Results 71 to 80 of about 4,917 (184)
Research Priorities for Robust and Beneficial Artificial Intelligence [PDF]
Success in the quest for artificial intelligence has the potential to bring unprecedented benefits to humanity, and it is therefore worthwhile to investigate how to maximize these benefits while avoiding potential pitfalls.
Dewey, Daniel +2 more
core +2 more sources
Peer-to-Peer Enclaves for Improving Network Defence [PDF]
Information about cyberthreats within networks spreads slowly relative to the speed at which those threats spread. Typical "threat feeds" that are commercially available also disseminate information slowly relative to the propagation speed of attacks ...
David W. Archer, Adam Wick
doaj
Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core
Statistical Watermarking for Networked Control Systems
Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal.
abrams +8 more
core +1 more source
SELECTED MODELS OF INFORMATION WARFARE IN CYBERSPACE
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the ...
Radosław BIELAWSKI, Aleksandra RADOMSKA
doaj +1 more source
The Ontology of Documents [PDF]
As is well known, speech acts such as acts of promising can have ontological consequences. For example an act of promising can give rise to a mutually correlated claim and obligation.
Smith, Barry
core
China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence [PDF]
This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system.
Magnus Hjortdal
core
Risk-Based Approach to AI Implementation in Ukraine's Defense Sector: Conceptual Framework
The article discusses the conceptual foundations of a risk-oriented approach to introducing artificial intelligence (AI) into Ukraine's defense sector. The study's relevance stems from the rapid development of AI technologies in military affairs and the ...
Станіслав Шумлянський +2 more
doaj +1 more source
Weak Resilience of Networked Control Systems
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart +5 more
core +1 more source
The history shows that each state must stand by and for itself for the cause of its independence and security and that it is especially complicated to survive on the international arena for the smaller states, nearing such an aggressive superpower like ...
Valerijs Bodnieks
doaj +1 more source

