Abstract: Traditional cybersecurity systems often rely on static intrusion detection and manual cryptanalysis, limiting their effectiveness against evolving threats. This paper introduces an ...