AI Strategy and Concepts Bibliography

List Resources

Displaying 1 - 20 of 68 (Bibliography: WIKINDX Master Bibliography)
Parameters
Subcategory:  Cyber
Order by:

Ascending
Descending
Use all checked: 
Use all displayed: 
Use all in list: 
Aggarwal, A., Chauhan, A., Kumar, D., Mittal, M., & Verma, S. (2020). Classification of fake news by fine-tuning deep bidirectional transformers based language model. EAI Endorsed Transactions on Scalable Information Systems Online First; EAI: Ghent, Belgium,  
Last edited by: SijanLibrarian 2020-10-28 13:54:29 Pop. 0%
Baonan, W., Feng, H., Huanguo, Z., & Chao, W. (2019). From evolutionary cryptography to quantum artificial intelligent cryptography. Journal of Computer Research and Development, 56(10), 2112.  
Last edited by: SijanLibrarian 2021-07-12 09:45:59 Pop. 0%
Blasch, E., Schuck, T., & Gagne, O. B. (2021). Trusted entropy-based information maneuverability for ai information systems engineering. In Engineering Artificially Intelligent Systems (pp. 34–52).Springer.  
Last edited by: SijanLibrarian 2022-07-21 10:16:07 Pop. 0%
Booker, C. M. (2013). First-strike advantage: The united states' counter to china's preemptive integrated network electronic warfare strategy AIR UNIV MAXWELL AFB AL SCHOOL OF ADVANCED AIR AND SPACE STUDIES.  
Last edited by: SijanLibrarian 2021-08-17 10:12:55 Pop. 0%
Carlin, J. P., & Graff, G. M. (2019). Dawn of the code war: America's battle against russia, china, and the rising global cyber threat. PublicAffairs.  
Last edited by: SijanLibrarian 2020-06-25 10:16:56 Pop. 0%
Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal,  
Last edited by: SijanLibrarian 2020-08-12 09:34:25 Pop. 0%
Devlin, J., Chang, M.-W., Lee, K., & Toutanova, K. (2018). Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805,  
Last edited by: SijanLibrarian 2020-10-28 16:47:50 Pop. 0%
Dulhanty, C., Deglint, J. L., Daya, I. B., & Wong, A. (2019). Taking a stance on fake news: Towards automatic disinformation assessment via deep bidirectional transformer language models for stance detection. arXiv preprint arXiv:1911.11951,  
Last edited by: SijanLibrarian 2020-10-28 16:50:42 Pop. 0%
Elhefnawy, N. (2021). 'a sixth generation fighter?' an update. An Update (May 4, 2021),  
Last edited by: SijanLibrarian 2021-05-18 15:31:32 Pop. 0%
Elonheimo, T. (2021). Comprehensive security approach in response to russian hybrid warfare. Strategic Studies Quarterly, 15(3).  
Last edited by: SijanLibrarian 2021-09-21 14:27:56 Pop. 0%
Fenstermacher, L., Perez, M., Larson, K., & Rice, K. 2021, A playbook for characterization of multi-domain information. Paper presented at Signal Processing, Sensor/Information Fusion, and Target Recognition XXX.  
Last edited by: SijanLibrarian 2021-09-15 13:49:55 Pop. 0%
Ferreira, P. V. R., Paffenroth, R., Wyglinski, A. M., Hackett, T. M., Bilen, S. G., & Reinhart, R. C., et al. (2018). Multiobjective reinforcement learning for cognitive satellite communications using deep neural network ensembles. IEEE Journal on Selected Areas in Communications, 36(5), 1030–1041.  
Last edited by: SijanLibrarian 2021-04-26 09:21:12 Pop. 0%
Fugate, S., & Ferguson-Walter, K. (2019). Artificial intelligence and game theory models for defending critical networks with cyber deception. AI Magazine, 40(1), 49–62.  
Last edited by: SijanLibrarian 2020-10-28 13:50:29 Pop. 0%
Gia, T. N., Nawaz, A., Querata, J. P. N., Tenhunen, H., & Westerlund, T. 2019, Artificial intelligence at the edge in the blockchain of things. Paper presented at International Conference on Wireless Mobile Communication and Healthcare.  
Last edited by: SijanLibrarian 2020-08-12 09:42:21 Pop. 0%
Graber, M. M. (2021). Using artificial intelligence and machine learning to tackle big data. ISR Research Task Force - ACSC,  
Last edited by: SijanLibrarian 2021-12-07 15:27:39 Pop. 0%
Grooms, G. B. (2019). Artificial intelligence applications for automated battle management aids in future military endeavors Naval Postgraduate School Monterey United States.  
Last edited by: SijanLibrarian 2020-11-04 10:23:34 Pop. 0%
Gu, T., Dolan-Gavitt, B., & Garg, S. (2017). Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733,  
Last edited by: SijanLibrarian 2020-11-18 11:34:52 Pop. 0%
Haigh, K., & Andrusenko, J. (2021). Cognitive electronic warfare: An artificial intelligence approach. Artech House.  
Last edited by: SijanLibrarian 2022-01-03 12:41:58 Pop. 0%
Heller, C. H. (2019). Near-term applications of artificial intelligence. Naval War College Review, 72(4), 73–100.  
Last edited by: SijanLibrarian 2020-10-15 16:57:00 Pop. 0%
Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. 2011, Adversarial machine learning. Paper presented at Proceedings of the 4th ACM workshop on Security and artificial intelligence.  
Last edited by: SijanLibrarian 2022-01-03 16:53:52 Pop. 0%
1 - 20  |  21 - 40  |  41 - 60  |  61 - 68
wikindx 6.2.2 ©2003-2020 | Total resources: 1411 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA) | Database queries: 23 | DB execution: 0.01467 secs | Script execution: 0.02904 secs