| Issue |
ITM Web Conf.
Volume 81, 2026
International Conference on Emerging Technologies for Multidisciplinary Innovation and Sustainability (ETMIS 2025)
|
|
|---|---|---|
| Article Number | 01015 | |
| Number of page(s) | 10 | |
| DOI | https://doi.org/10.1051/itmconf/20268101015 | |
| Published online | 23 January 2026 | |
An Iterative Review Inspired Adaptive Cyber Threat Detection Model with Context Awareness & Meta-Learning with Generative Hybrid Anomaly Detection
1 Research Scholar, Jhulelal Institute of Technology Nagpur, Maharashtra, India.
2 Associate Professor, Jhulelal Institute of Technology Nagpur, Maharashtra, India.
* Corresponding author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Al-driven cyber security frameworks must adapt to more sophisticated threats and context-based detections. We can improve interpretability, flexibility, and resilience in data-scarce and hostile settings in the current model. Challenges include model interpretation and explain ability, adaptability to fast-changing threat landscapes, and secure intelligence sharing among privacy-sensitive enterprises. This is done by creating a new framework using three cutting-edge methods: ACAML, GHAD, and FARL. Context-specific embeddings add meta-learning. Thus, the models will excel at threat adaptation to different contexts and outperform traditional models by 5-10% in accuracy and interpretability. To solve data shortage, GHAD creates high-quality synthetic data for balanced anomaly detection using diffusion models and autoencoders. An F1-score increase of 10% is expected. Federated adversarial reinforcement learning improves collaborative threat intelligence security and privacy and decentralised organization resilience by 30-40%. This method enhances cyber threat detection systems' adaptability, interpretability, and robustness. It offers scalable, real-time, resilient, and privacy-aware threat detection for critical infrastructure, healthcare, and finance. Finally, the proposed solutions will close cyber security gaps and enable proactive, safe, and context-aware AI-driven threat protection across operational landscapes.
© The Authors, published by EDP Sciences, 2026
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

