Cargando…

Artificial Intelligence, Cybersecurity and Cyber Defence

This book explains the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ventre, Daniel
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2020.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1204136680
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 201107s2020 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d EBLCP  |d LIV  |d REDDC  |d OCLCF  |d IEEEE  |d K6U  |d OCLCQ  |d OCLCO 
020 |a 9781119788188 
020 |a 1119788188 
020 |a 9781119788195  |q (electronic bk.) 
020 |a 1119788196  |q (electronic bk.) 
020 |a 9781119788171  |q (electronic bk.) 
020 |a 111978817X  |q (electronic bk.) 
024 7 |a 10.1002/9781119788195  |2 doi 
029 1 |a AU@  |b 000069691911 
029 1 |a AU@  |b 000072393476 
035 |a (OCoLC)1204136680 
037 |a 9820917  |b IEEE 
050 1 4 |a HF5548.37  |b .V46 2020 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Ventre, Daniel. 
245 1 0 |a Artificial Intelligence, Cybersecurity and Cyber Defence  |h [electronic resource]. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2020. 
300 |a 1 online resource (222 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Introduction -- Contents -- Introduction -- 1. On the Origins of Artificial Intelligence -- 1.1. The birth of artificial intelligence (AI) -- 1.1.1. The 1950s-1970s in the United States -- 1.1.2. AI research in China -- 1.1.3. AI research in Russia -- 1.1.4. AI research in Japan -- 1.1.5. AI research in France -- 1.2. Characteristics of AI research -- 1.3. The sequences of AI history -- 1.4. The robot and robotics -- 1.5. Example of AI integration: the case of the CIA in the 1980s 
505 8 |a 1.5.1. The CIA's instruments and methods for understanding and appropriating AI adapted to its needs -- 1.5.2. Focus groups, research, coordination -- 1.5.3. The network of interlocutors outside the intelligence community -- 1.5.4. What AI applications for what intelligence needs? -- 2. Concepts and Discourses -- 2.1. Defining AI -- 2.1.1. AI -- 2.1.2. Expert systems -- 2.1.3. Machine learning and deep learning -- 2.1.4. The robot, robotics -- 2.2. Types of AI -- 2.3. Evolution of the themes over time -- 2.3.1. Google Trends -- 2.3.2. The AAAI magazine 
505 8 |a 2.4. The stories generated by artificial intelligence -- 2.4.1. The transformative power of AI -- 2.4.2. The absolute superiority of human intelligence over the machine -- 2.4.3. The replacement of humans by machines -- 2.4.4. AI as an existential threat -- 2.4.5. The place of AI and robotics in fiction: the example of Japan -- 2.5. Political considerations -- 2.5.1. National strategies for artificial intelligence -- 2.5.2. U.S. policy -- 3. Artificial Intelligence and Defense Issues -- 3.1. Military policies and doctrines for AI: the American approach -- 3.1.1. American defense AI policy 
505 8 |a 3.1.2. AI in American military doctrines -- 3.2. Military AI in Russia -- Wars and armies are becoming more and more technologically advanced -- AI and robotics will give rise to new weapons but probably not androids -- AI can be applied to all military functions -- AI paves the way for new operational modes -- AI feeds the information space, constructs it and enriches it -- It is essential to take into consideration the question of the relationship between humans and AI -- Dependence on and effectiveness of intelligent systems does not preclude the issue of trust 
505 8 |a Can AI be a weapon of dissuasion? What is the strategic role of AI? -- The economic dimension is a key factor that legitimizes military AI research and the integration of AI into armies and warfare. -- 3.3. AI and the art of warfare -- 3.3.1. Manuel de Landa: war in the age of intelligent machines -- 3.3.2. AI announcing a new RMA? -- 3.3.3. Applications of AI in the military field -- 3.3.4. Expert systems in military affairs -- 3.3.5. Autonomous weapons -- 3.3.6. Robotics and AI -- 3.4. AI and cyber conflict -- 3.4.1. Malware, cybersecurity and AI -- 3.4.2. AI and cyberweapons 
520 |a This book explains the appropriation of artificial intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of artificial intelligence. --  |c Edited summary from book. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Artificial intelligence. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Intelligence artificielle. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a artificial intelligence.  |2 aat 
650 7 |a Artificial intelligence  |2 fast 
650 7 |a Computer networks  |2 fast 
776 0 8 |i Print version:  |a Ventre, Daniel  |t Artificial Intelligence, Cybersecurity and Cyber Defence  |d Newark : John Wiley & Sons, Incorporated,c2020  |z 9781786304674 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6384365  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6384365 
994 |a 92  |b IZTAP