time anomaly detection, explainable artificial
intelligence, and regulatory compliance into a
seamless defense architecture.
The framework achieved strong performance
across several infrastructure domains, and striking the
right balance between detection speed,
interpretability, and policy alignment. The fact that it
is able map threats, provide fair and see through
justifications, and suggest “healthy” mitigations is
what makes it distinguishable from current solutions,
which in most cases focus on high accuracy and
sacrifice trust or do not attribute the legal
requirements the proper weight. By combining ML
with human-centric explainability tools and
embedding a policy rule-based engine, the system
affords cybersecurity professionals the capability to
not only to respond intelligently, but also to do so
affirmatively and legally.
Beyond technical efficiency, the proposed model
provides a template for the future adaptive,
transparent, and legally following cybersecurity
systems. It acknowledges that securing critical
infrastructure relates not only to technology but also
governance, accountability and public trust. With
digital infrastructure increasingly supporting the
provision of essential services, integrated approaches
are ever more urgent.
This work adds such a scalable, interpretable, and
policy-aware defense mechanism that adapts to new
threats. The results pave the way for more advanced
developments in adaptive security, regulatory
automation, and AI-based reasoning about threats,
and bring us closer to infrastructure ecosystems able
to robustly operate despite adversarial conditions.
REFERENCES
2025 cybersecurity predictions: Experts on threats &
solutions. (2025). TechInformed- https://techinform
ed.com/2025-informed-cybersecurity-critical-
infrastructure-becomes-prime-target/TechInformed
Ani, U. D., Watson, J. D. M., Tuptuk, N., Hailes, S., Carr,
M., & Maple, C. (2022). Improving the cybersecurity
of critical national infrastructure using modelling and
simulation. arXiv. https:// arxiv.org/abs/ 2208.079
65arXiv
Chaudhary, A. (2025, January 18). Today's business: How
to combat the growing threat of ransomware. New
Haven Register. https://www.nhregister.com/opinion/
article/ransomware-todays-business-arvin-chaudhary-
20035891.php
Critical infrastructure protection: Generative AI,
challenges, and opportunities. (2024). arXiv.
https://arxiv.org/abs/2405.04874
Cyber-physical energy systems security: Threat modeling,
risk assessment, resources, metrics, and case studies.
(2021). arXiv. https://arxiv.org/abs/2101.10198arXiv
Cyberattacks on clean energy are coming—the White
House has a plan. (2024, August 9). The Verge.
https://www.theverge.com/2024/8/9/24216329/cybers
ecurity-clean-energy-biden-administration-priorities
The Verge
CyberAv3ngers: The Iranian saboteurs hacking water and
gas systems worldwide. (2025, April 15). WIRED.
https://www.wired.com/story/cyberav3ngers-iran-
hacking-water-and-gas-industrial-systems
Cybersecurity of critical infrastructure. (2019). Researc
hGate. https:// www.researchgate .net/
publication/335752979_Cybersecurity_of_Critical_Inf
rastructure
Cybersecurity in power grids: Challenges and
opportunities. (2021). arXiv. https:/ /arxiv. org/abs/
2105.00013arXiv
Cybersecurity for critical infrastructure. (2023). IEEE Eta
Kappa Nu. https://hkn.ieee.org/wp- content/uploads/2
023/05/TheBridge_Issue2_May2023.pdf
Cybersecurity challenges in critical infrastructure. (2025).
SciTePress. https:// www.scitepress. org/Papers/2025/
130915/130915.pdfSciTePress
Cybersecurity and critical infrastructure resilience in North
America. (2025). Wilson Center. https:// mexicoele
ctions.wilsoncenter.org/publication/cybersecurity-and-
critical-infrastructure-resilience-north-america
Cybersecurity and resilience bill. (2025). Wikipedia.
https://en.wikipedia.org/wiki/Cyber_Security_and_Re
silience_Bill
Cybersecurity strategies for critical infrastructure:
Defending national security and ensuring resilience.
(2025). ResearchGate. https:/ /www. researchgate. Net
/publication/390486753_cybersecurity_strategies_for_
critical_infrastructure_defending_national_security_an
d_ensuring_resilience
Cybersecurity strategies leveraging neural networks for
critical infrastructure protection. (2025). IECE.
https://iece.org/article/abs/tnc.2025.737491
Cybersecurity: State of the art, challenges and future
directions. (2023). ScienceDirect. https://www.scien
cedirect.com/science/article/pii/S2772918423000188S
cienceDirect
Dragos. (2025). 2025 OT cybersecurity report: 8th annual
year in review. https://www.dragos.com/ot- cybersec
urity-year-in-review/Dragos Cyber Security
Everything you need to know about cyber threat
intelligence in 2025. (2025). Cyble. https://cyble.c
om/knowledge-hub/cyber-threat-intelligence-2025/
Examining cybersecurity critical infrastructure regulations
in the U.S. and EU. (2025). Polsinelli. https://www
.polsinelli.com/publications/examining-cybersecurity-
critical-infrastructure-regulations-in-the-u-s-and-eu
National cyber threat assessment 2025–2026. (2025). Cyber
Centre Canada. https:// www.cyber. gc.ca/en/guidance/
national-cyber-threat-assessment-2025-2026Canadian
Centre for Cyber Security