Cognitive hacking and intelligence and security informatics

被引:2
|
作者
Thompson, P [1 ]
机构
[1] Dartmouth Coll, Thayer Sch Engn, Hanover, NH 03755 USA
关键词
cognitive hacking; semantic hacking; intelligence informatics; security informatics; deception detection;
D O I
10.1117/12.554454
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.
引用
收藏
页码:142 / 151
页数:10
相关论文
共 50 条
  • [41] AI and Security Informatics
    Chen, Hsinchun
    [J]. IEEE INTELLIGENT SYSTEMS, 2010, 25 (05) : 82 - 83
  • [42] The game security and security game: hacking, law and public policy
    McMullan, John L.
    Perrier, David C.
    [J]. CRIMINOLOGIE, 2006, 39 (01) : 83 - 106
  • [43] Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis
    Gaudys L. Sanclemente
    [J]. Security Journal, 2022, 35 : 1328 - 1348
  • [44] Reliability: understanding cognitive human bias in artificial intelligence for national security and intelligence analysis
    Sanclemente, Gaudys L.
    Cardozo, Benjamin N.
    [J]. SECURITY JOURNAL, 2022, 35 (04) : 1328 - 1348
  • [45] Hacking the Brain: Dimensions of Cognitive Enhancement
    Dresler, Martin
    Sandberg, Anders
    Bublitz, Christoph
    Ohla, Kathrin
    Trenado, Carlos
    Mroczko-Wasowicz, Aleksandra
    Kuehn, Simone
    Repantis, Dimitris
    [J]. ACS CHEMICAL NEUROSCIENCE, 2019, 10 (03): : 1137 - 1148
  • [46] Biomedical informatics and security informatics research in digital library
    Chen, HC
    [J]. DIGITAL LIBRARIES: INTERNATIONAL COLLABORATION AND CROSS-FERTILIZATION, PROCEEDINGS, 2004, 3334 : 1 - 12
  • [47] Computational intelligence in medical informatics
    Muppalaneni, Naresh Babu
    Gunjan, Vinit Kumar
    [J]. SpringerBriefs in Applied Sciences and Technology, 2015, 0 (9789812872593):
  • [48] Hacking Competitions and Their Untapped Potential for Security Education
    Conti, Gregory
    Babbbbitt, Thomas
    Nelson, John
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (03) : 56 - 59
  • [49] Intranet security evaluation using hacking techniques
    Jeong, Gyoo-Yeong
    Seo, Dong-il
    Kwon, Soo-Gab
    Kim, Jeong-Ho
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 810 - 814
  • [50] A defense security approach for infrastrcutres against hacking
    Alsunbul, Saad
    Le, Phu
    Tan, Jefferson
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1600 - 1606