Artificial Intelligence

Artificial Intelligence

AI and Chemical warefare, Photo illus. by Pixabay

A group of researchers and over 500 experts, including Elon Musk, Stephen Hawking, Steve Wozniak, and Noam Chomsky, wrote an open letter in support...
Deep-Learning.-Photo-illus.-By-Pixabay

A field of machine learning, deep learning is based on the assumption that computers can learn and teach themselves, aiming to mimic the brain's...
photo illus. artificial intelligence by Pixabay

A new technology uses artificial intelligence to create a digital 3D scene out of a set of 2D images in seconds. NVIDIA's AI researchers developed...
Photo illus. electric car by Pixabay

In order to better understand how rechargeable batteries wear out with time, researchers propose the use of artificial intelligence for analyzing atomic-level images from...
AI, photo illus. by Pixabay

The exponential growth of advanced video surveillance technology, as well as the immeasurable amount of information that the field produces, poses a challenge: how...
photo illus. by Pixabay

By using machine learning and rule-based algorithms, network traffic analysis is the process of analyzing network traffic. It enables the network to be monitored...
photo illus video surveillance by Pixabay

How much can government-provided surveillance technology influence and change our society? Approximately $1.5 million was provided by the Minerva Initiative and the Ministry of...
AI photo illus. by Piqwels

As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety. Artificial...
Photo illust. AI by Pixabay

A closer look reveals that artificial intelligence is almost everywhere. It is likely that artificial intelligence will be present in our lives even more...
Deepfake Photo illis. by Pixabay

Recent years have seen Deep-Fake technology become an effective weapon in times of war. In the recent war Russia has waged against Ukraine, suspicion...
Photo illus. cybersecurity by Pixabay

Deep Instinct, the first company to apply end-to-end Deep Learning to cybersecurity, recently released its biennial Threat Landscape Report. The team of researchers responsible for...
Photo Gambit UAV from GA-ASI website

Unmanned aerial systems are working collaboratively with manned aircraft to detect, identify and target adversaries at range and scale across the battlespace. Gambit, a...
Silverfort, photo illus. network cyber by Pixabay

Israel and the US have been expanding ties on the cyber front. The two countries have finalized a series of cybersecurity collaboration agreements aimed...
UAV swarm photo illustration by US Army

UAE unveils new aircraft from HALCON Unmanned Aircraft Series, a regional leader in the production and supply of guided weapons and unmanned aerial vehicles...

Due to the absence of information required for automated training systems, dealing with minority language content has been regarded difficult for many translation and...
smart city

An urban facility security system can be specific or be part of a wider system. A comprehensive security solution for smart cities is under...
wearable tech

Internet-of-things (IoT) devices are vulnerable to various cyber threats. One of them is the side-channel attack. This tactic seeks to gather secret information by...
photo illus. smartphone by PIXABAY

Artificial intelligence systems will be able to identify who, or what, authored any specific text, a game-changing technology for tracking disinformation campaigns and other...
Photo illus. gps geospatial by PIXABAY

GNSS spoofing has become a growing security threat. This type of attack is a malicious attempt to alter a user's global navigation satellite system...
Photo illustration airport by PIXABAY

Weather conditions such as fog and low stratus clouds over airports are responsible for severe flight delays translating into heavy costs for airlines. Determining...

The US intelligence community has been slow to adopt artificial intelligence/machine learning capabilities to make sense of masses of untapped open-source intelligence (OSINT) data....
electronic spectrum

In uncontrolled environments, secure communications can be jeopardized by RF signals that are almost impossible to manually find and identify in real-time. New technology...