize observed trends reported across the primary studies rather than claiming meta-analytic rigor. We will revise the abstract to qualify the statements as 'synthesized trends from the surveyed literature, subject to the limitations of heterogeneous benchmarks' and will add an explicit caveat in the results section about potential confounding by dataset and metric choices. This change will be incorporated in the revised manuscript. revision: yes
-
Referee: [Taxonomy and G-I-A lens sections] Taxonomy and G-I-A lens sections: The three-tier taxonomy plus G-I-A framework is presented as an unbiased and complete organizing structure, yet the abstract provides no quantitative details on selection criteria, inclusion/exclusion rules, or inter-rater reliability for categorizing the 103 publications. Without these, the representativeness assumption (that the corpus captures the full literature without significant selection or categorization bias) cannot be evaluated, undermining the generalizability of the performance and dual-use findings.
Authors: The full manuscript contains a Methods section detailing the search strategy, inclusion/exclusion criteria (peer-reviewed works 2015–2026 on NeSy cybersecurity applications), and the process for applying the taxonomy and G-I-A lens. We will add a concise summary of these elements to the abstract for self-containment. However, formal inter-rater reliability statistics were not computed in the original review. revision: partial
- Absence of pre-computed inter-rater reliability metrics for the categorization of the 103 publications
Circularity Check
No circularity: survey synthesizes external literature without internal derivations or self-referential reductions
full rationale
This is a systematic literature review that organizes and summarizes findings from 103 external publications using a three-tier taxonomy and G-I-A lens. No equations, fitted parameters, predictions, or first-principles derivations exist in the provided text. Central claims about multi-agent outperformance, causal reasoning benefits, and knowledge-guided improvements are explicitly framed as observations drawn from the surveyed corpus rather than constructed from the paper's own inputs or self-citations. The acknowledged lack of evaluation standardization is noted as a limitation but does not create a circular reduction; the synthesis remains dependent on independent external sources. No load-bearing step reduces to a self-definition, fitted input renamed as prediction, or author-specific uniqueness theorem.
Axiom & Free-Parameter Ledger
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We introduce a novel Grounding-Instructibility-Alignment (G-I-A) framework... LG-I-A(θ,K) = LN − λG G(θ,K) − λI I(θ,K,H) − λA A(θ,K,O).
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Multi-agent NeSy architectures... Pmulti = Σ αi·Pindividual(ai) + β·Σ Synergy(ai, aj)
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Forward citations
Cited by 1 Pith paper
-
CyberCane: Neuro-Symbolic RAG for Privacy-Preserving Phishing Detection with Formal Ontology Reasoning
Neuro-symbolic RAG framework with formal ontology achieves 78.6-point recall improvement on AI-generated phishing threats while keeping precision above 98% and false positive rate at 0.16% under privacy constraints.
Reference graph
Works this paper leans on
-
[1]
2025 global threat landscape report,
F. FortiGuard Labs, “2025 global threat landscape report,”Technical Report, 2025
work page 2025
-
[2]
Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities,
M. A. Ferrag, F. Alwahedi, A. Battah, B. Cherif, A. Mechri, N. Ti- hanyi, T. Bisztray, and M. Debbah, “Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities,”Internet of Things and Cyber-Physical Systems, vol. 5, pp. 1–46, 2025
work page 2025
-
[3]
When llms meet cybersecurity: A systematic literature review,
J. Zhang, H. Bu, H. Wenet al., “When llms meet cybersecurity: A systematic literature review,”Cybersecurity, vol. 8, p. 55, 2025
work page 2025
-
[4]
From vulnerability to defense: The role of large language models in enhancing cybersecurity,
W. Kasri, Y . Himeur, H. A. Alkhazaleh, S. Tarapiah, S. Atalla, W. Man- soor, and H. Al-Ahmad, “From vulnerability to defense: The role of large language models in enhancing cybersecurity,”Computation, vol. 13, no. 2, p. 30, 2025
work page 2025
-
[5]
Arms race in adversarial malware detection: A survey,
D. Li, Q. Li, Y . F. Ye, and S. Xu, “Arms race in adversarial malware detection: A survey,”ACM Comput. Surv., vol. 55, no. 1, 2023
work page 2023
-
[6]
M. Rodriguez, R. A. Popa, L. Liang, A. Wang, M. Rahtz, A. Kaska- soli, A. Dafoe, and F. Flynn, “A framework for evaluating emerging cyberattack capabilities of ai,”arXiv preprint arXiv:2503.11917, 2025
-
[7]
R. Fang, R. Bindu, A. Gupta, Q. Zhan, and D. Kang, “Teams of llm agents can exploit zero-day vulnerabilities,”arXiv preprint arXiv:2406.01637, 2024
-
[8]
Vulnbot: Autonomous penetration testing for a multi-agent collaborative framework,
H. Kong, D. Hu, J. Ge, L. Li, T. Li, and B. Wu, “Vulnbot: Autonomous penetration testing for a multi-agent collaborative framework,”arXiv preprint arXiv:2501.13411, 2025
-
[9]
Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats,
Z. Chen, J. Liu, Y . Shen, M. Simsek, B. Kantarci, H. T. Mouftah, and P. Djukic, “Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats,”ACM Computing Surveys, vol. 55, no. 5, pp. 105:1–105:37, 2022
work page 2022
-
[10]
From zero-shot machine learning to zero-day attack detection,
M. Sarhan, S. Layeghy, M. Gallagheret al., “From zero-shot machine learning to zero-day attack detection,”International Journal of Infor- mation Security, vol. 22, pp. 947–959, 2023
work page 2023
-
[11]
A review of machine learning-based zero-day attack detection: Challenges and future directions,
Y . Guo, “A review of machine learning-based zero-day attack detection: Challenges and future directions,”Computer Communications, vol. 198, pp. 175–185, 2023
work page 2023
-
[12]
B. Tafreshian and S. Zhang, “A defensive framework against adver- sarial attacks on machine learning-based network intrusion detection systems,” inIEEE TrustCom, 2024, pp. 2436–2441
work page 2024
-
[13]
Constrained network adversarial attacks: Validity, robustness, and transferability,
A. Grini, O. Taheri, B. El Khamlichi, and A. El Fallah-Seghrouchni, “Constrained network adversarial attacks: Validity, robustness, and transferability,”arXiv preprint arXiv:2505.01328, 2025
-
[14]
Adversarial ml threat matrix (atlas),
M. Corporation, L. Wong, K. Manville, and ramtherunner, “Adversarial ml threat matrix (atlas),”Technical Report, 2020
work page 2020
-
[15]
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks,
M. Pawlicki, R. Kozik, and M. Chora ´s, “A survey on neural networks for (cyber-) security and (cyber-) security of neural networks,”Neural Computing and Applications, vol. 500, no. C, pp. 1075–1087, 2022
work page 2022
-
[16]
Neural- symbolic integration and the semantic web,
P. Hitzler, F. Bianchi, M. Ebrahimi, and M. K. Sarker, “Neural- symbolic integration and the semantic web,”Semantic Web, vol. 11, no. 1, pp. 3–11, 2020
work page 2020
-
[17]
Towards data-and knowledge-driven ai: A survey on neuro-symbolic computing,
W. Wang, Y . Yang, and F. Wu, “Towards data-and knowledge-driven ai: A survey on neuro-symbolic computing,”IEEE TPAMI, vol. 47, no. 2, pp. 878–899, 2024
work page 2024
-
[18]
Neuro-symbolic artificial intelligence: A survey,
B. Bhuyan, A. Ramdane-Cherif, R. Tomaret al., “Neuro-symbolic artificial intelligence: A survey,”Neural Computing and Applications, vol. 36, pp. 12 809–12 844, 2024
work page 2024
-
[19]
Neuro-symbolic ai in 2024: A systematic review.arXiv preprint arXiv:2501.05435, 2025
B. C. Colelough and W. Regli, “Neuro-symbolic ai in 2024: A systematic review,”arXiv preprint arXiv:2501.05435, 2025
-
[20]
I. H. Sarker, H. Janicke, A. Mohsin, A. Gill, and L. Maglaras, “Explain- able ai for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects,”ICT Express, vol. 10, no. 4, pp. 935–958, 2024
work page 2024
-
[21]
M. Gaur and A. Sheth, “Building trustworthy neurosymbolic ai sys- tems: Consistency, reliability, explainability, and safety,”AI Magazine, vol. 45, no. 1, pp. 139–155, 2024
work page 2024
-
[22]
Neurosymbolic ai as an antithesis to scaling laws,
A. Velasquez, N. Bhatt, U. Topcu, Z. Wang, K. Sycara, S. Stepputtis, S. Neema, and G. Vallabha, “Neurosymbolic ai as an antithesis to scaling laws,”PNAS Nexus, vol. 4, no. 5, p. pgaf117, 2025
work page 2025
-
[23]
Causal neurosymbolic ai: A syn- ergy between causality and neurosymbolic methods,
U. Jaimini, C. Henson, and A. Sheth, “Causal neurosymbolic ai: A syn- ergy between causality and neurosymbolic methods,”IEEE Intelligent Systems, vol. 39, no. 3, pp. 13–19, 2024
work page 2024
-
[24]
Causality for trustworthy artificial intelligence: Status, challenges and perspectives,
A. Rawal, A. Raglin, D. B. Rawat, B. M. Sadler, and J. McCoy, “Causality for trustworthy artificial intelligence: Status, challenges and perspectives,”ACM Computing Surveys, vol. 57, no. 6, p. 146, 2025
work page 2025
-
[25]
H. Lei, Y . Ge, and Q. Zhu, “Adapt: A game-theoretic and neuro- symbolic framework for automated distributed adaptive penetration testing,” inIEEE MILCOM, 2024
work page 2024
-
[26]
H. Xiong, Z. Wang, X. Li, J. Bian, Z. Xie, S. Mumtaz, and L. E. Barnes, “Converging paradigms: The synergy of symbolic and con- nectionist ai in llm-empowered autonomous agents,”arXiv preprint arXiv:2407.08516, 2024
-
[27]
Prompt injection 2.0: Hybrid ai threats,
J. McHugh, K. ˇSekrst, and J. Cefalu, “Prompt injection 2.0: Hybrid ai threats,”arXiv preprint arXiv:2507.13169, 2025
-
[28]
Ai cyber risk benchmark: Automated exploitation capabilities,
D. Ristea, V . Mavroudis, and C. Hicks, “Ai cyber risk benchmark: Automated exploitation capabilities,”arXiv preprint arXiv:2410.21939, 2024
-
[29]
Cve-bench: A benchmark for ai agents’ ability to exploit real-world web application vulnerabilities,
Y . Zhu, A. Kellermann, D. Bowman, P. Li, A. Gupta, A. Danda, R. Fang, C. Jensen, E. Ihli, J. Benn, J. Geronimo, A. Dhir, S. Rao, K. Yu, T. Stone, and D. Kang, “Cve-bench: A benchmark for ai agents’ ability to exploit real-world web application vulnerabilities,” inICML, 2025
work page 2025
-
[30]
J. Renkhoff, K. Feng, M. Meier-Doernberg, A. Velasquez, and H. H. Song, “A survey on verification and validation, testing and evaluations 37 of neurosymbolic artificial intelligence,”IEEE TAI, vol. 5, no. 8, pp. 3765–3779, 2024
work page 2024
-
[31]
Towards cognitive ai systems: Workload and characterization of neuro-symbolic ai,
Z. Wan, C.-K. Liu, H. Yang, R. Raj, C. Li, H. You, Y . Fu, C. Wan, A. Samajdar, and Y . C. Lin, “Towards cognitive ai systems: Workload and characterization of neuro-symbolic ai,” inIEEE ISPASS, 2024, pp. 268–279
work page 2024
-
[32]
Surveying neuro-symbolic approaches for reliable artificial intelligence of things,
Z. Lu, I. Afridi, H. J. Kang, I. Ruchkin, and X. Zheng, “Surveying neuro-symbolic approaches for reliable artificial intelligence of things,” Journal of Reliable Intelligent Environments, vol. 10, no. 3, pp. 257– 279, 2024
work page 2024
-
[33]
Neuro-symbolic ai for military applications,
D. H. Hagos and D. B. Rawat, “Neuro-symbolic ai for military applications,”IEEE TAI, vol. 5, no. 12, pp. 6012–6026, 2024
work page 2024
-
[34]
Mitre att&ck: State of the art and way forward,
B. Al-Sada, A. Sadighian, and G. Oligeri, “Mitre att&ck: State of the art and way forward,”ACM Computing Surveys, vol. 57, no. 1, pp. 12:1–12:37, 2024
work page 2024
-
[35]
Mitre att&ck labeling of cyber threat intelligence via llm,
T. O’Brien, “Mitre att&ck labeling of cyber threat intelligence via llm,” Technical Report, 2025
work page 2025
-
[36]
A survey on cybersecurity knowledge graph construction,
X. Zhao, R. Jiang, Y . Han, A. Li, and Z. Peng, “A survey on cybersecurity knowledge graph construction,”Computers & Security, vol. 136, p. 103524, 2024
work page 2024
-
[37]
H. Alharbi, A. Hur, H. Alkahtani, and H. F. Ahmad, “Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources,”PeerJ Computer Science, vol. 11, p. e2768, 2025
work page 2025
-
[38]
Crucialg: Reconstruct integrated attack scenario graphs by cyber threat intelligence reports,
W. Cheng, T. Zhu, T. Chen, Q. Yuan, J. Ying, H. Li, C. Xiong, M. Li, M. Lv, and Y . Chen, “Crucialg: Reconstruct integrated attack scenario graphs by cyber threat intelligence reports,”IEEE TDSC, pp. 1–17, 2025
work page 2025
-
[39]
Scientific procedures and rationales for systematic literature reviews (spar-4-slr),
J. Paul, W. M. Lim, A. O’Cass, A. W. Hao, and S. Bresciani, “Scientific procedures and rationales for systematic literature reviews (spar-4-slr),” International Journal of Consumer Studies, vol. 45, no. 4, pp. O1–O14, 2021
work page 2021
-
[40]
Anthropomorphism and consumer behaviour: A spar-4-slr protocol compliant hybrid review,
F. M. Khan, M. Anas, and S. M. F. Uddin, “Anthropomorphism and consumer behaviour: A spar-4-slr protocol compliant hybrid review,” International Journal of Consumer Studies, 2023
work page 2023
-
[41]
From statistical relational to neurosymbolic artificial intelligence: A survey,
G. Marra, S. Duman ˇci´c, R. Manhaeve, and L. De Raedt, “From statistical relational to neurosymbolic artificial intelligence: A survey,” Artificial Intelligence, vol. 328, p. 104062, 2024
work page 2024
-
[42]
Logicity: Advancing neuro-symbolic ai with abstract urban simulation,
B. Li, Z. Li, Q. Du, J. Luo, W. Wang, Y . Xie, S. Stepputtis, C. Wang, K. Sycara, P. Ravikumaret al., “Logicity: Advancing neuro-symbolic ai with abstract urban simulation,”NeurIPS, vol. 37, pp. 69 840–69 864, 2024
work page 2024
-
[43]
S. Neupane, J. Ables, W. Anderson, S. Mittal, S. Rahimi, and I. Ban- icescu, “Explainable intrusion detection systems (x-ids): A survey of current methods, challenges, and opportunities,”IEEE Access, vol. 10, pp. 112 392–112 415, 2022
work page 2022
-
[44]
D. Onchis, C. Istin, and E. Hogea, “A neuro-symbolic classifier with optimized satisfiability for monitoring security alerts in network traffic,” Applied Sciences, vol. 12, no. 22, p. 11502, 2022
work page 2022
-
[45]
Managing concept drift in online intrusion detection systems with active learning,
F. Camarda, A. De Paola, S. Drago, P. Ferraro, and G. Lo Re, “Managing concept drift in online intrusion detection systems with active learning,” inCEUR Workshop, vol. 3962, 2025
work page 2025
-
[46]
Dimensions of Neural-symbolic Integration - A Structured Survey
S. Bader and P. Hitzler, “Dimensions of neural-symbolic integration: A structured survey,”arXiv preprint arXiv:cs/0511042, 2005
work page internal anchor Pith review Pith/arXiv arXiv 2005
-
[47]
Neural-symbolic learning and reasoning: A survey and interpretation,
T. R. Besold, A. d’Avila Garcez, S. Bader, H. Bowman, P. Domingos, P. Hitzler, K.-U. K¨uhnberger, P. M. V . Lima, L. de Penning, G. Pinkas, H. Poon, and G. Zaverucha, “Neural-symbolic learning and reasoning: A survey and interpretation,” inNeuro-Symbolic AI, 2021, pp. 1–51
work page 2021
-
[48]
Neuro symbolic reasoning and learning,
P. Shakarian, G. I. Simari, C. Baral, B. Xi, and L. Pokala, “Neuro symbolic reasoning and learning,”Book, 2023
work page 2023
-
[49]
Handbook on neurosymbolic ai and knowledge graphs,
P. Hitzler, A. Dalal, M. S. Mahdavinejad, and S. S. Norouzi, “Handbook on neurosymbolic ai and knowledge graphs,”Book, 2025
work page 2025
-
[50]
The role of foundation models in neuro-symbolic learning and reasoning,
D. Cunnington, M. Law, J. Lobo, and A. Russo, “The role of foundation models in neuro-symbolic learning and reasoning,” inNeSy, 2024, pp. 84–100
work page 2024
-
[51]
Neuro-symbolic methods for trustworthy ai: A systematic review,
C. Michel-Del ´etie and M. K. Sarker, “Neuro-symbolic methods for trustworthy ai: A systematic review,”Neurosymbolic Artificial Intelli- gence, 2024
work page 2024
-
[52]
Knowgraph: Knowledge-enabled anomaly detection via logical reasoning on graph data,
A. Zhou, X. Xu, R. Raghunathan, A. Lal, X. Guan, B. Yu, and B. Li, “Knowgraph: Knowledge-enabled anomaly detection via logical reasoning on graph data,” inACM CCS, 2024, pp. 168–182
work page 2024
-
[53]
Hierarchical multi-agent reinforcement learning for cyber network defense,
A. V . Singh, E. Rathbun, E. Graham, L. Oakley, S. Boboila, A. Oprea, and P. Chin, “Hierarchical multi-agent reinforcement learning for cyber network defense,”arXiv preprint arXiv:2410.17351, 2024
-
[54]
On the use of neurosymbolic ai for defending against cyber attacks,
G. Grov, J. Halvorsen, M. W. Eckhoff, B. J. Hansen, M. Eian, and V . Mavroeidis, “On the use of neurosymbolic ai for defending against cyber attacks,” inNeural-Symbolic Learning and Reasoning, 2024, pp. 119–140
work page 2024
-
[55]
C. S. Kalutharage, X. Liu, and C. Chrysoulas, “Neurosymbolic learning and domain knowledge-driven explainable ai for enhanced iot network attack detection and response,”Computers & Security, vol. 151, p. 104318, 2025
work page 2025
-
[56]
Grounding methods for neural-symbolic ai,
R. C. Ontiveros, F. Giannini, M. Gori, G. Marra, and M. Dili- genti, “Grounding methods for neural-symbolic ai,”arXiv preprint arXiv:2507.08216, 2025
-
[57]
Softened symbol grounding for neuro-symbolic systems,
Z. Li, Y . Yao, T. Chen, J. Xu, C. Cao, X. Ma, and J. L ¨u, “Softened symbol grounding for neuro-symbolic systems,” inICLR, 2023
work page 2023
-
[58]
Can causal (and counterfac- tual) reasoning improve privacy threat modelling?
R. Naidu and N. Kagalwalla, “Can causal (and counterfac- tual) reasoning improve privacy threat modelling?”arXiv preprint arXiv:2207.09746, 2022
-
[59]
H. T. T. Tran, J. Sander, A. Cohen, B. Jalaian, and N. D. Bas- tian, “Neurosymbolic artificial intelligence for robust network intru- sion detection: From scratch to transfer learning,”arXiv preprint arXiv:2506.04454, 2025
-
[60]
Ltl verification of mem- oryful neural agents,
M. Hosseini, A. Lomuscio, and N. Paoletti, “Ltl verification of mem- oryful neural agents,” inAAMAS, 2025
work page 2025
-
[61]
Z. Liu, H. Li, J. Lu, G. Ma, X. Hong, G. Iacca, A. Kumar, S. Tang, and L. Wang, “Nature’s insight: A novel framework and comprehensive analysis of agentic reasoning through the lens of neuroscience,”arXiv preprint arXiv:2505.05515, 2025
-
[62]
End-to-end neuro-symbolic reinforcement learning with textual explanations,
L. Luo, G. Zhang, H. Xu, Y . Yang, C. Fang, and Q. Li, “End-to-end neuro-symbolic reinforcement learning with textual explanations,” in ICML, 2024, pp. 33 533–33 557
work page 2024
-
[63]
Out-of-distribution detection for neurosymbolic autonomous cyber agents,
A. Samaddar, N. Potteiger, and X. Koutsoukos, “Out-of-distribution detection for neurosymbolic autonomous cyber agents,” inIEEE ICAIC, 2025
work page 2025
-
[64]
Knowledge-enhanced neurosymbolic artificial intelligence for cyber- security and privacy,
A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, “Knowledge-enhanced neurosymbolic artificial intelligence for cyber- security and privacy,”IEEE IC, vol. 27, no. 5, pp. 43–48, 2023
work page 2023
-
[65]
L. Zhang, Q. Zhu, H. Ray, and Y . Xie, “Improving network threat detection by knowledge graph, large language model, and imbalanced learning,”arXiv preprint arXiv:2501.16393, 2025
-
[66]
Building a cybersecurity knowledge graph with cybergraph,
P. Falcarin and F. Dainese, “Building a cybersecurity knowledge graph with cybergraph,” inACM/IEEE EnCyCriS, 2024, pp. 29–36
work page 2024
-
[67]
Cybersecurity knowledge graphs,
L. F. Sikos, “Cybersecurity knowledge graphs,”Knowledge and Infor- mation Systems, vol. 65, no. 9, pp. 3511–3531, 2023
work page 2023
-
[68]
A synergistic approach in network intrusion detection by neurosymbolic ai,
A. Bizzarri, C.-E. Yu, B. Jalaian, F. Riguzzi, and N. D. Bastian, “A synergistic approach in network intrusion detection by neurosymbolic ai,”arXiv preprint arXiv:2406.00938, 2024
-
[69]
Am- pere: Amr-aware prefix for generation-based event argument extraction model,
I.-H. Hsu, Z. Xie, K.-H. Huang, P. Natarajan, and N. Peng, “Am- pere: Amr-aware prefix for generation-based event argument extraction model,”arXiv preprint arXiv:2305.16734, 2023
-
[70]
Neurosymbolic ai for reasoning over knowledge graphs: A survey,
L. N. DeLong, R. F. Mir, and J. D. Fleuriot, “Neurosymbolic ai for reasoning over knowledge graphs: A survey,”IEEE TNNLS, vol. 36, no. 5, pp. 7822–7842, 2024
work page 2024
-
[71]
Knowledge graph reasoning for cyber attack detection,
E. Gilliard, J. Liu, and A. A. Aliyu, “Knowledge graph reasoning for cyber attack detection,”IET Communications, vol. 18, no. 4, pp. 297– 308, 2024
work page 2024
-
[72]
G. Liu, K. Lu, and S. Pi, “Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining,”PeerJ Computer Science, vol. 11, p. e2769, 2025
work page 2025
-
[73]
Actionable cyber threat intelligence using knowledge graphs and large language models,
R. Fieblinger, M. T. Alam, and N. Rastogi, “Actionable cyber threat intelligence using knowledge graphs and large language models,” in IEEE EuroS&PW, 2024, pp. 100–111
work page 2024
-
[74]
Learning guided automated reasoning: A brief survey,
L. Blaauwbroeket al., “Learning guided automated reasoning: A brief survey,” inLogics and Type Systems in Theory and Practice, 2024, pp. 71–92
work page 2024
-
[75]
First experiments with neural cvc5,
J. Piepenbrock, M. Janota, J. Urban, and J. Jakub ˚uv, “First experiments with neural cvc5,” inEPiC Series in Computing, vol. 100, 2023, pp. 249–264
work page 2023
-
[76]
Graph2tac: Online representation learning of formal math concepts,
L. Blaauwbroek, M. Ol ˇs´ak, J. Rute, F. I. S. Massolo, J. Piepenbrock, and V . Pestun, “Graph2tac: Online representation learning of formal math concepts,” inICML, 2024
work page 2024
-
[77]
Nesyc: A neuro- symbolic continual learner for complex embodied tasks in open do- mains,
W. Choi, J. Park, S. Ahn, D. Lee, and H. Woo, “Nesyc: A neuro- symbolic continual learner for complex embodied tasks in open do- mains,” inICLR, 2025
work page 2025
-
[78]
Learning neuro-symbolic relational transition models for bilevel planning,
R. Chitnis, T. Silver, J. B. Tenenbaum, T. Lozano-P ´erez, and L. P. Kaelbling, “Learning neuro-symbolic relational transition models for bilevel planning,” inIEEE IROS, 2022, pp. 4166–4173
work page 2022
-
[79]
Hierarchical multi- agent reinforcement learning for autonomous cyber defense in coalition networks,
T. H ¨urten, J. F. Loevenich, F. Spelter, E. Adler, J. Braun, L. Moxon, Y . Gourlet, T. Lefeuvre, and R. R. F. Lopes, “Hierarchical multi- agent reinforcement learning for autonomous cyber defense in coalition networks,” inIEEE MILCOM, 2024, pp. 176–181. 38
work page 2024
-
[80]
A neuro- symbolic artificial intelligence network intrusion detection system,
A. Bizzarri, B. Jalaian, F. Riguzzi, and N. D. Bastian, “A neuro- symbolic artificial intelligence network intrusion detection system,” in IEEE ICCCN, 2024, pp. 1–9
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.