|
Showing 1 - 5 of
5 matches in All Departments
This book will raise awareness on emerging challenges of
AIempowered cyber arms used in weapon systems and stockpiled in the
global cyber arms race. Based on real life events, it provides a
comprehensive analysis of cyber offensive and defensive landscape,
analyses the cyber arms evolution from prank malicious codes into
lethal weapons of mass destruction, reveals the scale of cyber
offensive conflicts, explores cyber warfare mutation, warns about
cyber arms race escalation and use of Artificial Intelligence (AI)
for military purposes. It provides an expert insight into the
current and future malicious and destructive use of the evolved
cyber arms, AI and robotics, with emphasis on cyber threats to
CBRNe and critical infrastructure. The book highlights
international efforts in regulating the cyber environment, reviews
the best practices of the leading cyber powers and their
controversial approaches, recommends responsible state behaviour.
It also proposes information security and cyber defence solutions
and provides definitions for selected conflicting cyber terms. The
disruptive potential of cyber tools merging with military weapons
is examined from the technical point of view, as well as legal,
ethical, and political perspectives.
This book will raise awareness on emerging challenges of
AIempowered cyber arms used in weapon systems and stockpiled in the
global cyber arms race. Based on real life events, it provides a
comprehensive analysis of cyber offensive and defensive landscape,
analyses the cyber arms evolution from prank malicious codes into
lethal weapons of mass destruction, reveals the scale of cyber
offensive conflicts, explores cyber warfare mutation, warns about
cyber arms race escalation and use of Artificial Intelligence (AI)
for military purposes. It provides an expert insight into the
current and future malicious and destructive use of the evolved
cyber arms, AI and robotics, with emphasis on cyber threats to
CBRNe and critical infrastructure. The book highlights
international efforts in regulating the cyber environment, reviews
the best practices of the leading cyber powers and their
controversial approaches, recommends responsible state behaviour.
It also proposes information security and cyber defence solutions
and provides definitions for selected conflicting cyber terms. The
disruptive potential of cyber tools merging with military weapons
is examined from the technical point of view, as well as legal,
ethical, and political perspectives.
This SpringerBrief explores features of digital protocol wireless
communications systems, and features of the emerging electrical
smart grid. Both low power and high power wireless systems are
described. The work also examines the cybersecurity
vulnerabilities, threats and current levels of risks to critical
infrastructures that rely on digital wireless technologies.
Specific topics include areas of application for high criticality
wireless networks (HCWN), modeling risks and vulnerabilities,
governance and management frameworks, systemic mitigation, reliable
operation, assessing effectiveness and efficiency, resilience
testing, and accountability of HCWN. Designed for researchers and
professionals, this SpringerBrief provides essential information
for avoiding malevolent uses of wireless networks. The content is
also valuable for advanced-level students interested in security
studies or wireless networks.
The cyber world has been both enhanced and endangered by AI. On the
one hand, the performance of many existing security services has
been improved, and new tools created. On the other, it entails new
cyber threats both through evolved attacking capacities and through
its own imperfections and vulnerabilities. Moreover, quantum
computers are further pushing the boundaries of what is possible,
by making machine learning cyber agents faster and smarter. With
the abundance of often-confusing information and lack of trust in
the diverse applications of AI-based technologies, it is essential
to have a book that can explain, from a cyber security standpoint,
why and at what stage the emerging, powerful technology of machine
learning can and should be mistrusted, and how to benefit from it
while avoiding potentially disastrous consequences. In addition,
this book sheds light on another highly sensitive area - the
application of machine learning for offensive purposes, an aspect
that is widely misunderstood, under-represented in the academic
literature and requires immediate expert attention.
The cyber world has been both enhanced and endangered by AI. On the
one hand, the performance of many existing security services has
been improved, and new tools created. On the other, it entails new
cyber threats both through evolved attacking capacities and through
its own imperfections and vulnerabilities. Moreover, quantum
computers are further pushing the boundaries of what is possible,
by making machine learning cyber agents faster and smarter. With
the abundance of often-confusing information and lack of trust in
the diverse applications of AI-based technologies, it is essential
to have a book that can explain, from a cyber security standpoint,
why and at what stage the emerging, powerful technology of machine
learning can and should be mistrusted, and how to benefit from it
while avoiding potentially disastrous consequences. In addition,
this book sheds light on another highly sensitive area - the
application of machine learning for offensive purposes, an aspect
that is widely misunderstood, under-represented in the academic
literature and requires immediate expert attention.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|