4 Chapter 3 Table 3.1.Presence of concepts in the corpus of speeches by the US Secretary of... Table 3.2.Expressed military requirements. Reconstituted table from the article... Table 3.3. Reproduction of the matrix published in [ECK 84] Table 3.4.Some works and themes related to the use of expert systems in the mil... Table 3.5. Selected publications dealing with stand-alone weapons
5 Appendix 1 Table A1.1. A chronology of AI dates and milestones
6 Appendix 2 Table A2.1.The place of AI in the U.S. military doctrinal corpus (Joint Publica...
7 Appendix 3 Table A3.1.AI and its associated concepts, search in DoD documents dedicated to...
8 Appendix 4 Table A4.1. AI in U.S. Navy documents
9 Appendix 5 Table A5.1. AI in U.S. Marine Corps documents
10 Appendix 6 Table A6.1. AI in U.S. Air Force documents
11 Conclusion Table C.1.Searching for AI references in some recent national cybersecurity str...
1 Cover
2 Table of Contents
3 Title Page
4 Copyright First published 2020 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address: ISTE Ltd 27-37 St George’s Road London SW19 4EU UK www.iste.co.uk John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030 USA www.wiley.com © ISTE Ltd 2020 The rights of Daniel Ventre to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Library of Congress Control Number: 2020940262 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 978-1-78630-467-4
5 Introduction
6 Begin Reading
7 Conclusion
8 Appendices
9 Appendix 1: A Chronology of AI
10 Appendix 2: AI in Joint Publications (Department of Defense, United States)
11 Appendix 3: AI in the Guidelines and Instructions of the Department of Defense (United States)
12 Appendix 4: AI in U.S. Navy Instructions
13 Appendix 5: AI in U.S. Marine Corps Documents
14 Appendix 6: AI in U.S. Air Force Documents
15 References
16 Index
17 End User License Agreement
1 v
2 iii
3 iv
4 ix
5 x
6 xi
7 xii
8 xiii
9 1
10 2
11 3
12 4
13 5
14 6
15 7
16 8
17 9
18 10
19 11
20 12
21 13
22 14
23 15
24 16
25 17
26 18
27 19
28 20
29 21
30 22
31 23
32 24
33 25
34 26
35 27
36 28
37 29
38 30
39 31
40 32
41 33
42 34
43 35
44 36
45 37
46 38
47 39
48 40
49 41
50 42
51 43
52 45
53 46
54 47
55 48
56 49
57 50
58 51
59 52
60 53
61 54
62 55
63 56
64 57
65 58
66 59
67 60
68 61
69 62
70 63
71 64
72 65
73 66
74 67
75 68
76 69
77 70
78 71
79 72
80 73
81 74
82 75
83 76
84 77
85 78
86 79
87 80
88 81
89 82
90 83
91 84
92 85
93 86
94 87
95 88
96 89
97 90
98 91
99 92
100 93
101 94
102 95
103 96
104 97
105 98
106 99
107 100
108 101
109 102
110 103
111 104
112 105
113 106
114 107
115 108
116 109
117 110
118 111
119 112
120 113
121 114
122 115
123 116
124 117
125 118
126 119
127 120
128 121
129 122
130 123
131 124
132 125
133 126
134 127
135 128
136 129
137 130
138 131
139 132
140 133
141 134
142 135
143 136
144 137
145 138
146 139
147 140
148 141
149 142
150 143
151 144
152 145
153 146
154 147
155 148
156 149
157 150
158 151
159 152
160 153
161 154
162 155
163 156
164 157
165 158
166 159
167 160
168 161
169 162
170 163
171 164
172 165
173 166
174 167
175 168
176 169
177 170
178 171
179 172
180 173
181 174
182 175
183 176
184 177
185 178
186 179
187 180
188 181
189 182
190 183
191 184
192 185
193 186
194 187
195 188
196 189
197 190
198 191
199 192
200 193
201 194
202 195
203 197
204 198
205 199
206 200
207 201
208 202
209 203
210 204
211 205
212 206
213 207
214 208
215 209
216 211
217 212
218 213
219 215
220 216
221 217
222 218
223 219
224 220
225 221
226 222
227 223
228 224
229 225
230 226
231 227
232 228
233 229
234 230
235 231
236 232
237 233
238 234
239 235
240 236
241 237
242 239
243 240
244 241
245 242
246 243
247 244
248 245
249 246
250 247
251 248
252 249
Cybersecurity Set
coordinated by
Daniel Ventre
Artificial Intelligence, Cybersecurity and Cyber Defense
Daniel Ventre
First published 2020 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd
27-37 St George’s Road
London SW19 4EU
UK
www.iste.co.uk
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030
USA
www.wiley.com
© ISTE Ltd 2020
The rights of Daniel Ventre to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2020940262
British Library Cataloguing-in-Publication Data
A CIP record for this book is available from the British Library
ISBN 978-1-78630-467-4
Читать дальше