Applied Sciences
| Open Access | Cybersecurity, Artificial Intelligence, And Iot Integration: A Multilayered Framework For Secure Intelligent Systems
Johnathan A. Roberts , Global Institute of Cybersecurity Studies, New Haven, USAAbstract
Effective cybersecurity in critical infrastructure systems has become an urgent global necessity. As industries increasingly deploy continuous integration/continuous deployment (CI/CD) pipelines, surge in interconnected systems, and pervasive use of artificial intelligence (AI), vulnerabilities proliferate in both software and operational layers. This paper presents a novel, integrated framework that synthesizes established cybersecurity standards with cutting‑edge AI-based vulnerability detection and demand forecasting models, aiming to secure CI/CD-powered critical infrastructure systems. Leveraging the principles of the National Institute of Standards and Technology (NIST) cybersecurity framework (NIST, 2018) as a foundational scaffold, the proposed methodology incorporates AI-driven code analysis, anomaly detection, resource demand forecasting, and continuous vulnerability management. We discuss theoretical underpinnings, detail a comprehensive methodology, and enumerate expected results. Our discussion explores potential limitations, ethical considerations, and a roadmap for future research. This work contributes to bridging the gap between standardized cybersecurity guidelines and dynamic, AI-enhanced defense in modern CI/CD and critical infrastructure environments.
Keywords
CI/CD security, AI-based vulnerability detection, NIST cybersecurity framework
References
NIST - National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity. Retrieved from https://doi.org/10.6028/NIST.CSWP.04162018
Kumar, S., Jain, A., Rani, S., Ghai, D., Achampeta, S., & Raja, P. (2021, December). Enhanced SBIR based Re-Ranking and Relevance Feedback. In 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART) (pp. 7-12). IEEE.
Malik, G., Rahul Brahmbhatt, & Prashasti. (2025).
AI-Driven Security and Inventory Optimization: Automating Vulnerability Management and Demand Forecasting in CI/CD-Powered Retail Systems. International Journal of Computational and Experimental Science and Engineering, 11(3). https://doi.org/10.22399/ijcesen.3855
Jain, A., Singh, J., Kumar, S., Florin-Emilian, Ț., Traian Candin, M., & Chithaluru, P. (2022). Improved recurrent neural network schema for validating digital signatures in VANET. Mathematics, 10(20), 3895.
Kumar, S., Haq, M. A., Jain, A., Jason, C. A., Moparthi, N. R., Mittal, N., & Alzamil, Z. S. (2023). Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance. Computers, Materials & Continua, 75(1).
Misra, N. R., Kumar, S., & Jain, A. (2021, February). A review on E-waste: Fostering the need for green electronics. In 2021 international conference on computing, communication, and intelligent systems (ICCCIS) (pp. 1032-1036). IEEE.
Kumar, S., Shailu, A., Jain, A., & Moparthi, N. R. (2022). Enhanced method of object tracing using extended Kalman filter via binary search algorithm. Journal of Information Technology Management, 14(Special Issue: Security and Resource Management challenges for Internet of Things), 180-199.
Harshitha, G., Kumar, S., Rani, S., & Jain, A. (2021, November). Cotton disease detection based on deep learning techniques. In 4th Smart Cities Symposium (SCS 2021) (Vol. 2021, pp. 496-501). IET.
Jain, A., Dwivedi, R., Kumar, A., & Sharma, S. (2017). Scalable design and synthesis of 3D mesh network on chip. In Proceeding of International Conference on Intelligent Communication, Control and Devices: ICICCD 2016 (pp. 661-666). Springer Singapore.
Chen, T., et al. (2020). DeepCode: A Deep Learning Approach to Code Vulnerability Detection. IEEE Transactions on Software Engineering.
Ravindar Reddy Gopireddy. (2024). Securing the Future: The Convergence of Cybersecurity, AI, and IoT in a World Dominated by Intelligent Machines. European Journal of Advances in Engineering and Technology, 11(8), 91–95. https://doi.org/10.5281/zenodo.13753300
Szabó, Z., & Bilicki, V. (2023). A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection. Future Internet. https://doi.org/10.3390/fi15100326
Ravindar Reddy Gopireddy. (2024). Securing AI Systems: Protecting Against Adversarial Attacks and Data Poisoning. Journal of Scientific and Engineering Research, 11(5), 276–281. https://doi.org/10.5281/zenodo.13253611
S, P., B, C., & Raju, L. (2022). Developer’s Roadmap to Design Software Vulnerability Detection Model Using Different AI Approaches. IEEE Access, 10, 75637-75656. https://doi.org/10.1109/access.2022.3191115
Ravindar Reddy Gopireddy. (2024). Ensuring Human-Centric AI: Ethical and Technical Safeguards for Collaborative Intelligence. European Journal of Advances in Engineering and Technology, 11(3), 125–130. https://doi.org/10.5281/zenodo.13253024
Borg, M., & Borg, M. (2023). Pipeline Infrastructure Required to Meet the Requirements on AI. IEEE Software, 40, 18-22. https://doi.org/10.1109/MS.2022.3211687
Gopireddy, R. R. (2018). MACHINE LEARNING FOR INTRUSION DETECTION SYSTEMS (IDS) AND FRAUD DETECTION IN FINANCIAL SERVICES [IJCEM Journal]. https://doi.org/10.5281/zenodo.13929200
Suneja, S., Zheng, Y., Zhuang, Y., Laredo, J., & Morari, A. (2020). Learning to map source code to software vulnerability using code-as-a-graph. ArXiv, abs/2006.08614
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Johnathan A. Roberts

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

