Goto

Collaborating Authors

Security & Privacy


The Future of Computer Science

#artificialintelligence

Abstract: The aim of this study is to learn the hot topics in computer science in 10 years and to view the literature. In the last 65 years, computer usage has increased exponentially and developed…


Greece used AI to curb COVID: what other nations can learn

#artificialintelligence

Greece's decision to deploy machine learning in pandemic surveillance will be much-studied around the world.Credit: Konstantinos Tsakalidis/Bloomberg/Getty A few months into the COVID-19 pandemic, operations researcher Kimon Drakopoulos e-mailed both the Greek prime minister and the head of the country's COVID-19 scientific task force to ask if they needed any extra advice. Drakopoulos works in data science at the University of Southern California in Los Angeles, and is originally from Greece. To his surprise, he received a reply from Prime Minister Kyriakos Mitsotakis within hours. The European Union was asking member states, many of which had implemented widespread lockdowns in March, to allow non-essential travel to recommence from July 2020, and the Greek government needed help in deciding when and how to reopen borders. Greece, like many other countries, lacked the capacity to test all travellers, particularly those not displaying symptoms.


Federal agencies buying up Chinese drones previously deemed a national security threat: report

FOX News

Fox News correspondent Peter Doocy has the latest on the president's speech at the U.S. on'Special Report' Federal law enforcement agencies in the Biden administration are reportedly purchasing surveillance drones from China that have previously been labeled a potential national security threat by the Pentagon. The U.S. Secret Service and the Federal Bureau of Investigation have recently acquired surveillance drones from the Shenzhen-based company DJI, around the same time the Defense Department deemed products from the Chinese company to be a potential national security threat, according to an Axios report. DOBRIANSKY AND RUNDE: CHINA'S POWER INSIDE THE UN IS GROWING RAPIDLY AND US MUST UP ITS GAME Procurement records show that the Secret Service bought eight DJI drones on July 26 just three days after the Defense Department issued a statement warning about possible threats posed by the company's products. Around the same time, records show that the FBI bought 19 drones from DJI. DJI is one of the most popular drone manufacturers in the industry, and the company requires those who purchase their products to download proprietary software and provide to users their own mapping databases that have the potential to be monitored remotely. Concerns about the company's products being used to advance China's interests have been longstanding and include a 2017 statement from the Department of Homeland Security that claimed with "moderate confidence" that DJI was "providing U.S. critical infrastructure and law enforcement data to the Chinese government."


Anti-Neuron Watermarking: Protecting Personal Data Against Unauthorized Neural Model Training

#artificialintelligence

Given suspicious neural network models, verifiers determine whether the models were trained using watermarked data following eq. During signature inference, each image is converted from [0,255] into [0,1], then watermarked and normalized. Given clean (unwatermarked) images from users, watermark signature can be recovered using one of the following two approaches. If the signature is well memorized by the classifier models, loss will reach minimum when the current enumerated signature equals or closely approximates to the signature used by the user. The signatures are generated by dividing the whole signature space into N 2τ intervals.


Siemens Energy launches AI solution to fight industrial cybercrime

#artificialintelligence

Siemens Energy has launched a new solution for monitoring and responding to cyberthreats against the Industrial Internet of Things (IIoT). The industrial sector is undergoing a rapid shift from legacy, separate, on-the-floor systems to connected platforms that utilize IoT for maintenance, monitoring, and to collect data suitable for operations and future business decisions, in what is known as IIoT or Smart Factory (Industry) 4.0. However, when you create networks and bring devices online, you run the risk of allowing threat actors access unless adequate protection is in place. As IoT continues to accelerate and operational technology (OT) becomes smarter, companies need to make sure they manage and secure endpoints and industrial networks to mitigate the risk of damage, data theft, and disruption caused by external entities. On Tuesday, Siemens said a new offering, dubbed Eos.ii -- not to be confused with the blockchain protocol EOS.IO -- is an artificial intelligence (AI) and machine learning (ML) Security Information and Event Management (SIEM) platform that "provides CISOs with an evergreen foundation for industrial IoT cybersecurity."


Securing the energy revolution and IoT future

MIT Technology Review

In early 2021, Americans living on the East Coast got a sharp lesson on the growing importance of cybersecurity in the energy industry. A ransomware attack hit the company that operates the Colonial Pipeline--the major infrastructure artery that carries almost half of all liquid fuels from the Gulf Coast to the eastern United States. Knowing that at least some of their computer systems had been compromised, and unable to be certain about the extent of their problems, the company was forced to resort to a brute-force solution: shut down the whole pipeline. Leo Simonovich is vice president and global head of industrial cyber and digital security at Siemens Energy. The interruption of fuel delivery had huge consequences.


How To Use AI To Help Keep Your Financial Data Safe

#artificialintelligence

Security Insider Access Online is an online resource on Security Industry news, opinions, Insights and trends. It aims to disseminate the latest information geared for entrepreneurs, organizations, high net-worth individuals and chief stakeholders. We provide a collection of security industry news and trends on surveillance, cyber security, private security, security guards, risk and access management catering to more security executives, professionals and the security industry.


Siemens launches AI solution to fight industrial cybercrime

ZDNet

Siemens Energy has launched a new solution for monitoring and responding to cyberthreats against the Industrial Internet of Things (IIoT). The industrial sector is undergoing a rapid shift from legacy, separate, on-the-floor systems to connected platforms that utilize IoT for maintenance, monitoring, and to collect data suitable for operations and future business decisions, in what is known as IIoT or Smart Factory (Industry) 4.0. However, when you create networks and bring devices online, you run the risk of allowing threat actors access unless adequate protection is in place. As IoT continues to accelerate and operational technology (OT) becomes smarter, companies need to make sure they manage and secure endpoints and industrial networks to mitigate the risk of damage, data theft, and disruption caused by external entities. On Tuesday, Siemens said a new offering, dubbed Eos.ii -- not to be confused with the blockchain protocol EOS.IO -- is an artificial intelligence (AI) and machine learning (ML) Security Information and Event Management (SIEM) platform that "provides CISOs with an evergreen foundation for industrial IoT cybersecurity."


Sailing and Digital Identity in Europe

#artificialintelligence

"Love does not find its meaning in the yearning for things already done, completed and finished, but in the impulse to participate in the construction of those things. Love is very close to transcendence; it is just another name of creative impulse, and, therefore, it is fraught with risks, since all creation is always ignorant of what its final product will be." When we sail the wind is the only motor we have. The wind is not constant, neither in its direction nor in its intensity. Adjusting the course sometimes implies turning or jibing. The importance of understanding and knowing how to perform these maneuvers is transcendent.


How To Implement Machine Learning In Business? - ONPASSIVE

#artificialintelligence

Every business has to protect its crucial data from hackers, and machine learning protects business data from cyberattacks. Here's a rundown of the most prevalent risks that cybersecurity professionals face today: Malware is a sort of software that may be used to carry out a range of harmful actions. Some malware strains are meant to get persistent network access, while others are designed to spy on the user to collect passwords or other vital information, and still, others are just designed to cause disruption. When an attacker attempts to trick an unwary victim into disclosing essential data such as passwords, credit card information, proprietary information, and so on, this is known as a phishing attack. Phishing attempts frequently take the shape of an email purporting to be from a genuine institution, such as your bank, the IRS, or another reliable source. Phishing is the most frequent type of cyber-attack, owing to its ease of execution and unexpected effectiveness.