Login

Legal Challenges of Swarm Intelligence Exploitation in Cybercrime across Distributed Systems

Vol. 2 No. 3 (2026): Contrarius:

Naeem AllahRakha (1)

(1) Department of Law and Technology, Tashkent State University of Law, Tashkent, Uzbekistan
Fulltext View | Download

Abstract:

Cybercrime continues to evolve at a pace that challenges the adaptability of existing legal frameworks, particularly with the emergence of swarm intelligence as a tool for coordinating autonomous and distributed cyberattacks. This study aims to analyse the adequacy of contemporary international cybercrime law in addressing the exploitation of swarm intelligence, with specific reference to recent global regulatory developments. The research employs a doctrinal legal method, combining normative analysis of treaty provisions with a qualitative review of recent enforcement practices. The findings reveal four principal deficiencies: the ambiguity of legal liability in decentralized systems lacking identifiable control; jurisdictional fragmentation that enables regulatory evasion; inherent limitations in detecting multi-agent coordinated attacks; and a structural mismatch between legal norms and states’ technical enforcement capacities. These gaps demonstrate that existing frameworks remain insufficient to respond effectively to technologically sophisticated cyber threats. The study concludes that without targeted legal reform, including the development of specialized regulatory instruments, enhanced international cooperation mechanisms, and improved technical capacity, the enforcement of cybercrime law will remain reactive and fragmented. Strengthening the integration between legal doctrine and technological realities is therefore essential to ensure effective governance and protection in the evolving digital landscape.

References

Abdelaziz, Dalia Kadry Ahmed, ‘Criminal Liability for the Misuse and Crimes Committed by AI: A Comparative Analysis of Legislation and International Conventions’, Journal of Infrastructure Policy and Development, 9 (2025), 10722 <https://doi.org/10.24294/jipd10722>

Abualigah, Laith, Deborah Falcone and Agostino Forestiero, ‘Swarm Intelligence to Face IoT Challenges’, ed. by Abdul Rehman Javed, Computational Intelligence and Neuroscience, 2023 (2023) <https://doi.org/10.1155/2023/4254194>

Adel, Amr and Mohammad Norouzifard, ‘Weaponization of the Growing Cybercrimes inside the Dark Net: The Question of Detection and Application’, Big Data and Cognitive Computing, 8 (2024), 91 <https://doi.org/10.3390/bdcc8080091>

Admass, Wasyihun Sema, Yirga Yayeh Munaye and Abebe Abeshu Diro, ‘Cyber Security: State of the Art, Challenges and Future Directions’, Cyber Security and Applications, 2 (2024), 100031 <https://doi.org/10.1016/j.csa.2023.100031>

Ahmed, Ijaz, Miswar Akhtar Syed, Muhammad Maaruf and Muhammad Khalid, ‘Distributed Computing in Multi-Agent Systems: A Survey of Decentralized Machine Learning Approaches’, Computing, 107 (2025), 2 <https://doi.org/10.1007/s00607-024-01356-0>

Al-Busaidi, Adil S, Raghu Raman, Laurie Hughes, Mousa Ahmed Albashrawi, Tegwen Malik, Yogesh K Dwivedi, and others, ‘Redefining Boundaries in Innovation and Knowledge Domains: Investigating the Impact of Generative Artificial Intelligence on Copyright and Intellectual Property Rights’, Journal of Innovation & Knowledge, 9 (2024), 100630 <https://doi.org/10.1016/j.jik.2024.100630>

Ali, Adnan Bin Amanat, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna and Kiran Adnan, ‘Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review’, Sage Open, 15 (2025) <https://doi.org/10.1177/21582440251314671>

Ali, Mahrus, Andi Muliyono and Syarif Nurhidayat, ‘The Application of a Human Rights Approach toward Crimes of Corruption: Analyzing Anti-Corruption Regulations and Judicial Decisions’, Laws, 12 (2023), 68 <https://doi.org/10.3390/laws12040068>

Alqudsi, Yunes and Murat Makaraci, ‘Exploring Advancements and Emerging Trends in Robotic Swarm Coordination and Control of Swarm Flying Robots: A Review’, Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 239 (2025), 180–204 <https://doi.org/10.1177/09544062241275359>

———, ‘UAV Swarms: Research, Challenges, and Future Directions’, Journal of Engineering and Applied Science, 72 (2025), 12 <https://doi.org/10.1186/s44147-025-00582-3>

Alsadie, Deafallah, ‘Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures’, ed. by Jiwei Tian, IET Information Security, 2025 (2025) <https://doi.org/10.1049/ise2/2046868>

Alshabibi, Munirah Maher, Alanood Khaled Bu dookhi and MM Hafizur Rahman, ‘Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review’, Computers, 13 (2024), 213 <https://doi.org/10.3390/computers13080213>

Anumbe, Noble, Clint Saidy and Ramy Harik, ‘A Primer on the Factories of the Future’, Sensors, 22 (2022), 5834 <https://doi.org/10.3390/s22155834>

Bagherifam, Niloufar, Sajjad Naghdi, Vahid Ahmadian, Alireza Fazlzadeh and Milad Baghalzadeh Shishehgarkhaneh, ‘Digital Regulatory Governance: The Role of RegTech and SupTech in Transforming Financial Oversight and Administrative Capacity’, International Journal of Financial Studies, 13 (2025), 217 <https://doi.org/10.3390/ijfs13040217>

Bakirov, Akhat and Ibragim Suleimenov, ‘Theoretical Bases of Methods of Counteraction to Modern Forms of Information Warfare’, Computers, 14 (2025), 410 <https://doi.org/10.3390/computers14100410>

Baranchuk, Mikhail, Vijay Bolina, Christian de Witt, Lewis Hammond, Sumeet Motwani, Martin Strohmeier, and others, ‘Secret Collusion among AI Agents: Multi-Agent Deception via Steganography’, in Advances in Neural Information Processing Systems 37 (San Diego, California, USA: Neural Information Processing Systems Foundation, Inc. (NeurIPS), 2024), pp. 73439–86 <https://doi.org/10.52202/079017-2336>

Bartoli, Laura, ‘Cybersecurity and the Fight against Cybercrime: Partners or Competitors?’, European Journal of Risk Regulation, 16 (2025), 498–513 <https://doi.org/10.1017/err.2025.31>

Baruah, Sangita, Dhruba Jyoti Borah and Vaskar Deka, ‘Reviewing Various Feature Selection Techniques in Machine Learning‐based Botnet Detection’, Concurrency and Computation: Practice and Experience, 36 (2024) <https://doi.org/10.1002/cpe.8076>

Bhumichai, Dhanasak, Christos Smiliotopoulos, Ryan Benton, Georgios Kambourakis and Dimitrios Damopoulos, ‘The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead’, Information, 15 (2024), 268 <https://doi.org/10.3390/info15050268>

Birthriya, Santosh Kumar, Priyanka Ahlawat and Ankit Kumar Jain, ‘A Comprehensive Survey of Social Engineering Attacks: Taxonomy of Attacks, Prevention, and Mitigation Strategies’, Journal of Applied Security Research, 20 (2025), 244–92 <https://doi.org/10.1080/19361610.2024.2372986>

Biswas, Birupaksha and Suhena Sarkar, ‘Responsible Agentic Artificial Intelligence Governance: Risk, Safety, and Ethical Challenges in Autonomous Systems’, International Journal of Applied Resilience and Sustainability, 2 (2026), 142–67 <https://doi.org/10.70593/deepsci.0202005>

Boamah, Kwaku Gyamfi, AFUA Asante, Ashley Timean and Kwadwo Fening Okai, ‘Artificial Intelligence Integration in Cyber Incident Response Teams to Enable Faster Containment, Forensic Accuracy, and Resilient Business Continuity’, International Journal of Science and Research Archive, 17 (2025), 1263–80 <https://doi.org/10.30574/ijsra.2025.17.1.2933>

Brunet-Jailly, Emmanuel, ‘Cross-Border Cooperation: A Global Overview’, Alternatives: Global, Local, Political, 47 (2022), 3–17 <https://doi.org/10.1177/03043754211073463>

Cajueiro, Daniel Oliveira and Victor Rafael Rezende Celestino, ‘A Comprehensive Review of Artificial Intelligence Regulation: Weighing Ethical Principles and Innovation’, Journal of Economy and Technology, 4 (2026), 77–91 <https://doi.org/10.1016/j.ject.2025.07.001>

Chauhan, Dharmendra, Harshil Kagathara, Hiren Mewada, Sagar Patel, Sagar Kavaiya and Gordana Barb, ‘Nation’s Defense: A Comprehensive Review of Anti-Drone Systems and Strategies’, IEEE Access, 13 (2025), 53476–505 <https://doi.org/10.1109/ACCESS.2025.3550338>

Copeland, Damian, Philip Sammons and Lauren Sanders, ‘An Approach to the Legal Review of Autonomous Swarms’, in Thinking Swarms (Cham: Springer Nature Switzerland, 2025), pp. 171–86 <https://doi.org/10.1007/978-3-031-82790-7_10>

Demertzi, Vasiliki, Stavros Demertzis and Konstantinos Demertzis, ‘An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities’, Applied Sciences, 13 (2023), 790 <https://doi.org/10.3390/app13020790>

Duan, Haibin, Mengzhen Huo and Yanming Fan, ‘From Animal Collective Behaviors to Swarm Robotic Cooperation’, National Science Review, 10 (2023) <https://doi.org/10.1093/nsr/nwad040>

Farber, Shai, ‘The Evolving Nexus of Cybercrime and Terrorism: A Systematic Review of Convergence and Policy Implications’, Security Journal, 38 (2025), 29 <https://doi.org/10.1057/s41284-025-00471-7>

Finch, William Walter and Marya Butt, ‘Gaps in AI-Compliant Complementary Governance Frameworks’ Suitability (for Low-Capacity Actors), and Structural Asymmetries (in the Compliance Ecosystem)—A Systematic Review’, Journal of Cybersecurity and Privacy, 5 (2025), 101 <https://doi.org/10.3390/jcp5040101>

Furnari, Salvatore Luciano and Chiara Villani, ‘Regulation of Financial Protocol DAOs: Addressing the Problems of Decentralization and AI Governance’, in Decentralized Autonomous Organizations—Governance, Technology, and Legal Perspectives. DAWO 2025. Springer Proceedings in Business and Economics (Springer Charm, 2026), pp. 115–34 <https://doi.org/10.1007/978-3-032-03273-7_7>

Ganguli, Chirag, Shishir Kumar Shandilya, Ivan Izonin and Lesia Hentosh, ‘Nature-Inspired Swarm Optimization Paradigms for Securing Semantic Web Frameworks against DDoS Attacks: A Computational Approach’, Scientific Reports, 15 (2025), 39020 <https://doi.org/10.1038/s41598-025-26058-1>

Grigaliūnas, Šarūnas, Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli, Stephanos Andreou and Audrius Lopata, ‘Holistic Information Security Management and Compliance Framework’, Electronics, 13 (2024), 3955 <https://doi.org/10.3390/electronics13193955>

Hadi, Wael, Ala Hamarsheh, Ahmad Al-Qerem and Amjad Aldweesh, ‘Swarm AI for Distributed Cyber Defense and Autonomous Threat Detection’ (IGI Global, 2025), pp. 185–208 <https://doi.org/10.4018/979-8-3373-0954-5.ch007>

Hanif, Muhammad, Ehsan Ullah Munir, Muhammad Maaz Rehan, Saima Gulzar Ahmad, Kashif Ayyub and Naeem Ramzan, ‘Orchestrating Machine Learning Models in a Swarm Architecture for IoT Inline Malware Detection’, Scientific Reports, 16 (2025), 187 <https://doi.org/10.1038/s41598-025-28859-w>

Hasbach, Jonas D and Maren Bennewitz, ‘The Design of Self-Organizing Human–Swarm Intelligence’, Adaptive Behavior, 30 (2022), 361–86 <https://doi.org/10.1177/10597123211017550>

Hassel, Henrik and Alexander Cedergren, ‘Integrating Risk Assessment and Business Impact Assessment in the Public Crisis Management Sector’, International Journal of Disaster Risk Reduction, 56 (2021), 102136 <https://doi.org/10.1016/j.ijdrr.2021.102136>

Hatzivasilis, George, Eftychia Lakka, Manos Athanatos, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, and others, ‘Swarm-Intelligence for the Modern ICT Ecosystems’, International Journal of Information Security, 23 (2024), 2951–75 <https://doi.org/10.1007/s10207-024-00869-1>

House, Deanna, Michelle Black and Lana Obradovic, ‘Closing the Tech Gap: Updating Cyber and Technology Curriculum for Homeland Security Professionals’, Journal of Policing, Intelligence and Counter Terrorism, 21 (2026), 1–21 <https://doi.org/10.1080/18335330.2025.2538880>

Iftikhar, Saman, ‘Cyberterrorism as a Global Threat: A Review on Repercussions and Countermeasures’, PeerJ Computer Science, 10 (2024), e1772 <https://doi.org/10.7717/peerj-cs.1772>

Jaelani, Abdul Kadir, Anila Rabbani and Muhammad Jihadul Hayat, ‘Land Reform Policy in Determining Abandoned Land for Halal Tourism Destination Management Based on Fiqh Siyasah’, El-Mashlahah, 14 (2024), 211–38 <https://doi.org/10.23971/el-mashlahah.v14i1.8051>

Al Jasem, Mohamad Sheikho, Trevor De Clark and Ajay Kumar Shrestha, ‘Toward Decentralized Intelligence: A Systematic Literature Review of Blockchain-Enabled AI Systems’, Information, 16 (2025), 765 <https://doi.org/10.3390/info16090765>

Jørgensen, Bo Nørregaard and Zheng Grace Ma, ‘Digital Twin of the European Electricity Grid: A Review of Regulatory Barriers, Technological Challenges, and Economic Opportunities’, Applied Sciences, 15 (2025), 6475 <https://doi.org/10.3390/app15126475>

Klarin, Anton, Pi-Shen Seet, Janice Jones, Michael N Johnstone, Helen Cripps, Jalleh Sharafizad, and others, ‘Understanding the Roots of Swarm Intelligence in Defence to Find the Path Forward’, in Thinking Swarms (Cham: Springer Nature Switzerland, 2025), pp. 21–37 <https://doi.org/10.1007/978-3-031-82790-7_2>

Knoblauch, Dorian and Jürgen Großmann, ‘Automating Lifecycle Compliance: A Continuous Assessment Framework for High-Risk and GPAI Obligations in the EU AI Act’, in Risikoanalyse Künstliche Intelligenz (Berlin, Heidelberg: Springer Berlin Heidelberg, 2026), pp. 279–301 <https://doi.org/10.1007/978-3-662-72661-7_11>

Kose, Kubra, Nuri Alperen Kose and Fan Liang, ‘Securing Unmanned Devices in Critical Infrastructure: A Survey of Hardware, Network, and Swarm Intelligence’, Electronics, 15 (2026), 1204 <https://doi.org/10.3390/electronics15061204>

Kumar, N Satheesh, V Ramakrishna, M V. Kamal, K Sathish Kumar, V Shiva Narayana Reddy and Perumalla Janaki Ramulu, ‘Swarm-Based Intelligent Models for Developing Cybersecurity Frameworks with IDS’, Scientific Reports, 16 (2026), 3492 <https://doi.org/10.1038/s41598-025-30223-x>

Lather, Mahipal, Sachin Bhardwaj and Vandana Ajay Kumar, ‘Cybersecurity and Safeguarding Digital Assets: An Analysis of Regulatory Frameworks, Legal Liability and Enforcement Mechanisms’, Productivity, 65 (2024), 1–10 <https://doi.org/10.32381/PROD.2024.65.01.1>

Lazarus, Suleman, Adebayo Benedict Soares and Mark Button, ‘Pathways, Pressure, and Profit: Adaptive Innovation and Strain in a Convicted Cybercrime Academy Called Hustle Kingdom’, Deviant Behavior, 2025, 1–25 <https://doi.org/10.1080/01639625.2025.2551790>

Lee, Michael Y, ‘Enacting Decentralized Authority: The Practices and Limits of Moving Beyond Hierarchy’, Administrative Science Quarterly, 69 (2024), 791–833 <https://doi.org/10.1177/00018392241257372>

Leon, Maikel, ‘Lifecycle‐Based Governance to Build Reliable Ethical AI Systems’, Systems Research and Behavioral Science, 2026 <https://doi.org/10.1002/sres.70014>

Li, Ke, Yuqing Lin, Xiaolong Su, Aifeng Liu, Jiancheng Liu, Wanlong Qi, and others, ‘Unified Multi-Agent Recovery Framework via Multi-Scale Diffusion and Dependency-Aware Hierarchical PPO for Resilience Enhancement’, Journal of Big Data, 12 (2025), 226 <https://doi.org/10.1186/s40537-025-01285-5>

Li, Yuchong and Qinghui Liu, ‘A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments’, Energy Reports, 7 (2021), 8176–86 <https://doi.org/10.1016/j.egyr.2021.08.126>

Maurushat, Alana and Kathy Nguyen, ‘The Legal Obligation to Provide Timely Security Patching and Automatic Updates’, International Cybersecurity Law Review, 3 (2022), 437–65 <https://doi.org/10.1365/s43439-022-00059-6>

Mei, Mengqing, Songsong Zhang, Zhiwei Ye, Mingwei Wang, Wen Zhou, Jia Yang, and others, ‘A Cooperative Hybrid Breeding Swarm Intelligence Algorithm for Feature Selection’, Pattern Recognition, 169 (2026), 111901 <https://doi.org/10.1016/j.patcog.2025.111901>

Miller, Seumas, Terry Bossomaier, Cybersecurity, Ethics, and Collective Responsibility (Oxford University PressNew York, 2024) <https://doi.org/10.1093/oso/9780190058135.001.0001>

Mitsilegas, Valsamis, Elspeth Guild, Elif Kuskonmaz and Niovi Vavoula, ‘Data Retention and the Future of Large‐scale Surveillance: The Evolution and Contestation of Judicial Benchmarks’, European Law Journal, 29 (2023), 176–211 <https://doi.org/10.1111/eulj.12417>

Monfardini, Patrizio, Silvia Macchia and Davide Eltrudis, ‘Reforming Resistant KIPOs to Achieve Justice: Can the Judiciary System Hybridise?’, Journal of Public Budgeting, Accounting & Financial Management, 36 (2024), 580–96 <https://doi.org/10.1108/JPBAFM-07-2023-0132>

Mukred, Muaadh, Umi Asma’ Mokhtar, Fahad Abdullah Moafa, Abdu Gumaei, Ali Safaa Sadiq and Abdulaleem Al-Othmani, ‘The Roots of Digital Aggression: Exploring Cyber-Violence through a Systematic Literature Review’, International Journal of Information Management Data Insights, 4 (2024), 100281 <https://doi.org/10.1016/j.jjimei.2024.100281>

Mustafa, Zaid, Rashid Amin, Hamza Aldabbas and Naeem Ahmed, ‘Intrusion Detection Systems for Software-Defined Networks: A Comprehensive Study on Machine Learning-Based Techniques’, Cluster Computing, 27 (2024), 9635–61 <https://doi.org/10.1007/s10586-024-04430-6>

Nasir, Muhammad Hassan, Salman A Khan, Muhammad Mubashir Khan and Mahawish Fatima, ‘Swarm Intelligence Inspired Intrusion Detection Systems — A Systematic Literature Review’, Computer Networks, 205 (2022), 108708 <https://doi.org/10.1016/j.comnet.2021.108708>

Nishnianidze, Anri, ‘Some New Challenges of Cybercrime and the Reason for Its Outdated Regulations’, European Scientific Journal, ESJ, 19 (2023), 92 <https://doi.org/10.19044/esj.2023.v19n39p92>

Novelli, Claudio, Federico Casolari, Antonino Rotolo, Mariarosaria Taddeo and Luciano Floridi, ‘AI Risk Assessment: A Scenario-Based, Proportional Methodology for the AI Act’, Digital Society, 3 (2024), 13 <https://doi.org/10.1007/s44206-024-00095-1>

Nygren, Thomas, Emily R Spearing, Nicolas Fay, Davide Vega, Isabella I Hardwick, Jon Roozenbeek, and others, ‘The Seven Roles of Generative AI: Potential & Pitfalls in Combatting Misinformation’, Behavioral Science & Policy, 2026 <https://doi.org/10.1177/23794607261417815>

Ofusori, Lizzy, Tebogo Bokaba and Siyabonga Mhlongo, ‘Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction’, Applied Artificial Intelligence, 38 (2024) <https://doi.org/10.1080/08839514.2024.2439609>

Pantanowitz, Liron, Matthew Hanna, Joshua Pantanowitz, Joe Lennerz, Walter H Henricks, Peter Shen, and others, ‘Regulatory Aspects of Artificial Intelligence and Machine Learning’, Modern Pathology, 37 (2024), 100609 <https://doi.org/10.1016/j.modpat.2024.100609>

Phythian, Rebecca, Stuart Kirby and Lauren Swan-Keig, ‘Understanding How Law Enforcement Agencies Share Information in an Intelligence-Led Environment: How Operational Context Influences Different Approaches’, Policing: An International Journal, 47 (2024), 112–25 <https://doi.org/10.1108/PIJPSM-06-2023-0073>

Primiero, Giuseppe, Elio Tuci, Jacopo Tagliabue and Eliseo Ferrante, ‘Swarm Attack: A Self-Organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents’ (Springer Charm, 2018), pp. 213–24 <https://doi.org/10.1007/978-3-030-00533-7_17>

Qiqieh, Issa, Omar Alzubi, Jafar Alzubi, KC Sreedhar and Ala’ M Al-Zoubi, ‘An Intelligent Cyber Threat Detection: A Swarm-Optimized Machine Learning Approach’, Alexandria Engineering Journal, 115 (2025), 553–63 <https://doi.org/10.1016/j.aej.2024.12.039>

Radanliev, Petar, ‘Cyber Diplomacy: Defining the Opportunities for Cybersecurity and Risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing’, Journal of Cyber Security Technology, 9 (2025), 28–78 <https://doi.org/10.1080/23742917.2024.2312671>

Rajendra, Josephine Bhavani and Ambikai S Thuraisingam, ‘The Role of Explainability and Human Intervention in AI Decisions: Jurisdictional and Regulatory Aspects’, Information & Communications Technology Law, 2025, 1–32 <https://doi.org/10.1080/13600834.2025.2537514>

Ray, Partha Pratim, ‘A Review of TRiSM Frameworks in Artificial Intelligence Systems: Fundamentals, Taxonomy, Use Cases, Key Challenges and Future Directions’, Expert Systems, 43 (2026) <https://doi.org/10.1111/exsy.70213>

Reddy, Dukka Karun Kumar, Janmenjoy Nayak, HS Behera, Vimal Shanmuganathan, Wattana Viriyasitavat and Gaurav Dhiman, ‘A Systematic Literature Review on Swarm Intelligence Based Intrusion Detection System: Past, Present and Future’, Archives of Computational Methods in Engineering, 31 (2024), 2717–84 <https://doi.org/10.1007/s11831-023-10059-2>

REN, Qiang and Jing DU, ‘Harmonizing Innovation and Regulation: The EU Artificial Intelligence Act in the International Trade Context’, Computer Law & Security Review, 54 (2024), 106028 <https://doi.org/10.1016/j.clsr.2024.106028>

Rodrigues, Rowena, ‘Legal and Human Rights Issues of AI: Gaps, Challenges and Vulnerabilities’, Journal of Responsible Technology, 4 (2020), 100005 <https://doi.org/10.1016/j.jrt.2020.100005>

Rofi’ah, Khusniati, Martha Eri Safira and Muhammad Ikhlas Rosele, ‘The Effectiveness of Accelerating Halal Product Certification: Regulations and Companions’, Journal of Human Rights, Culture and Legal System, 4 (2024), 449–76 <https://doi.org/10.53955/jhcls.v4i2.203>

Sachoulidou, Athina, ‘Going beyond the “Common Suspects”: To Be Presumed Innocent in the Era of Algorithms, Big Data and Artificial Intelligence’, Artificial Intelligence and Law, 2023 <https://doi.org/10.1007/s10506-023-09347-w>

Sadaf, Memoona, Zafar Iqbal, Abdul Javed, Irum Saba, Moez Krichen, Sajid Majeed, and others, ‘Connected and Automated Vehicles: Infrastructure, Applications, Security, Critical Challenges, and Future Aspects’, Technologies, 11 (2023), 117 <https://doi.org/10.3390/technologies11050117>

Saeed, Rashid A, Mohamed Omri, S Abdel-Khalek, Elmustafa Sayed Ali and Maged Faihan Alotaibi, ‘Optimal Path Planning for Drones Based on Swarm Intelligence Algorithm’, Neural Computing and Applications, 34 (2022), 10133–55 <https://doi.org/10.1007/s00521-022-06998-9>

Safitra, Muhammad Fakhrul, Muharman Lubis and Hanif Fakhrurroja, ‘Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity’, Sustainability, 15 (2023), 13369 <https://doi.org/10.3390/su151813369>

Sahu, Shashwata and Saurabh Chandra, ‘AI Applications in Global Counterterrorism Efforts: Challenges, Compliance, and Regulatory Gaps’, in Artificial Intelligence for Global Counter-Terrorism (Springer Charm, 2025), pp. 17–35 <https://doi.org/10.1007/978-3-031-99235-3_2>

Schäferling, Stefan, ‘The Case for a Right Against Automated Decision-Making’, in Governmental Automated Decision-Making and Human Rights. Law, Governance and Technology Serie (Springer Charm, 2023), pp. 231–83 <https://doi.org/10.1007/978-3-031-48125-3_7>

Shen, Danqing, Xiaoming Chen, Wenhai Qi and Lisha Meng, ‘Task Allocation for UAV Swarms under Communication Attacks: An Approach Based on Game Theory and Negotiation Mechanism’, Journal of the Franklin Institute, 362 (2025), 107417 <https://doi.org/10.1016/j.jfranklin.2024.107417>

Shurson, Jessica, ‘The Balance of Efficiency and Fundamental Rights in the EU E-Evidence Regulation’, New Journal of European Criminal Law, 16 (2025), 278–99 <https://doi.org/10.1177/20322844251357090>

Simmler, Monika, Giulia Canova and Kuno Schedler, ‘Smart Criminal Justice: Phenomena and Normative Requirements’, International Review of Administrative Sciences, 89 (2023), 415–32 <https://doi.org/10.1177/00208523211039740>

Singh, Bhupinder, ‘Unmanned Aircraft Systems (UAS), Surveillance, Risk Management to Cybersecurity and Legal Regulation Landscape’, in Unmanned Aircraft Systems (Wiley, 2024), pp. 313–54 <https://doi.org/10.1002/9781394230648.ch8>

Szadeczky, Tamas and Zsolt Bederna, ‘Risk, Regulation, and Governance: Evaluating Artificial Intelligence across Diverse Application Scenarios’, Security Journal, 38 (2025), 35 <https://doi.org/10.1057/s41284-025-00495-z>

Tan, Ying and Zhong-yang Zheng, ‘Research Advance in Swarm Robotics’, Defence Technology, 9 (2013), 18–39 <https://doi.org/10.1016/j.dt.2013.03.001>

Tayyab, Muhammad, Majid Mumtaz, Syeda Mariam Muzammal, Noor Zaman Jhanjhi and Fatimah- Tuz-Zahra, ‘Swarm Security: Tackling Threats in the Age of Drone Swarms’, in Advances in Information Security, Privacy, and Ethics’, ed. by Imdad Ali Shah and Noor Zaman Jhanjhi (IGI Global, 2024), pp. 324–42 <https://doi.org/10.4018/979-8-3693-0774-8.ch013>

Thantilage, Ranul Deelaka, Gerry Buttner and Ray Genoe, ‘Drone Forensics in Law Enforcement: Assessing Utilisation, Challenges, and Emerging Necessities’, Forensic Science International: Digital Investigation, 55 (2025), 302003 <https://doi.org/10.1016/j.fsidi.2025.302003>

Tuptuk, Nilufer and Stephen Hailes, ‘Security of Smart Manufacturing Systems’, Journal of Manufacturing Systems, 47 (2018), 93–106 <https://doi.org/10.1016/j.jmsy.2018.04.007>

Vladov, Serhii, Oksana Mulesa, Victoria Vysotska, Petro Horvat, Nataliia Paziura, Oleksandra Kolobylina, and others, ‘Method for Detecting Low-Intensity DDoS Attacks Based on a Combined Neural Network and Its Application in Law Enforcement Activities’, Data, 10 (2025), 173 <https://doi.org/10.3390/data10110173>

WANG, Chao, Shuyuan ZHANG, Tianhang MA, Yuetong XIAO, Michael Zhiqiang CHEN and Lei WANG, ‘Swarm Intelligence: A Survey of Model Classification and Applications’, Chinese Journal of Aeronautics, 38 (2025), 102982 <https://doi.org/10.1016/j.cja.2024.03.019>

Wang, Yan, Hao Wang and Yanghuang Cao, ‘Comprehensive Review of Storage Optimization Techniques in Blockchain Systems’, Applied Sciences, 15 (2024), 243 <https://doi.org/10.3390/app15010243>

Weinstein, Stuart, ‘Preventive Legal Technology for Micro-Entities: Improving Access to Justice in Commercial Contract Analysis’, International Review of Law, Computers & Technology, 2025, 1–21 <https://doi.org/10.1080/13600869.2025.2602106>

Xu, Minghai, Li Cao, Dongwan Lu, Zhongyi Hu and Yinggao Yue, ‘Application of Swarm Intelligence Optimization Algorithms in Image Processing: A Comprehensive Review of Analysis, Synthesis, and Optimization’, Biomimetics, 8 (2023), 235 <https://doi.org/10.3390/biomimetics8020235>

Yaacoub, Jean Paul A, Hassan N Noura, Ola Salman and Khaled Chahine, ‘Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions’, Future Internet, 17 (2025), 318 <https://doi.org/10.3390/fi17070318>

Zaizi, Fatima Ezzahra, Sara Qassimi and Said Rakrak, ‘Multi-Objective Optimization with Recommender Systems: A Systematic Review’, Information Systems, 117 (2023), 102233 <https://doi.org/10.1016/j.is.2023.102233>