2021
DOI: 10.20944/preprints202108.0047.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Artificial Intelligence and Military Applications: Innovations, Cybersecurity Challenges & Open Research Areas

Abstract: Over the years, Artificial Intelligence (AI) has seen a steady progress in development and evolution that can aid many sectors. Today, AI plays an essential role in the Fourth Industrial Revolution, and it is making its way into the military sector as well. Many countries are actively looking into AI military technology. Some of these innovations include image recognition, text analysis, Self-driving vehicles (SDV), gaming, robotic process automation (RPA) & Robotic and Autonomous Systems (RAS), and Au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Cyberbullying, often referred to as the use of information technology tools to threaten, harass, victimize, or bully individuals or groups, is a significant issue in the digital age (Martellozzo & Jane, 2017;Jayakumar et al, 2021). It is formally defined as "the use of information and communication technologies (ICT) to enable deliberate, recurrent, and abusive behavior by an individual or a group with the intent to harm others."…”
Section: Cyberbullying (Computer Crime #1)mentioning
confidence: 99%
“…Cyberbullying, often referred to as the use of information technology tools to threaten, harass, victimize, or bully individuals or groups, is a significant issue in the digital age (Martellozzo & Jane, 2017;Jayakumar et al, 2021). It is formally defined as "the use of information and communication technologies (ICT) to enable deliberate, recurrent, and abusive behavior by an individual or a group with the intent to harm others."…”
Section: Cyberbullying (Computer Crime #1)mentioning
confidence: 99%
“…In the larger context, IDPSs are designed to not only detect but also respond to attacks by blocking the intruder. The capability for real-time detection, enabling swift responses, is intricately connected with the system's ability to prevent an attack (Quincozes et al, 2021;Jayakumar et al, 2021).…”
Section: Introductionmentioning
confidence: 99%