CI-based Cyber Security applications [Editor's Remarks] | IEEE Journals & Magazine | IEEE Xplore