A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

High-tech defense industries: developing autonomous intelligent systems

J Reis, Y Cohen, N Melão, J Costa, D Jorge - Applied Sciences, 2021 - mdpi.com
After the Cold War, the defense industries found themselves at a crossroads. However, it
seems that they are gaining new momentum, as new technologies such as robotics and …

Specforce: A framework to secure iot spectrum sensors in the internet of battlefield things

PMS Sánchez, AH Celdrán, G Bovet… - IEEE …, 2022 - ieeexplore.ieee.org
The battlefield has evolved into a mobile and dynamic scenario where soldiers and
heterogeneous military equipment exchange information in real-time and wirelessly. This …

The cybersecurity dynamics way of thinking and landscape

S Xu - Proceedings of the 7th ACM Workshop on Moving …, 2020 - dl.acm.org
The Cybersecurity Dynamics framework offers an approach to systematically understanding,
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …

Advancements in Artificial Intelligence Circuits and Systems (AICAS)

T Miller, I Durlik, E Kostecka, P Mitan-Zalewska… - Electronics, 2023 - mdpi.com
In the rapidly evolving landscape of electronics, Artificial Intelligence Circuits and Systems
(AICAS) stand out as a groundbreaking frontier. This review provides an exhaustive …

Challenges and opportunities of autonomous cyber defence (ACyD) against cyber attacks

M Oreyomi, H Jahankhani - … and other emerging technologies for digital …, 2022 - Springer
The exponential growth of Autonomous Intelligent Malware (AIM) has really changed the
landscape in the cyber security fight against that attack of auto generated threats and how …

Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

PMS Sánchez, AH Celdrán, G Bovet… - arXiv preprint arXiv …, 2024 - arxiv.org
In the current cybersecurity landscape, protecting military devices such as communication
and battlefield management systems against sophisticated cyber attacks is crucial. Malware …

Towards autonomous cyber defense: predictions from a cognitive model

Y Du, B Prébot, X Xi… - Proceedings of the Human …, 2022 - journals.sagepub.com
We propose that cognitive models will help advance autonomous cyber defense. Congitive
models, in contrast to many other sophisticated approaches, such as machine learning …

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …

Aica development challenges

S Xu - Autonomous Intelligent Cyber Defense Agent (AICA) A …, 2023 - Springer
In this chapter we explore the development challenges that must be tackled before fulfilling
the great potential of Autonomous Intelligent Cyberdefense Agent (AICA). We propose …