Kazi Kutubuddin Sayyad Liyakat,
- Professor and Head, Department of Electronics and Telecommunication Engineering, Brahmdevdada Mane Institute of Technology, Solapur, Maharashtra, India
Abstract
The digital landscape is a battlefield of escalating complexity, where the volume, velocity, and sophistication of cyber threats have exponentially outpaced human-centric defense models. Traditional rule-based security systems and siloed artificial intelligence (AI) solutions, while valuable, are increasingly brittle, overwhelmed by zero-day exploits, polymorphic malware, and coordinated, state-sponsored campaigns that operate in the shadows of big data. This paper posits that the paradigm of cybersecurity must fundamentally shift from one of automated reaction to one of cognizant anticipation. We introduce and explore the framework of hybrid intelligence (HI) as the cornerstone of next-generation cyber defense. HI is not merely a tool but a synergistic partnership, a fusion of the computational prowess and pattern recognition capabilities of AI with the nuanced understanding, ethical reasoning, and creative problem solving of human intelligence. This abstract outline a future where AI algorithms, trained on global threat telemetry, perform lightning-fast triage and anomaly detection at a scale impossible for humans, while human analysts are elevated to strategic overseers: interpreting context, managing escalation, and authorizing nuanced responses. It is within this collaborative loop, machine speed with human wisdom, that we can construct a cyber-immune system: adaptive, resilient, and inherently intelligent.
Keywords: Hybrid intelligence, cybersecurity, artificial intelligence, human intelligence, threat detection
[This article belongs to International Journal of Wireless Security and Networks ]
Kazi Kutubuddin Sayyad Liyakat. Hybrid Intelligence in Cyber Security: A Study. International Journal of Wireless Security and Networks. 2026; 04(01):01-09.
Kazi Kutubuddin Sayyad Liyakat. Hybrid Intelligence in Cyber Security: A Study. International Journal of Wireless Security and Networks. 2026; 04(01):01-09. Available from: https://journals.stmjournals.com/ijwsn/article=2026/view=237510
References
- Sauer CR, Burggräf P. Hybrid intelligence – systematic approach and framework to determine the level of human-AI collaboration for production management use cases. Prod Eng. 2025;19(3):525–541. doi:10.1007/s11740-024-01326-7.
- Jayalath H, Yassin G, Ramaswamy L, Li S. Continual optimization of in-production machine learning systems through semantic analysis of user feedback. In: Rocha AP, Steels L, van den Herik J, editors. Proceedings of the 15th International Conference on Agents and Artificial Intelligence (ICAART); 2023 Feb 22–24; Lisbon, Portugal. Setúbal (Portugal): Science and Technology Publications, Lda (SCITEPRESS); 2023. p. 285–292. doi:10.5220/0011660300003393.
- Forest JJ. Management discipline: defining a process safety strategy. Process Saf Prog. 2014;33:162–165. doi:10.1002/prs.11642.
- Burger M, Nitsche AM, Arlinghaus J. Hybrid intelligence in procurement: disillusionment with AI’s superiority? Comput Ind. 2023;150:103946. doi:10.1016/j.compind.2023.103946.
- Liyakat KKS. Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks. In: Udgata SK, Sethi S, Gao XZ, editors. Intelligent systems. Proceedings of the 3rd International Conference on Machine Learning, IoT and Big Data (ICMIB 2023). Lecture Notes in Networks and Systems. Singapore: Springer Nature Singapore; 2024.
- Jarrahi MH, Lutz C, Newlands G. Artificial intelligence, human intelligence and hybrid intelligence based on mutual augmentation. Big Data Soc. 2022;9. doi:10.1177/20539517221142824.
- Liu Y, Fu Z. Hybrid intelligence: design for sustainable multiverse via integrative cognitive creation model through human–computer collaboration. Appl Sci. 2024;14(11):4662. doi:10.3390/app14114662.
- Kazi KSL. KK approach to increase resilience in Internet of Things: a T-cell security concept. In: Darwish D, Charan K, editors. Analyzing Privacy and Security Difficulties in Social Media: New Challenges and Solutions. Hershey (PA): IGI Global Scientific Publishing; 2025. p. 87–120. doi:10.4018/979-8-3693-9491-5.ch005.
- Abdelghani W, Zayani CA, Amous I, Sèdes F. Trust evaluation model for attack detection in social Internet of Things. In: Proceedings of the 13th International Conference on Risks and Security of Internet and Systems (CRiSIS); 2018 Oct; Arcachon, France. Cham: Springer; 2018. p. 48–64. doi:10.1007/978-3-030-12143-3_5.
- Mehta M, Patel KA. Enhancing IoT security: a machine learning approach to predicting anomalies in network traffic. In: Manoharan S, Tugui A, Perikos I, editors. Proceedings of the 5th International Conference on Artificial Intelligence and Smart Energy (ICAIS 2025). Information Systems Engineering and Management. Volume 42. Cham: Springer; 2025. p. 279–290. doi:10.1007/978-3-031-90482-0_22.
- Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R. Threat analysis of IoT networks using artificial neural network intrusion detection system. 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia. 2016. p. 1–6. doi:10.1109/ISNCC.2016.7746067.
- Khatun MA, Chowdhury N, Uddin MN. Malicious nodes detection based on artificial neural network in IoT environments. 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh. 2019. p. 1–6. doi:10.1109/ICCIT48885.2019.9038563.

International Journal of Wireless Security and Networks
| Volume | 04 |
| Issue | 01 |
| Received | 09/09/2025 |
| Accepted | 10/09/2025 |
| Published | 24/02/2026 |
| Publication Time | 168 Days |
Login
PlumX Metrics