Artificial Intelligence

Developing a Cyber Operations Computational Ontology

Abstract: 

Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted, and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors.

Set Your Drones to Stun: Using Cyber-Secure Quadcopters to Disrupt Active Shooters

Abstract:

This paper will examine pairing the autonomous precision-flight capabilities of Micro- Unmanned Aerial Vehicles (UAVs) with the growing capability of Artificial Intelligence (specifically AI based on neuromorphic computing systems) to field cyber-secure, active-shooter response systems to counter the active-shooter threat to civilian ‘soft targets’, such as schools or train stations. This paper proposes a pilot to demonstrate the feasibility of disrupting terrorist attacks with a micro-UAV, armed with less than lethal weapons, for instance, a stun gun, where such a ‘stun-drone’ is part of an emergency-response system that is trustworthy and correctly engages only active shooters.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com