Abstract is missing.
- Use of Artificial Intelligence in a Cybersecurity EnvironmentPetri Vähäkainu, Martti Lehto. 3-27 [doi]
- A Review of Cyber Threat (Artificial) Intelligence in Security ManagementMartin Lundgren, Ali Padyab. 29-45 [doi]
- Model Based Resilience Engineering for Design and Assessment of Mission Critical Systems Containing Artificial Intelligence ComponentsDouglas L. Van Bossuyt, Nikolaos Papakonstantinou, Britta Hale, Jarno Salonen, Bryan O'Halloran. 47-66 [doi]
- Automation of Cybersecurity WorkStefan Varga, Teodor Sommestad, Joel Brynielsson. 67-101 [doi]
- Artificial Intelligence for Cybersecurity Education and TrainingRazvan Beuran, Zhenguo Hu, Youmeizi Zeng, Yasuo Tan. 103-123 [doi]
- Offensive Machine Learning Methods and the Cyber Kill ChainHannu Turtiainen, Andrei Costin, Alex Polyakov, Timo Hämäläinen 0002. 125-145 [doi]
- Defensive Machine Learning Methods and the Cyber Defence ChainHannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002. 147-163 [doi]
- Differential Privacy: An Umbrella ReviewMinna Kilpala, Tommi Kärkkäinen, Timo Hämäläinen 0002. 167-183 [doi]
- AI in Cyber Operations: Ethical and Legal Considerations for End-UsersKirsi Helkala, James Cook, George Lucas, Frank Pasquale, Gregory M. Reichberg, Henrik Syse. 185-206 [doi]
- Android Malware Detection Using Deep LearningStuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, Paul Miller 0003. 209-246 [doi]
- Artificial Intelligence Enabled Radio Signal IntelligenceZhechen Zhu, Asoke K. Nandi. 247-278 [doi]
- Deep Learning Quantile Regression for Robustness, Confidence and PlanningDvir Ben Or, Michael Kolomenkin, Tanya Osokin, Gil Shabat, Hanan Shteingart. 279-289 [doi]
- Model Fooling Threats Against Medical ImagingTuomo Sipola, Tero Kokkonen, Mika Karjalainen. 291-301 [doi]