Abaimov, S., & Martellini, M. (2020). Cyber arms: Security in cyberspace. CRC Press, Taylor & Francis Group. |
|
10/06/2020, 21:59 |
|
Abbass, H. A. (2019). Social integration of artificial intelligence: Functions, automation allocation logic and human-autonomy trust. Cognitive Computation, 11(2), 159–171. |
|
21/06/2021, 11:26 |
|
Abbass, H. A., Scholz, J., & Reid, D. J. (2018). Foundations of trusted autonomy. Springer International Publishing. |
|
12/06/2020, 12:04 |
|
Abbeel, P., Coates, A., Quigley, M., & Ng, A. (2006). An application of reinforcement learning to aerobatic helicopter flight. Advances in Neural Information Processing Systems, 19. |
|
19/02/2024, 15:11 |
|
Abdel-Basset, M., Gamal, A., Moustafa, N., Abdel-Monem, A., & El-Saber, N. (2021). A security-by-design decision-making model for risk management in autonomous vehicles. IEEE Access, 9, 107657–107679. |
|
14/06/2023, 18:25 |
|
Abderhalden, N. (2022). risk hindered decision making: how the dod’s faulty understanding of risk jeopardizes its strategy. The Strategy Bridge. |
|
29/05/2022, 09:05 |
|
Abell, T. (2020). Artificial intelligence ethics and debates. North Star Editions. |
|
10/06/2020, 17:04 |
|
Aberdeen, D., Thi'ebaux, S., Zhang, L., & others. 2004, Decision-theoretic military operations planning.. Paper presented at ICAPS. |
|
30/06/2020, 09:40 |
|
Abiteboul, S., Dowek, G., & Nelson, K. R. (2020). The age of algorithms. Cambridge University Press. |
|
11/06/2020, 03:03 |
|
Acton, J. M. (2018). Escalation through entanglement: How the vulnerability of command-and-control systems raises the risks of an inadvertent nuclear war. International Security, 43(1), 56–99. |
|
23/11/2021, 13:56 |
|
Adadi, A., & Berrada, M. (2018). Peeking inside the black-box: A survey on explainable artificial intelligence (xai). IEEE Access, 6, 52138–52160. |
|
29/06/2020, 16:09 |
|
Addo, A., Centhala, S., & Shanmugam, M. (2020). Artificial intelligence design and solution for risk and security. Business Expert Press. |
|
10/06/2020, 16:56 |
|
Agadakos, I., Agadakos, N., Polakis, J., & Amer, M. R. 2020, Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic rf device fingerprinting. Paper presented at 2020 IEEE European Symposium on Security and Privacy (EuroS&P). |
|
04/10/2021, 16:22 |
|
Agarwal, R. K. (2018). Advances in some hypersonic vehicles technologies. IntechOpen. |
|
11/06/2020, 01:36 |
|
Agency, D. I. (2019). Challenges to security in space. Independently Published. |
|
22/06/2020, 13:16 |
|
Aggarwal, A., Chauhan, A., Kumar, D., Mittal, M., & Verma, S. (2020). Classification of fake news by fine-tuning deep bidirectional transformers based language model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium. |
|
28/10/2020, 13:54 |
|
Aghajan, H., Augusto, J. C., & Delgado, R. L. C. (2009). Human-centric interfaces for ambient intelligence. Elsevier Science. |
|
11/06/2020, 02:47 |
|
Ahirwar, K. (2019). Generative adversarial networks projects: Build next-generation generative models using tensorflow and keras. Packt Publishing. |
|
24/06/2020, 14:50 |
|
Ahlqvist, C. O., & Ahlgren, M. 2022. Analog computer prototyping for the future. |
|
18/05/2023, 20:54 |
|
Ahmed, S., & Bajema, N. 2019. Artificial intelligence, china, russia, and the global order Technological, political, global, and creative perspectives. Air University Press. 158566295X. |
|
01/07/2020, 12:25 |
|