The Interweaving of Cybersecurity and Artificial Intelligence

By Rear Admiral Dr. S. Kulshrestha (Retd.), Indian Navy

By Rear Admiral Dr. S. Kulshrestha (Retd.), Indian Navy

The Interweaving of Cybersecurity and Artificial Intelligence

On September 28, 2018, the Facebook security team disclosed that hackers/criminals had exploited three vulnerabilities in the Facebook site and have managed to steal data of 50 million users [1].

In this article, an effort would be made to acquaint the discerning reader with the fact as to how cybersecurity has now firmly placed itself in the National Security discourse and has attracted emerging technology of artificial intelligence (AI) to strengthen it. It has also been attempted to bring out the interplay between cybersecurity and AI namely; how at first AI was used to keep hackers/criminals/criminals at bay; how the hackers/criminals utilized AI as a countermeasure in breaching cybersecurity; and now how AI is being used to counter AI as the game plays out between cybersecurity engineers and the hackers/criminals and their ilk

The data loss on Facebook through illegal means has occurred in a space that is not physical. It is referred to as ‘cyberspace’ and the crime as ‘cybercrime’ due to the exploitation of vulnerabilities in the ‘cybersecurity’ of the Facebook website. There is a need to define the term cyberspace; however, the term does not have a single agreed-upon definition as yet, as may be clear upon the perusal of the following definitions:

-The word "cyberspace" is said to be coined by William Gibson in his book Neuromancer where he has defined it as, "a consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts... A graphical representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the non-space of the mind, clusters, and constellations of data."[2]

-Cambridge dictionary defines it as ‘an electronic system that allows computer users around the world to communicate with each other or to access information for any purpose [3].

-Cyberspace is defined as the interdependent network of information technology infrastructures and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries. Common usage of the term also refers to the virtual environment of information and interactions between people. (DRAFT National Strategy for Trusted Identities in Cyberspace. June 25, 2010) [4].

Damir Rajnovic while writing at Cisco Blogs[5] has provided a consolidated list of various definitions of cyberspace some of them are given below:

-Cyberspace is the virtual space of all IT systems linked at the data level on a global scale. The basis for cyberspace is the Internet as a universal and publicly accessible connection and transport network which can be complemented and further expanded by any number of additional data networks. IT systems in an isolated virtual space are not part of cyberspace. (Germany, Cybersecurity Strategy for Germany, 2011) [6].

-Cyberspace is an interactive domain made up of digital networks that are used to store, modify and communicate information. It includes the internet, but also the other information systems that support our businesses, infrastructure and services. (the United Kingdom, The UK Cybersecurity Strategy, 2011)[7].

The complex environment resulting from the interaction of people, software and services on the Internet by means of technology devices and networks connected to it, which does not exist in any physical form (ISO/IEC 2011)[8].

Damir Rajnovic’s analysis of various definitions brings out majoritarian views that; cyberspace contains tangible elements but is virtual; cyberspace includes information whether stored, processed or transmitted; and that internet and networks are not an essential requirement for cyberspace [9].

The National Cybersecurity policy of India observes that ‘the cyberspace today is a common pool used by citizens, businesses, critical information infrastructure, military and governments in a manner that makes it difficult to draw clear boundaries among these different groups. The cyberspace is expected to be more complex in the foreseeable future, with many folds increase in networks and devices connected to it.’[10]

Definitions of some other terms are briefly listed below:

Cybersecurity

-ISO/IEC 27032 addresses “Cybersecurity” or “the Cyberspace security”, defined as the “preservation of confidentiality, integrity, and availability of information in the Cyberspace” [11].

- The Glossary of Cybersecurity Terms states it as “The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.” And continues to provide an extended definition: “Strategy, policy, and standards regarding the security of and operations in cyberspace, and encompassing the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure” [12]. 

Hacker

An unauthorized user who attempts to or gains access to an information system. 

Hacktivist

-  A computer hacker whose activity is aimed at promoting a social or political cause.

Cybersecurity


Dunn in her extensive analysis of Cybersecurity has opined that there are three interrelated discourses, firstly the technical discourse which concerns itself with intrusions into systems and use of malware, the second one is about the cyber-espionage and cyber-crime, and the last one dedicated to the protection of critical infrastructure and cyber-war [15]. 

The computer and network disruptions are a result of various types of malware which invariably keeps pace with the countermeasures and indicates the sophisticated know-how of the malware designers. The attacker virtually carries out a tailor-made attack after assessing the vulnerabilities of the target, and the motivation could be anything from publicity to harassment to criminal intent. However, a substantial percentage of such attacks, including advanced persistent threat attacks, have not been so sophisticated that they could not be detected or stopped after detection. Christensson has defined Cyber-crime as  'a criminal activity done using computers and the Internet’ [16]. It’s an expansive definition which covers all aspects of illegal activities perpetrated using computers and the internet. This definition implicitly includes identity theft and ransom. Techopedia defines cybercrime as "… a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes)."

Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers/criminals. Cybercrime may also be referred to as computer crime [17].  Digit in their technical guide has listed twelve significant cybercrimes which include, hacking (e.g. SQL injections, cross-site scripting), Virus dissemination, logic bombs, denial of service attacks, phishing, web jacking, email spam and bombing, identity theft, software piracy among others. This implies that any illegal activity; e.g. child pornography, cyber fraud or net extortion; carried out utilizing electronic means is a cybercrime [18].  However, the vagaries of the attribution problem—that is the difficulty in precisely determining those perpetrating a cyber-attack as well as identifying their motivating factors continue to pose a formidable challenge.

Cyberspace component would play a role in future conflicts between nations, but it may not be the only component of the war, it may be better to identify such conflicts as conflicts where in cyberspace component lies on the critical path of events leading to success. Dunn, therefore, cautions against the loose use of the term cyber-war, lest it led to an atmosphere of unnecessary insecurity and tension between states [19].


Is cybersecurity a national security issue?


Some authors like Thomas Rid, argue that cyberwar does not meet the triple criterion of war as is known today, namely; potentially violent, as a means to an end, and being political. He categorically states that no cyber ‘incident’ has ever taken a single life, and never will because of the many obstacles that prevent the possibility of a kinetic effect [20].  On the other hand, New York Times in 2012 has quoted the then-Defense Secretary Leon E. Panetta; concerning destructive capabilities of a cyber-attack; as stating that “cyber-actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack.” Would result as a “cyber-Pearl Harbour that would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability.”[21] Irandoost in his essay[22] has extensively analyzed the diametrically opposite views that exist on the possibility of cyberwar and has given a balanced view gleaned from the works of Kristan Stoddart[23]. The view is that when cybersecurity is scrutinized on the technical aspects, it is found that trends and evidence indicate that there is a substantial ‘potential’ for damage from cyber-attacks. Various incidents like the Stuxnet in Iran targeting nuclear enrichment facilities, attack on Estonia in 2007 targeting communications and financial systems, attack on command and control systems in Georgia in 2008, attacks on Sony and Facebook among others leads Irandoost to surmise that there is an increasing trend towards ‘potential’ cyber incidents of a wide-ranging scale, harming nations at a strategic or political level[24].

Malicious cyber activity

The Council of Economic Advisers, in their document ‘The Cost of Malicious Cyber Activity to the U.S. Economy, February 2018’[25]  have brought out that:

-malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016.-damages from cyber-attacks and cyber theft may spill over from the initial target to economically linked firms, thereby magnifying the damage to the economy.

-and cyber-attacks against critical infrastructure sectors could be highly damaging to the U.S. economy.

Given the aforesaid, the USA has incorporated cybersecurity as an integral part of its National Security Strategy.


Cybersecurity finds a place in the US' National Security Strategy


Carlota Garcia Encina in his working paper[26] has carried out a relatively detailed study of the US National Security Strategy 2017 (NSS)[27]. He has brought out that cybersecurity is an essential feature in three of the total four pillars of the NSS. At page 11, NSS heeds the requirement to ‘confront the challenge of terrorists and criminals “going dark” and using secure platforms to evade detection’ and therefore the need to find synergies with the private sector. Under the second pillar, the NSS categorizes China’s actions are as ‘cyber-enabled economic warfare’ (NSS p. 20). Under this pillar, there is an important correlation between cybersecurity and prosperity of the USA. At page 18, NSS stresses that ‘economic and personal transactions are dependent on the “.com world”, and wealth creation depends on a reliable, secure Internet’ this, in turn, would imply that challenges of cybersecurity present a threat to the economic security of the USA.

The third pillar emphasizes the need for investments in rapid response capabilities against cyber-attacks. The NSS brings out that the cyber capabilities of Russia are characterized as ‘destabilizing’ (NSS p. 26) and that ‘through modernized forms of subversive tactics, Russia interferes in the domestic political affairs of countries around the world’[28]. 

Cybersecurity Trends for 2018.BojanaDobran has compiled predictions in respect of cybersecurity trends for 2018 made by 32 experts in the field [29]. The trends bring out that:

-There is a need to focus on the behavior of the user as the user is the weakest link in the chain. -Inadequate cyber hygiene is being followed by personnel, and they need to be trained and sensitized to cybersecurity aspects. The organizations also have inadequate numbers of cybersecurity personnel.

-There is a requirement to focus on the protection of essential data using data encryption and data security technologies to prevent access to it after a breach occurs. Passwords need to be more secure, or a move towards a password-less future could be made. The storage of data in the cloud needs to be strengthened by regular audits and restricting permissions on cloud resources.

-Organized or state-backed hacking is on the rise.

-The hackers/criminals are already using artificial intelligence tools for malware dissemination and data retrieval. Ransomware attacks utilize the latest technologies. Identity thefts and personal information continue to have massive demand in the black market.


Data Breaches in 2018


Some of the significant breaches compiled by Barkly include that of Exactis, a marketing and data aggregation firm based in Florida; it had left a database exposed on a publicly accessible server leading to the breaching of 340 million records in June 2018. In March 2018, Under Armour realized that hackers/criminals had gained unauthorized access to MyFitnessPal, and 150 million records were breached about users’ diet and exercise. 92 million records of genealogy platform MyHeritage were found on a private server in June 2018. In April 2018 Facebook intimated 87 million members that their data had been shared [30], besides as already indicated elsewhere Facebook has had a breach of data pertaining to 50 million users, at the end of September 2018.

Artificial Intelligence (AI)


Artificial intelligence has not yet been defined in a manner which is globally acceptable. Some of the definitions are:

- "The branch of computer science that is concerned with the automation of intelligent behavior" [31]. 

-"The art of creating machines that perform functions requiring intelligence when performed by people" [32]. 

- "The study of how to make computers do things at which, at the moment, people are better" [33]. 

- "The study of mental faculties through the use of computational models" [34].

The various applications of AI include speech recognition, natural language processing, expert systems, neural networks, intelligent robotics, gaming, and 3D vision. However, the current developments are primarily based on Machine learning (ML). ML has evolved from the study of computational learning theory, pattern recognition, and artificial intelligence. It is a subfield of computer science [35].  It was defined in 1959 by Arthur Samuel as a "Field of study that gives computers the ability to learn without being explicitly programmed". Machine learning (ML) relies upon utilizing algorithm constructions to perform predictive analysis of data [36]. Machine learning tasks fall in to three basic categories namely [37]; Supervised learning is one in which the computer is presented with example inputs and their desired outputs, and the goal is to learn a general rule that maps inputs to outputs; Unsupervised learning is one where no labels are given to the learning algorithm, leaving it on its own to find structure in its input; and Reinforcement learning is one where a computer program interacts with a dynamic environment in which it must perform a specific goal [38]. 


AI and National Security


AI finds mention in the US National Security Strategy 2017 under ‘Information Statecraft’ (NSS pg. 34-35) as ‘Risks to US national security will grow as competitors integrate information derived from personal and commercial sources with intelligence collection and data analytic capabilities based on AI and machine learning’.  In April 2017, an Algorithmic Warfare Cross-Functional Team (AWCFT) was established to accelerate the US Department of Defense (DoD)'s integration of big data and machine learning. The aim is to turn extensive data available with DoD into intelligence which can be actioned upon rapidly [40].


The Interweaving of Cybersecurity and Artificial Intelligence


The rapid advances in AI and their commercial accessibility have ensured that AI and cybersecurity have got interwoven at various levels. AI is being used to reinforce cybersecurity, on the other hand, the hackers/criminals are using AI to break through traditional cybersecurity systems. Also, recently AI has been seen to be used by hackers/criminals to counter the AI secured cyber systems. In the following section, an overview of all three types of cases would be presented for better appreciation.

AI in aid of cybersecurity/defense

AI utilizes a large number of concepts like Machine Learning, Fuzzy Logic Control Systems, and Artificial Neural Networks (ANNs), among others. each of which singly or in combination are theoretically amenable for designing an efficient cyber-defense system. The designed AI cyber defense system should proficiently monitor the network in real time and must be aware of all the activities that are being carried out by the network. The system should be able to heal and protect itself. It should have self-diagnostic capabilities and sufficient inbuilt redundancies to function satisfactorily for a specified period [41].

Horowitz, Allen et al.  in their report ‘Artificial Intelligence and International Security’ for the Center for a New American Security have discussed in brief about the areas where AI is found to be strengthening the cybersecurity aspects, and these are being brought out in the next couple of paragraphs [42]. Defense Innovation Unit Experimental (DIUx) launched a project called VOLTRON to harness commercial technologies and breakthrough artificial intelligence to detect and patch previously unknown vulnerabilities in DoD weapon systems. Companies were required to respond to a single-sentence solicitation: “The Department of Defense (DoD) is interested in systems to automatically find previously unreported vulnerabilities in software without source code and automatically generate patches to remediate vulnerabilities with minimal false positives.” Within a year the DIUx has awarded contracts to four companies, and their tools are being prototyped in the US Armed Forces [43].

Using AI to Discover New Cyber Vulnerabilities and Attack Vectors

AI/ML is being utilized to predict locations in files which are likely to be susceptible to a mutated malware based upon learning from previous attacks. For discovering security vulnerabilities, adversarial networks and neural networks techniques have been demonstrated to forecast which types of inputs could breach the system.

AI is also being utilized to verify, test, validate and secure existing vulnerabilities like SQL injection which have not been remedied using traditional techniques.

Machine learning can be applied to cybersecurity under supervised and unsupervised categories. Under the supervised category, ML has made a significant difference in cases where a large amount of ‘good’ labeled data is available and hardly any progress where such data is unavailable. In the unsupervised learning case, approaches like association, clustering and dimensionality reduction can be utilized for easier analysis of large data sets. However, this type of learning has limited use when tasked to detect 'attacks or anomalies' [44].

Bruce Schneier has forecast some of the capabilities that the AI could acquire in the near future these include; discovering new vulnerabilities in systems for patching and exploiting by defensive and offensive systems; reacting and adapting to adversary’s actions; and Identifying strategic and tactical trends from large datasets and using those trends to adapt attack and defines tactics [45].

Use of AI by Hackers/criminals to breach cybersecurity

HP’s 2018 Cybersecurity Guide: ‘Hackers/criminals and defenders harness design and machine learning’ has brought out that every day 6 million to 11 million new malware infections are recorded on computers which run a single antivirus software running just one type of antivirus software.6 About 700 phishing attacks are launched for a scammer to steal personal data or gain access to a business network, and a new malware specimen emerges on the Internet about every four seconds [46]. Sochenda Huang has forecasted that a single hacker would be able to use AI to anonymously program a large-scale attack on billions of machines, from the comfort of his/her own home. He further states that the use of AI in hacking would be to multiply the effect of an attack by enabling hitting on more targets in a lesser amount of time. With the easy availability of AI coding could be put to malicious use as machines instead of humans would do it [47]. AI technology can increase the efficiency of social engineering attacks by the potential to automating target customization and matching targeting data to the phishing message [48]. 

Adversarial examples

Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake. Adversarial examples show that many modern machine learning algorithms can be broken in surprising ways. These failures of machine learning demonstrate that even simple algorithms can behave very differently from what their designers intended [49]. Security engineers are regularly using statistical machine learning. However, the intelligent attackers attempt to ensure that machine language algorithms fail by using deceptive tactics akin to optical illusions to trick them into misbehaving. The winning of the game, therefore, lies in how well the moves of the adversary can be anticipated. To counter this step of the adversary, ‘adversarial machine learning’ is the design of machine learning algorithms such that they can thwart these refined attacks and study the capabilities and shortcomings of attackers [50].

Conclusion


In this article, an attempt was made to acquaint the reader as to how the cybersecurity arena has now moved from the developer’s regime to become a National Security issue especially since the cybersecurity breaches being experienced today have assumed humongous proportions and there also appear to be state-backed cyber-attacks carried out to cripple the critical infrastructure of nations. The discussions also bring out that cybersecurity is not only keeping pace with emerging technologies like AI, it is also putting a strong demand upon them to innovate and develop applications to make cybersecurity stronger. Since this is playing out in the commercial domain, it is not surprising to note that the hackers/criminals and their ilk are also keeping pace with such developments and are devising matching countermeasures using the same emerging technologies. The development mentioned above has led to a situation wherein it is observed that AI has not only strengthened cybersecurity but has got interwoven with cybersecurity at various levels so much so that it now finds a place, albeit a tiny one, in the National Security discourse. Since AI is in its infancy as of now, it would be interesting to see the future developments in this field.

About the Author:

The author RADM Dr. S. Kulshrestha (Retd.), INDIAN NAVY, holds expertise in quality assurance of naval armament and ammunition. He is an alumnus of the National Defence College and a Ph.D. from Jawaharlal Nehru University, New Delhi. He superannuated from the post of Director General Naval Armament Inspection in 2011. He is unaffiliated and writes in defense journals on issues related to Armament technology and indigenization.

Cite this Article:

Kulshrestha, S., "The Interweaving of Cybersecurity and Artificial Intelligence", IndraStra Global Vol.05, Issue No: 06 (2019), 0040, https://www.indrastra.com/2019/06/PAPER-Interweaving-of-Cybersecurity-and-AI-005-06-2019-0040.html, ISSN 2381-3652

References:

[1]  Swati Khandelwal. Facebook Hacked — 10 Important Updates You Need to Know About. The Hacker News. 28 Sep 2018. https://thehackernews.com/2018/09/facebook-account-hacked.html [Accessed: 30 Sep 2018].

[2] Tech Terms. https://techterms.com/definition/cyberspace [Accessed: 25 Sep 2018].

[3] Cambridge Dictionary.https://dictionary.cambridge.org/dictionary/english/cyberspace [Accessed: 25 Sep 2018].

[4] DRAFT National Strategy for Trusted Identities in Cyberspace.
June 25, 2010. https://www.dhs.gov/xlibrary/assets/ns_tic.pdf[Accessed: 20 Sep 2018].

[5] DamirRajnovic. Cyberspace – What is it? Cisco Blogs. 26, July 2012 https://blogs.cisco.com/security/cyberspace-what-is-it [Accessed: 10 Sep 2018].

[6] Germany, “Cybersecurity Strategy for Germany.” Feb-2011. http://www.cio.bund.de/SharedDocs/Publikationen/DE/Strategische-Themen/css_engl_download.pdf?__blob=publicationFile [Accessed: 18 Sep 2018].

[7] United Kingdom, “The UK Cybersecurity Strategy.” Nov-2011. http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf [Accessed: 18 Sep 2018].

[8] ISO/IEC, “ISO/IEC FCD 27032 – Information technology — Security techniques — Guidelines for cybersecurity,” Oct-2011. http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44375. [Accessed: 25 Sep 2018].

[9] 5 ibid.

[10] National Cybersecurity Policy -2013. The Ministry of Electronics and Information Technology (MeitY) Government of India.
http://164.100.94.102/writereaddata/files/downloads/National_cyber_security_policy-2013%281%29.pdf[Accessed: 25 Sep 2018].

[11] ISO/IEC 27032:2012 — Information technology — Security techniques — Guidelines for cybersecurity. http://www.iso27001security.com/html/27032.html[Accessed: 20 Sep 2018].

[12]Glossary of Cybersecurity Terms. Scott Schober.com
https://scottschober.com/glossary-of-cybersecurity-terms/#c[Accessed: 25 Sep 2018].

[13] 12 ibid.

[14] 12 ibid.

[15] Dunn Cavelty, M.Cyber-Security. Contemporary Security Studies, Allan Collins, ed., Oxford University Press, 2012 (Textbook entry).      
https://www.researchgate.net/publication/256018865_Cyber-Security?enrichId=rgreq-a04a2ee9416eb29da163568f53298f47-XXX&enrichSource=Y292ZXJQYWdlOzI1NjAxODg2NTtBUzo5OTE4MjMxMjQyNzUyM0AxNDAwNjU4MzE0ODU1&el=1_x_2&_esc=publicationCoverPdf[Accessed: 15 Sep 2018].

[16] Christensson Per. "Cybercrime Definition."TechTerms. (2006). https://techterms.com/definition/cybercrime.[Accessed Oct 1, 2018].

[17] Techopedia. https://www.techopedia.com/definition/2387/cybercrime[Accessed: 25 Sep 2018].

[18] Digit.https://www.digit.in/technology-guides/fasttrack-to-cyber-crime/the-12-types-of-cyber-crime.html[Accessed: 25 Sep 2018].

[19] 15 ibid.

[20] Rid, T., 2012. Cyber War Will Not Take Place. Journal of Strategic Studies, Vol 35, Issue1, 2012 pp. 5-32.

[21] Miller, E. B. & Shanker, T., Panetta Warns of Dire Threat of Cyber-attack on U.S. New York Times. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyber-attack.html?pagewanted=all&_r=0[Accessed: 25 Sep 2018].

[22] Daniele HadiIrandoost. Cybersecurity: A National Security Issue? E-International Relations Students. May 3, 2018. https://www.e-ir.info/2018/05/03/cybersecurity-a-national-security-issue/[Accessed: 15 Sep 2018].

[23] Stoddart, K., Live Free or Die Hard: U.S.–UK Cybersecurity Policies. Political Science Quarterly, 131(4) 2016, pp. 803-842.

[24] Stoddart, K., UK Cybersecurity and Critical National Infrastructure Protection. Political Science Quarterly, 131(4) 2016, pp. 803-842.

[25] 8 ibid.

[26] The Council of Economic Advisers, The Cost of Malicious Cyber Activity to the U.S. Economy. February 2018.
https://www.whitehouse.gov/wp-content/uploads/2018/02/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf[Accessed: 25 Sep 2018].

[27] Carlota GarcíaEncina. The Trump Administration’s National Security Strategy. Working Paper 14/2018 - 13/7/2018. Real Instituto Elcano.
http://www.realinstitutoelcano.org/wps/wcm/connect/25d788de-9e45-4c6d-acb6-d4e98f89845c/WP14-2018-GarciaEncina-Trump-Administration-National-Security-Strategy.pdf?MOD=AJPERES&CACHEID=25d788de-9e45-4c6d-acb6-d4e98f89845c[Accessed: 10 Sep 2018].

[28] National Security Strategy of the United States of America. White House. Dec 2017.
https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf[Accessed: 20 Sep 2018].

[29] 26 ibid.

[30] BojanaDobran. Cybersecurity Trends: 32 Experts Make Predictions. Phoenix NAP Global IT Services.26 February 2018.
https://phoenixnap.com/blog/cybersecurity-experts-threats-trends[Accessed: 10 Sep 2018].

[31] David Bisson. The 10 Biggest Data Breaches of 2018... So Far. Barkly Blog. Jul 2018
https://blog.barkly.com/biggest-data-breaches-2018-so-far[Accessed: 01 Sep 2018].

[32] Luger, G.F. and Stubblefield, W.A. Artificial Intelligence: Structures and Strategies for Complex
Problem Solving. Benjamin/Cummings. Redwood City, California, second edition.

[33] Kurzweil, R. The Age of Intelligent Machines. MIT Press, Cambridge, Massachusetts
 Rich, E., and Knight, K. Artificial Intelligence. McGraw-Hill, New York, second edition.

[34] Charniak, E., & McDermott, D. Introduction to artificial intelligence.Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA ©1985, ISBN:0-201-11945-5

[35] Britannica. http://www.britannica.com/EBchecked/topic/1116194/machine-learning [Accessed: 25 Sep 2018].

[36] Ron Kohavi; Foster Provost (1998). "Glossary of terms". Machine Learning. 30: 271–274.

[37] Russell, Stuart; Norvig, Peter. Artificial Intelligence: A Modern Approach (2nd ed.). Prentice Hall. ISBN 978-0137903955.

[38] Kulshrestha S. The Challenge of Military Artificial Intelligence. SP Military Year Book 2016-17 (at page 101)
http://go.epublish4me.com/ebook/ebook?id=10092623#/92[Accessed: 25 Sep 2018].

[39] National Security Strategy of the United States of America. White House. Dec 2017.
https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf[Accessed: 10 Sep 2018].

[40] Deputy Secretary of Defense Memorandum Establishment of an Algorithmic Warfare Cross-Functional Team (Project Maven). April 26, 2017.
https://www.govexec.com/media/gbc/docs/pdfs_edit/establishment_of_the_awcft_project_maven.pdf[Accessed: 30 Sep 2018].

[41] Kulshrestha, S., "Artificial Intelligence and Cyber Defense" IndraStra Global Vol. 003, Issue No: 08 (2017) 0041 http://www.indrastra.com/2017/08/AI-Cyber-Defense-003-08-2017-0041.html | ISSN 2381-3652[Accessed: 30 Sep 2018].

[42] Horowitz, Allen et al.  Artificial Intelligence and International Security. Center for a New American Security. July 2018.
https://www.cnas.org/publications/reports/artificial-intelligence-and-international-security [Accessed: 30 Sep 2018].

[43] Zach Walker. VOLTRON: Disrupting DoD Cybersecurity with Artificial Intelligence
August 2, 2018.https://www.linkedin.com/pulse/voltron-disrupting-dod-cybersecurity-artificial-zach-walker/ [Accessed: 22 Sep 2018].

[44] Raffael Marty. AI in Cybersecurity. Towards Data Science.
https://towardsdatascience.com/ai-and-machine-learning-in-cyber-security-d6fbee480af0 [Accessed: 26 Sep 2018].

[45] Bruce Schneier. Artificial Intelligence and the Attack/Defense Balance. IEEE Computer and Reliability Societies. March/April 2018
https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8328965 [Accessed: 10 Sep 2018].

[46] Hackers/criminals and defenders harness design and machine learning. HP Inc.2018. http://www8.hp.com/h20195/v2/GetPDF.aspx/4AA7-2519ENW.pdf

[47] Sochenda Huang. Cyber Criminals’ Exploitation of Artificial Intelligence. International Risk Assessment and Horizon Scanning Symposium 2017. https://www.nscs.gov.sg/irahss-2017-think-pieces/public-data/doc/cyber-criminals-exploitation-of-artificial-intelligence-by-sochenda-huang.pdf[Accessed: 25 Sep 2018].

[48] John Seymour and Philip Tully, “Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter.”https://www.blackhat.com/docs/us-16/materials/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf[Accessed: 25 Sep 2018].

[49] Attacking Machine Learning with Adversarial Examples. Open AI.  https://blog.openai.com/adversarial-example-research/ [Accessed: 30 Sep 2018].

[50] Ling Huang, Anthony D. Joseph et al. Adversarial Machine Learning. In 4th ACM Workshop on Artificial Intelligence and Security (AISec 2011), pages 43–57, Chicago, IL, USA, October 2011.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.360.168&rep=rep1&type=pdf[Accessed: 10 Sep 2018].

DISCLAIMER: The views expressed in this insight piece are those of the author and do not necessarily reflect the official policy or position of the IndraStra Global.
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,112,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,57,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1203,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,579,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,24,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,3,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,53,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,233,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1373,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,1,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,69,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,174,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,661,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,6,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,91,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,15,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1267,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,692,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,12,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,49,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,317,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,47,South Asia,472,South China Sea,36,South East Asia,76,South Korea,62,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,653,Think Tank,317,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,25,Ummah,1,UNCLOS,7,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,760,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: The Interweaving of Cybersecurity and Artificial Intelligence
The Interweaving of Cybersecurity and Artificial Intelligence
By Rear Admiral Dr. S. Kulshrestha (Retd.), Indian Navy
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQf9et1DcfJrztk0HpGZYNRIIA8apmPAL3DqVDZVSYwBnNC7XAdZzYVagrG6nCcts0uZns6vqB8Lqhyphenhyphen7xGJKawSqYjklJNfwzd5rIJ5v9drKHEIbLFOGuITyAZRxAAnbAcqosRtTHfcE4/s640/abstract-1755967_960_720.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQf9et1DcfJrztk0HpGZYNRIIA8apmPAL3DqVDZVSYwBnNC7XAdZzYVagrG6nCcts0uZns6vqB8Lqhyphenhyphen7xGJKawSqYjklJNfwzd5rIJ5v9drKHEIbLFOGuITyAZRxAAnbAcqosRtTHfcE4/s72-c/abstract-1755967_960_720.jpg
IndraStra Global
https://www.indrastra.com/2019/06/PAPER-Interweaving-of-Cybersecurity-and-AI-005-06-2019-0040.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2019/06/PAPER-Interweaving-of-Cybersecurity-and-AI-005-06-2019-0040.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content