O'Hanlon, 2018 - Google Patents
AI and Robotics in Future Warfare: A Scenario-Based AnalysisO'Hanlon, 2018
- Document ID
- 212335258000187002
- Author
- O'Hanlon M
- Publication year
External Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/14—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/32—Messaging within social networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| O'Hanlon | AI and Robotics in Future Warfare: A Scenario-Based Analysis | |
| Nakamitsu et al. | Perspectives on lethal autonomous weapon systems | |
| Robinson et al. | Artificial Intelligence: Evolution, Ethics, and National Security Implications | |
| Allen et al. | Negotiating Global Treaties on Artificial Intelligence in Warfare | |
| Stefanick | AI and Electronic Warfare in Military Information Conflict | |
| Gresh | Europe's Maritime Security: Chinese Ports, Russian Naval Power, and Subsea Warfare | |
| Twardowski | US Defense Strategy: A Conversation with General Paul J. Selva | |
| Dougherty | Buying Time: Adaptive Logistics for Modern Warfare | |
| Gvosdev | A Coherent Euro-Atlantic Strategy for Black Sea Security | |
| League | Ukraine's Drone-Centric Warfare Strategy | |
| FIOTT | European Armaments Standardisation: EU Approaches and Recommendations | |
| French | Patton's Information Dominance: Innovation, Flexibility, and Adaptation in Third Army | |
| Parens | Wagner Mutiny: Implications for Russia and Africa | |
| Metz | The Coming Landpower Robot Revolution: Strategic Considerations | |
| CESLUK-GRAJEWSKI | Cybersecurity: A Think Tank Perspective (October 2018) | |
| Valeriano et al. | Why Russia's Invasion of Ukraine Didn't Rely Heavily on Cyberwarfare | |
| Hamilton | Drone Warfare in the Russia-Ukraine Conflict: Moscow Attacks | |
| Twardowski | US Army's Geopolitical Strategy and Modernization | |
| CESLUK-GRAJEWSKI | The INF Treaty and European Defence: Think Tank Perspectives | |
| Pant | Aerial Drone Swarms: The Next Generation Military Weapon | |
| Henschke | The Effective and Ethical Development of Artificial Intelligence in Defense, Security, and Emergency Response | |
| Levy | Enhancing Israel's Air Force: The Air-Launched Cruise Missile Option | |
| Podvig | The Soviet Response to the Strategic Defense Initiative (SDI) | |
| Steff | AI in Defence, Security, and Emergency Response: Implications for New Zealand | |
| Pifer | Withdraw US Nuclear Weapons from Turkey: A Matter of Urgency |