Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
March 18, 2024
Search
Highlight

Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks
Cybersecurity practitioners require alternative approaches and tools for combating the emerging security threats worldwide. How effective are current penetration testing (PT) training modules in cybersecurity degree and... more
Quote
We insist here on a distinction between nominal definitions, which contain only characters by which we can distinguish one thing... more
- Gottfried Wilhelm von Leibniz (1680)
Articles
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges: Journal of Intelligent Information Systems

Today, machine learning (ML) is applied to threat detection and classification problems in the important field of industrial control. This paper reviews different ML papers that apply supervised learning... more

General (H.1.0) | Mar 18 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As computing technology continues to evolve, artificial intelligence (AI) is playing an increasing role in various aspects of our lives. Although AI dates back many decades--I took an AI subject in my university studies, in 1988--only... more

General (I.2.0) | Mar 12 24

Data-driven prototyping via natural-language-based GUI retrieval: Automated Software Engineering

Reading this paper would leave anyone conflicted. It describes a good contribution ridden with flaws. It is puzzling that the referees and journal editors accepted the paper in its current form. The presentation... more

Software Development (K.6.3...) | Mar 7 24

10 things software developers should learn about learning: Communications of the ACM

As software developers, we understand the detailed workings of the different components of our computer systems. And--probably due to how computers were presented since their appearance as “digital brains” in the 1940s--we sometimes believe we can... more

Software Development (K.6.3...) | Feb 22 24

Conversational artificial intelligence in the AEC industry: a review of present status, challenges and opportunities: Advanced Engineering Informatics

Those working in the architecture, engineering, and construction (AEC) domain often get bogged down in day-to-day paperwork and verbally communicated instructions. Natural... more

General (I.2.0) | Feb 14 24

State-of-the-art improvements and applications of position based dynamics: Computer Animation and Virtual Worlds

The physically plausible simulation of objects is an active area of research in computer graphics. It is used in movies and video games and to simulate phenomena that would be expensive to do in a laboratory. In the traditional simulation method, external and... more

Animation (I.3.7...) | Feb 12 24

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks: Ad Hoc Networks

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to... more

Security & Protection (C.2.0...) | Feb 8 24

Trustworthy AI: from principles to practices: ACM Computing Surveys

As systems based on AI have become the backbone of various public services such as transportation, finance, medicine, security, academics, medicine, and entertainment, the reliability and trustworthiness of AI artifacts/products, including robustness... more

General (I.2.0) | Jan 30 24

A deep learning technique for intrusion detection system using a recurrent neural networks based framework: Computer Communications

So let’s assume you already know and understand that artificial intelligence’s main building blocks are perceptrons, that is, mathematical models of neurons. And you know that, while a single perceptron... more

Neural Nets (I.5.1...) | Jan 19 24

CPFloat: a C library for simulating low-precision arithmetic: ACM Transactions on Mathematical Software

Mixed-mode floating-point arithmetic (MMFPA) is a requirement of modern numerical computing. The need arises, for instance, when computations entail execution on graphics processing units (GPUs) interleaved... more

Mathematical Software (G.4) | Jan 12 24

Books
Exploring the power of ChatGPT: applications, techniques, and implications

The enormous power of ChatGPT lies in its ability to generate coherent and contextually relevant responses to user prompts and to engage in conversational interactions. It can understand and generate human-like text in a way that feels... more
General (I.2.0) | Mar 14 24

Responsible AI: best practices for creating trustworthy AI systems

Responsible AI: best practices for creating trustworthy AI systems appears to be a comprehensive guide focused on the principles and practices of developing responsible AI systems. The book seems to address the critical aspects of responsible AI, including... more
General (I.2.0) | Mar 13 24

Constructed truths: truth and knowledge in a post-truth world

Families gather during the holiday season, and heated discussions often erupt over politics and cultural values. This situation has become so frequent that it is standard fare in comedy sketches, jokes, and cartoons. It seems as though the opposing viewpoints come from... more
Theory (K.2...) | Mar 11 24

Constructed truths: truth and knowledge in a post-truth world

Many of us grew up used to having some news sources we could implicitly trust, such as well-positioned newspapers and radio or TV news programs. We knew they would only hire responsible journalists rather than risk diluting public trust and losing their brand’s... more
Theory (K.2...) | Mar 6 24

Information dynamics: in classical and quantum systems

Nowadays, the ubiquitous nature of information invokes the rapid development of new interdisciplinary sciences integrated with computing. One manifestation of this trend is the dynamism of information expressed in the different sciences with regards to information... more
Information Theory (H.1.1...) | Mar 5 24

Beginning AWS security: build secure, effective, and efficient AWS architecture

Beginning AWS security: build secure, effective, and efficient AWS architecture is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services. This book is particularly valuable for system administrators... more
Security & Protection (C.2.0...) | Mar 4 24

Data science: an introduction to statistics and machine learning

This comprehensive textbook covers a broad spectrum of essential topics for understanding and working in the field of data science. It is structured in a clear, well-organized manner, divided into three main parts. Part 1, “Basics,” starts with foundational concepts like... more
Statistics (K.1...) | Mar 1 24

The structure of game design

Game design may seem mystifying to the uninitiated, but Wallace Wang’s The structure of game design attempts to demystify the process of turning an idea into an actual playable game. Structured more like a textbook than a trade book, The structure of game design methodically breaks down the... more
Games (K.8...) | Feb 29 24

Modeling and simulation in Python: an introduction for scientists and engineers

Allen B. Downey’s Modeling and simulation in Python is a comprehensive guide to Python-based simulations for physical systems. Downey skillfully teaches Python syntax for modeling spring forces, universal gravitation, and more, emphasizing practical skills with... more
Python (D.3.2...) | Feb 28 24

Automata theory: an algorithmic approach

Novices to automata theory may want to start with Dines Bjørner’s narrative on principles and techniques, found in the automata theory chapter of his enjoyable three-volume set [1], which covers intuition, motivation, and pragmatics. Bjørner’s objective: to help... more
General (G.1.0) | Feb 27 24


Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy