Artificial Intelligence, Cybersecurity and Cyber Defence. Daniel Ventre
Чтение книги онлайн.

Читать онлайн книгу Artificial Intelligence, Cybersecurity and Cyber Defence - Daniel Ventre страница 2

СКАЧАТЬ or global view of its enviro...Figure 3.16. Attack and secure/defend, with or without AIFigure 3.17. Screenshot of the hkmap.live application (October 11, 2019). For a ...

      List of Tables

      1 IntroductionTable I.1. The three strata of cyberspace (L = layer) and the place of AI in eac...

      2 Chapter 1Table 1.1. Universities involved in AI between 1970 and 1983 in China (classifie...Table 1.2. The objectives or goals of AITable 1.3. Types of actions initiated by the CIA to understand and integrate AITable 1.4. Non-intelligence actors that the CIA solicits and mobilizes and with ...Table 1.5. AI vocabulary within the CIA

      3 Chapter 2Table 2.1. Definitions of AI by year and chronological orderTable 2.2. Definitions of expert systemsTable 2.3. Definitions of “robot”Table 2.4. Some terms related to the “robot” worldTable 2.5. Typology of AITable 2.6. Some assertions or assumptions about AI intakesTable 2.7. Some assertions or hypotheses about what artificial intelligence is n...Table 2.8. Some assertions or assumptions about the future of AITable 2.9. Some assertions or hypotheses about which subjects will escape the im...Table 2.10. Some assumptions about AITable 2.11. Some consequences of artificial intelligenceTable 2.12. Some AI and robots in Japanese manga and animeTable 2.13. National AI strategy documentsTable 2.14. Key elements of the narratives of national strategies for artificial...Table 2.15. U.S. AI initiatives and strategy papers released in 2016

      4 Chapter 3Table 3.1. Presence of concepts in the corpus of speeches by the US Secretary of...Table 3.2. Expressed military requirements. Reconstituted table from the article...Table 3.3. Reproduction of the matrix published in [ECK 84]Table 3.4. Some works and themes related to the use of expert systems in the mil...Table 3.5. Selected publications dealing with stand-alone weapons

      5 Appendix 1Table A1.1. A chronology of AI dates and milestones

      6 Appendix 2Table A2.1. The place of AI in the U.S. military doctrinal corpus (Joint Publica...

      7 Appendix 3Table A3.1. AI and its associated concepts, search in DoD documents dedicated to...

      8 Appendix 4Table A4.1. AI in U.S. Navy documents

      9 Appendix 5Table A5.1. AI in U.S. Marine Corps documents

      10 Appendix 6Table A6.1. AI in U.S. Air Force documents

      11 ConclusionTable C.1. Searching for AI references in some recent national cybersecurity str...

      Guide

      1  Cover

      2  Table of Contents

      3  Title Page

      4  Copyright

      5  Introduction

      6  Begin Reading

      7  Conclusion

      8  Appendices

      9  Appendix 1: A Chronology of AI

      10  Appendix 2: AI in Joint Publications (Department of Defense, United States)

      11  Appendix 3: AI in the Guidelines and Instructions of the Department of Defense (United States)

      12  Appendix 4: AI in U.S. Navy Instructions

      13  Appendix 5: AI in U.S. Marine Corps Documents

      14  Appendix 6: AI in U.S. Air Force Documents

      15  References

      16  Index

      17  End User License Agreement

      Pages

      1  v

      2  iii

      3  iv

      4  ix

      5  x

      6  xi

      7  xii

      8  xiii СКАЧАТЬ