Читать книгу Artificial Intelligence, Cybersecurity and Cyber Defence - Daniel Ventre - Страница 3
List of Illustrations
Оглавление1 Chapter 1Figure 1.1. The first artificial intelligence computer program “Logic Theorist”,...Figure 1.2. The organizers of a “conference” (two-month program) at Dartmouth Co...Figure 1.3. Geographic distribution of Chinese universities investing in AI betw...Figure 1.4. Location of Akademgorodok (district of the city of Novosibirsk)Figure 1.5. Manchester University Robot24. For a color version of this figure, s...
2 Chapter 2Figure 2.1. Cloud of terms built up from the set of definitions12 in Table 2.1. ...Figure 2.2. Cloud of terms built from the expert system definitions in Table 2.2...Figure 2.3. Google Trends. Evolution of queries in the world related to “artific...Figure 2.4. Evolution of the presence of the concept of “expert systems” in AAAI...Figure 2.5. Evolution of the presence of the “Machine Learning” concept in AAAI ...Figure 2.6. Evolution of the presence of the “robot” concept in AAAI publication...Figure 2.7. Evolution of the presence of the “autonomous/autonomy” concept in AA...Figure 2.8. Evolution of the presence of the “military” concept in AAAI publicat...Figure 2.9. Evolution of the presence of the concept of “security” in AAAI publi...Figure 2.10. Evolution of the presence of the concept of “combat” in AAAI public...Figure 2.11. Evolution of the presence of the concepts “law” and “ethics” in AAA...Figure 2.12. Cloud of the 65 most commonly used terms in the OSTP Request for In...Figure 2.13. Cloud of the 65 most commonly used terms in the report “Preparing f...Figure 2.14. Cloud of the 65 most commonly used terms in “The national artificia...
3 Chapter 3Figure 3.1. QDR (1997, 2001, 2006, 2010, 2014) and NDS 2018. For a color version...Figure 3.2. QDRs from 1997 to 2018. For a color version of this figure, see www....Figure 3.3. The theme “robot” (robot, robotics) in NCARAI publications. Period 1...Figure 3.4. The theme “autonomy” (autonomy, autonomous) in NCARAI publications. ...Figure 3.5. The “robot” (robotics), “artificial intelligence” and “cyber” themes...Figure 3.6. The “artificial intelligence” and “cyber” themes in NCARAI publicati...Figure 3.7. AI is a component of cyberspace, which is itself a subset of informa...Figure 3.8. A simple modeling of cyberspace in three layersFigure 3.9. AI is present in each of the three layers of cyberspace. It extends ...Figure 3.10. Within each of the three layers of cyberspace, there are actors of ...Figure 3.11. In cyberspace, each of the layers has its own methods of hacking, a...Figure 3.12. If V represents cyberspace and R represents the non-cybernetic worl...Figure 3.13. An attack can exploit one or more of the layers of cyberspace to pr...Figure 3.14. Positioning AI in a cyberattack. AI malware will sometimes be oppos...Figure 3.15. Can an AI malware have a true panoptic or global view of its enviro...Figure 3.16. Attack and secure/defend, with or without AIFigure 3.17. Screenshot of the hkmap.live application (October 11, 2019). For a ...