CI-based Cyber Security applications [Editor's Remarks]