Filters








765 Hits in 4.7 sec

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
for long-term national security enhancement through the discovery of new phenomena and the exploration of the potential of such phenomena for defense applications.  ...  Defense Advanced Research Projects Agency (DARPA) Fiscal Year 2019 Budget Estimates (Justification Book) The DARPA Defense Research Sciences program elements (PE) seeks to provide the technical foundation  ...  Title: Adversarial AI for RF Description: The Adversarial AI for RF program aims to develop artificial intelligence (AI) capabilities with applications for national security, particularly in areas such  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

A Defense of (s)crappy Robots [article]

Ryan Jenkins, Mairéad Hurley, Eva Durall, Sebastian Martin
2020 Zenodo  
While these kits might lower the threshold for entry in a tinkering activity, we believe that the "polished" qualities of most commercial kits or products can work against constructionist educators.  ...  As makerspaces and STEAM learning environments have become more and more common, many commercial kits for robotics, electric circuits and digital technology have been created for schools and individual  ...  Future research should push towards discovering how the assessment tool could be designed to cultivate an ideal maker classroom culture, ultimately burgeoning a symbiotic relationship between an assessment  ... 
doi:10.5281/zenodo.5501878 fatcat:snjtztj37fbbpeszscwhk63uj4

Towards a Systematic View on Cybersecurity Ecology [article]

Wojciech Mazurczyk, Szymon Drobniak, Sean Moore
2016 arXiv   pre-print
A next generation of bio-inspired cybersecurity research is emerging, but progress is hindered by the lack of a framework for mapping biological security systems to their cyber analogies.  ...  In this paper, using terminology and concepts from biology, we describe a cybersecurity ecology and a framework that may be used to systematically research and develop bio-inspired cybersecurity.  ...  An analogous idea is utilized by various moving target techniques/defense in cyberspace, which distribute the uncertainty between the attacker and the defender more fairly.  ... 
arXiv:1505.04207v2 fatcat:nyacyzp4cvcgdfyj46s4yvpgiq

India, The Fourth Industrial Revolution and Government Policy

S. Patanjali, D. Subramaniam
2019 Arthshastra Indian Journal of Economics & Research  
We focus instead on what sorts of attacks we are likely to see soon if adequate defenses are not developed.  ...  This report surveys the landscape of potential security threats from malicious uses of artificial intelligence technologies, and proposes ways to better forecast, prevent, and mitigate these threats.  ...  the General Framework for AI and Security Threats.  ... 
doi:10.17010/aijer/2019/v8i2/145224 fatcat:srchlppo6za4hd4klygunfpwuq

The Politics of Defense Budgeting: A Study of Organisation and Resource Allocation in the United Kingdom and the United States

Derek Leebaert, Michael D. Hobkirk
1984 Journal of policy analysis and management  
The final years of the ten-\ear programme \%ere never really credible, but did provide a useful framework for tentati\e agreements.  ...  ' This public change of position by a leading opponent of greater unification clearly paved the way for increased powers for the Secretary of Defense, and the 1949 amendments to the National Security Act  ...  NATIONAL DEFENSE UNIVERSITY  ... 
doi:10.2307/3323886 fatcat:uywcnxg6jbahhadcv6mp44plje

Reports of the 2016 AAAI Workshop Program

Stefano Albrecht, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, Blaz Fortuna, Yannick Francillette, Sébastien Gaboury, C. Lee Giles, Marko Grobelnik (+23 others)
2016 The AI Magazine  
Interaction without Prior Coordination (WS-16-11), Planning for Hybrid Systems (WS-16-12), Scholarly Big Data: AI Perspectives, Challenges, and Ideas (WS-16-13), Symbiotic Cognitive Systems (WS-16-14)  ...  The AAAI-16 Workshops were an excellent forum for exploring emerging approaches and task areas, for bridging the gaps between AI and other fields or between subfields of AI, for elucidating the results  ...  Learning as a Framework for Ethical Decision Making.  ... 
doi:10.1609/aimag.v37i3.2680 fatcat:gutumrsprzg2vngp77hezwyuz4

Towards Security Threats of Deep Learning Systems: A Survey [article]

Yingzhe He and Guozhu Meng and Kai Chen and Xingbo Hu and Jinwen He
2020 arXiv   pre-print
., how to reduce queries to target models, what distance should be used for measuring perturbation.  ...  In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude  ...  [22] review the attack and defense methods under security and privacy AI concept. They inspect evasion and poisoning attacks, in black-box and white-box.  ... 
arXiv:1911.12562v2 fatcat:m3lyece44jgdbp6rlcpj6dz2gm

Pervasive Intelligent Endogenous 6G Wireless Systems: Prospects, Theories and Key Technologies

Yun Chen, Wenfeng Liu, Zhiang Niu, Zhongxiu Feng, Qiwei Hu, Tao Jiang
2020 Digital Communications and Networks  
In this paper, we present a forward-looking, comprehensive and in-depth analysis and technical identification of 6G.  ...  The worldwide large-scale commercial deployment of 5G has commenced in 2020 for supporting enhanced Mobile BroadBand (eMBB), ultra-Reliable and Low-Latency Communications (uRLLC), and massive Machine-Type  ...  For network systems, AI is a powerful tool in enhancing the security.  ... 
doi:10.1016/j.dcan.2020.07.002 fatcat:pfo2oeb7tjeurhoqaqvhrzz3cq

Jeffrey Edmonds/Samuel Bendett/Anya Fink/Mary Chesnut/Dmitry Gorenburg/Michael Kofman/Kasey Stricklin/Julian Waller: Artificial Intelligence and Autonomy in Russia. Arlington, VA: Center for Naval Analyses (CNA), Mai 2021

Artiom Hildebrandt
2021 SIRIUS - Zeitschrift für Strategische Analysen  
Distribution DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. 5/12/2021 This work was performed under Federal Government Contract No. N00014-16-D-5003.  ...  This report is part of an effort by CNA to provide timely, accurate, and relevant information and analysis of the field of AI in Russia, and follows a series of more than twenty biweekly newsletters on  ...  defining and brainstorming a framework for LAWS.  ... 
doi:10.1515/sirius-2021-4014 fatcat:kebmdg2gmfellh37sljf26sqcm

Technological, Ethical, Environmental and Legal Aspects of Robotics

Ildar Begishev, Zarina Khisamova, Vitaly Vasyukov, V. Breskich, S. Uvarova
2021 E3S Web of Conferences  
for causing harm.  ...  A separate direction in the field of robotics research is the analysis of this concept and the relations associated with it, from the standpoint of morality, ethics and technologies.  ...  Such works are a possible predicate for works with the opposite goal-the study of the tasks of maximum harm to humans by a robot both within the framework of national security and defense, and outside  ... 
doi:10.1051/e3sconf/202124412028 fatcat:7q55dordwnejloe4pv5gqq5eoq

AI Nuclear Winter or AI That Saves Humanity? AI and Nuclear Deterrence [chapter]

Nobumasa Akiyama
2021 Robotics, AI, and Humanity  
AbstractNuclear deterrence is an integral aspect of the current security architecture and the question has arisen whether adoption of AI will enhance the stability of this architecture or weaken it.  ...  all experts would emphatically exclude), but grave problems could similarly arise if a human actor relied too heavily on AI input.  ...  Department of Defense emphasizes the concept of humanmachine teaming: Humans and machines work together symbiotically.  ... 
doi:10.1007/978-3-030-54173-6_13 fatcat:rgmtfzjr6rhihoo4mi6ffivyca

Transdisciplinary consolidation of financial technologies with knowledge systems
Трансдисциплінарна консолідація фінансових технологій із системами знань

Oleksandr LYUBICH, SESE "The Academy of Financial Management", Oleksandr STRYZHAK, SESE "The Academy of Financial Management"
2021 Fìnansi Ukraïni  
The article describes a cognitive IT technology that provides consolidated interaction with online narrative documents which show various financial technologies.  ...  "Moving from adaptive to cognitive AI, you get to a framework of not only understanding the environment, but being able to explain and think through scenarios.  ...  TCP/IP framework.  ... 
doi:10.33763/finukr2021.11.054 fatcat:edc3aarta5gq7be2wixkynjz7q

Halting Boko Haram / Islamic State's West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies

Sunday Ogunlana
2019 Journal of Strategic Security  
The preventive techniques, which are synonymous with a hardening of the targets, are part of the government's strategy of passive defense.  ...  Korolov explained that AI-based security applications can read and understand security -they can analyze every incident, 85 identify causes, methods, and trends, and predict the next pattern even before  ... 
doi:10.5038/1944-0472.12.1.1707 fatcat:hglppo35hjfp7ntvajzeqytcae

On the Future Perfect of Artificial Intelligence and War: War and Algorithm Review. Max Liljefors, Gregor Noll, and Daniel Steuer, War and Algorithm. Rowman & Littlefield International, 2019, 232pp. ISBN: 978-1-78661-364-6

Geoff Gordon
2021 Journal of Conflict and Security Law  
for Caygill's contribution, moving on from the security catastrophe associated with Hobbes, to the environmental catastrophe associated with the Anthropocene.  ...  I say enrolled and been enrolled because the book depicts a symbiotic relationship between these technologies and the militaries that deploy them; sometimes the technology fights for the military, sometimes  ... 
doi:10.1093/jcsl/krab013 fatcat:xuumtfxlebho3o4vdirqxffnpu

AI-Assisted Authentication: State of the Art, Taxonomy and Future Roadmap [article]

Guangyi Zhu, Yasir Al-Qaraghuli
2022 arXiv   pre-print
With the emerging AI-assisted authentication schemes, our comprehensive survey provides an overall understanding on a high level, which paves the way for future research in this area.  ...  AI helps break through the limitations of traditional algorithms and provides more efficient and flexible methods for solving problems.  ...  or classification for a target problem.  ... 
arXiv:2204.12492v1 fatcat:vdeuhy63cvawjdhclricvkq42q
« Previous Showing results 1 — 15 out of 765 results