Results 71 to 80 of about 4,917 (184)

Research Priorities for Robust and Beneficial Artificial Intelligence [PDF]

open access: yes, 2015
Success in the quest for artificial intelligence has the potential to bring unprecedented benefits to humanity, and it is therefore worthwhile to investigate how to maximize these benefits while avoiding potential pitfalls.
Dewey, Daniel   +2 more
core   +2 more sources

Peer-to-Peer Enclaves for Improving Network Defence [PDF]

open access: yesTechnology Innovation Management Review, 2013
Information about cyberthreats within networks spreads slowly relative to the speed at which those threats spread. Typical "threat feeds" that are commercially available also disseminate information slowly relative to the propagation speed of attacks ...
David W. Archer, Adam Wick
doaj  

Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

open access: yes, 2017
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core  

Statistical Watermarking for Networked Control Systems

open access: yes, 2017
Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal.
abrams   +8 more
core   +1 more source

SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE

open access: yesSecurity and Defence Quarterly, 2017
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the ...
Radosław BIELAWSKI, Aleksandra RADOMSKA
doaj   +1 more source

The Ontology of Documents [PDF]

open access: yes, 2011
As is well known, speech acts such as acts of promising can have ontological consequences. For example an act of promising can give rise to a mutually correlated claim and obligation.
Smith, Barry
core  

China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence [PDF]

open access: yes, 2011
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system.
Magnus Hjortdal
core  

Risk-Based Approach to AI Implementation in Ukraine's Defense Sector: Conceptual Framework

open access: yesMilitary science
The article discusses the conceptual foundations of a risk-oriented approach to introducing artificial intelligence (AI) into Ukraine's defense sector. The study's relevance stems from the rapid development of AI technologies in military affairs and the ...
Станіслав Шумлянський   +2 more
doaj   +1 more source

Weak Resilience of Networked Control Systems

open access: yes, 2015
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart   +5 more
core   +1 more source

Lessons learned and identified for the small states based on Russia’s aggression in Ukraine: analysis of the case of Latvia

open access: yesŚwiat Idei i Polityki
The history shows that each state must stand by and for itself for the cause of its independence and security and that it is especially complicated to survive on the international arena for the smaller states, nearing such an aggressive superpower like ...
Valerijs Bodnieks
doaj   +1 more source

Home - About - Disclaimer - Privacy