concept

cyber security

Also known as: cybersecurity, Cybersecurity

from single model dimension

No definition has been generated yet — showing the first model analysis as a summary.

The cybersecurity landscape in 2025 is predicted to face significant disruptions primarily from artificial intelligence, acting as both an offensive and defensive force, according to SecurityWeek's Cyber Insights 2025 report based on expert interviews AI primary disruptor in 2025. Experts like Ron Reiter of Sentra foresee an AI arms race emerging in 2024, with ethical concerns over training data and AI autonomy AI arms race assertion. Shifts include moving from prevention to resilience, as noted by Art Gilliland shift to resilience focus, and quantum preparedness becoming a board-level priority quantum as board topic. Supply chain vulnerabilities, especially in Open Source Software (OSS) and Supply Chain 4.0, pose key risks, with technologies creating cyber issues Supply Chain 4.0 cyber challenges. Tools like the Governance Schema (GovSCH), an open-source machine-readable standard for cybersecurity and AI governance documents, aim to enhance transparency and agility, drawing from NIST and DoD frameworks GovSCH for governance docs. Open source contributions include transparency and rapid patches OSS cybersecurity benefits, though SBOMs are deemed unreliable SBOMs not reliable. Advanced AI like neurosymbolic systems improve threat detection and response neurosymbolic intrusion detection. Strategies emphasize fortifying supply chains, IoT standards, and basic practices from OWASP and NIST essential 2025 strategies. The field remains challenging with sophisticated threats and a 'bumpy ride' ahead bumpy cybersecurity future.

Model Perspectives (2)
openrouter/x-ai/grok-4.1-fast definitive 85% confidence
The cybersecurity landscape in 2025 is predicted to face significant disruptions primarily from artificial intelligence, acting as both an offensive and defensive force, according to SecurityWeek's Cyber Insights 2025 report based on expert interviews AI primary disruptor in 2025. Experts like Ron Reiter of Sentra foresee an AI arms race emerging in 2024, with ethical concerns over training data and AI autonomy AI arms race assertion. Shifts include moving from prevention to resilience, as noted by Art Gilliland shift to resilience focus, and quantum preparedness becoming a board-level priority quantum as board topic. Supply chain vulnerabilities, especially in Open Source Software (OSS) and Supply Chain 4.0, pose key risks, with technologies creating cyber issues Supply Chain 4.0 cyber challenges. Tools like the Governance Schema (GovSCH), an open-source machine-readable standard for cybersecurity and AI governance documents, aim to enhance transparency and agility, drawing from NIST and DoD frameworks GovSCH for governance docs. Open source contributions include transparency and rapid patches OSS cybersecurity benefits, though SBOMs are deemed unreliable SBOMs not reliable. Advanced AI like neurosymbolic systems improve threat detection and response neurosymbolic intrusion detection. Strategies emphasize fortifying supply chains, IoT standards, and basic practices from OWASP and NIST essential 2025 strategies. The field remains challenging with sophisticated threats and a 'bumpy ride' ahead bumpy cybersecurity future.
openrouter/x-ai/grok-4.1-fast 85% confidence
Cyber security emerges as a multifaceted domain critical to national and international security, encompassing protection against vulnerabilities in digital systems such as smart grids, where compromises affect data processing, operations, and energy delivery cyber sec in smart grids. Susanna Bagdasarova advocates for centralized international efforts to mitigate economic and personal costs of large-scale attacks Bagdasarova centralization argument. European perspectives highlight needs for common strategies, as hoped by the Estonian government Estonia EU strategy hope, Lithuanian prioritization Lithuania cybersecurity priority, and threats of digital commons collapse without security-building measures with powers like China EU digital collapse threat. George Christou's 2016 book analyzes EU governance resilience in cybersecurity policies Christou EU book. Technically, it involves machine learning for intrusion detection ML defensive tasks, AI for threat monitoring AI cybersecurity enhancement, game theory models like Alpcan and Başar's Stackelberg approach Stackelberg game model, and proactive measures such as multi-factor authentication proactive cybersecurity measures. In defense contexts, it evolves as a core component alongside cyberwarfare, requiring interdisciplinary expertise cybersec core defense, with foresight studies stressing cyber defense for infrastructure foresight cyber defense and Ukrainian ATO-derived countermeasures cyberspace countermeasures. Research gaps persist, including systematic state behavior modeling per Valeriano and Maness cyber analysis gap and scarce integrated technical-political-legal studies scarce interdisciplinary research. Educational initiatives like the Strauss Center's program and Texas Law course address interdisciplinary needs Strauss cybersecurity program.

Facts (99)

Sources
Cybersecurity Trends and Predictions 2025 From Industry Insiders itprotoday.com ITPro Today 25 facts
claimCynthia Overby, the director of security at Rocket Software, is the source of the provided cybersecurity insights.
claimIn 2025, quantum preparedness is expected to become the primary cybersecurity topic discussed at the board level, representing a generational shift rather than a temporary issue.
claimIn 2025 and beyond, businesses must focus on identifying and blocking new and emerging threats while continuing to adhere to basic cybersecurity standards and best practices established by organizations like OWASP and NIST.
claimIn 2025, artificial intelligence will function as both an offensive and defensive force in cybersecurity, with both sides attempting to control critical data.
perspectiveRon Reiter, CTO and co-founder of Sentra, predicts that organizational adaptation to AI-driven cybersecurity will raise new ethical questions regarding the security of training data and the autonomy of AI in making security-critical decisions.
claimAI functions as both a defensive tool to strengthen cybersecurity and an offensive tool that provides attackers with new capabilities to exploit systems.
claimAI will have a dual impact on cybersecurity in 2025, characterized by increased productivity and heightened security risks.
perspectiveFortifying supply chains, adopting IoT standards, and leveraging AI are essential strategies for organizations to maintain cybersecurity in 2025.
claimBy 2025, AI in cybersecurity will shift from a chatbot-based approach to an agent-driven approach, where organizations use agents for threat detection, autonomous responses, IT resource scalability, and improved cyber hygiene.
claimArt Gilliland predicts that cybersecurity will shift from a focus on prevention to a focus on resilience and adaptability.
claimIn 2025, the private sector will increasingly participate in Information Sharing and Analysis Systems (ISACs) to boost information sharing and foster a proactive cybersecurity culture in response to rising geopolitical tensions and coordinated infrastructure attacks.
claimFortune 500 companies will mark AI governance as a board-level priority equal to cybersecurity, according to Vaikkunth (Vaik) Mugunthan.
claimThe cybersecurity landscape in 2025 is characterized by increasingly sophisticated cyberthreats, requiring organizations to refine their defenses and response capabilities to address breaches more effectively.
claimNir Zuk, founder and CTO of Palo Alto Networks, asserts that organizations must adopt an offensive unified platform approach to maintain a competitive advantage in cybersecurity.
claimThe AI bubble in the cybersecurity industry will burst in 2025, causing AI-enabled cybersecurity companies to struggle while attackers leverage AI for new attack methods.
claimJosh Lemos asserts that AI-driven risk assessment and ethical considerations will be crucial in shaping the future of cybersecurity.
claimIT leaders and industry insiders predict that in 2025, cybersecurity will experience 'The Great AI Awakening,' infamy will be the new payday, and quantum preparedness will become the primary board-level cybersecurity topic.
claimCasey Ellis predicts that the value of cybersecurity solutions and strategies developed during periods of relative peace will be challenged in the coming years.
perspectiveGeorge Gerchow predicts that the combination of AI-driven attacks, deepfake technology, and heightened regulation will increase the complexity of cybersecurity in 2025.
claimAI and machine learning serve a dual role in the 2025 cybersecurity landscape, empowering both attackers to bypass detection and defenders to validate clean data for recovery.
claimRon Reiter, CTO and co-founder of Sentra, asserts that the arms race centered on AI-driven cybersecurity strategies began to emerge in 2024.
claimFraud prevention and cybersecurity are increasingly intertwined, requiring fraud prevention strategies to incorporate cybersecurity measures to address cyber-driven threats.
claimBy 2025, the cybersecurity sector must adapt to the threat of quantum computing, as traditional practices like routine software updates are insufficient to defend against this advanced threat.
claimIn 2025, AI will drive both attack and defense strategies, redefining incident response and necessitating the use of AI systems for detecting breaches, identifying anomalies, and automating cybersecurity measures.
claimOrganizations must develop multi-layered, adaptable cryptographic approaches that can quickly respond to evolving technological risks, as underscored by recent research from Chinese cybersecurity experts.
GovSCH: An Open-Source Schema for Transforming Governance ... newamerica.org New America Oct 28, 2025 7 facts
claimGovSCH aims to foster a collective and shared commitment to improving global cybersecurity and AI governance through open-source collaboration.
claimThe authors of the GovSCH report selected executive orders for analysis because these orders set national priorities for cybersecurity and AI governance and emphasize machine-readable policy development.
perspectiveThe authors of the GovSCH report argue that adopting structured, machine-readable governance will lead to a future characterized by greater transparency, accountability, agility, and resilience in cybersecurity and AI governance.
referenceThe Open Security Controls Assessment Language (OSCAL) is an existing standard that addresses control-level specifications for cybersecurity and AI governance.
claimThe GovSCH report includes the National Institute of Standards and Technology (NIST) and Department of Defense (DoD) risk management frameworks because they provide a structured approach to system-level cybersecurity governance and are widely used in federal and defense contexts.
claimThe Governance Schema (GovSCH) is an open-source, machine-readable schema designed to standardize the authoring and translation of cybersecurity and artificial intelligence (AI) governance documents.
claimGovSCH is a standardized schema designed to structure and translate governance documents related to cybersecurity and artificial intelligence into machine-readable formats.
Strategic analysis of cyber conflicts: A game-theoretic modelling of ... securityanddefence.pl Security and Defence Quarterly May 31, 2025 6 facts
claimSinger and Friedman (2014) present a holistic perspective on cybersecurity by addressing technical, political, and legal dimensions together.
claimInterdisciplinary research addressing the technical, political, and legal dimensions of cybersecurity in an integrated manner is scarce.
claimGoldsmith (2013) addresses the relationship between cybersecurity and national sovereignty from a legal perspective, discussing how states’ activities in the cyber domain can affect the sovereignty rights of other states.
claimValeriano and Maness (2015) assert that there is a notable gap in systematic analyses that model the strategic choices and behaviors of states in the cyber domain, despite the growing body of literature on cybersecurity and cyber warfare.
claimExisting literature on cybersecurity and cyber warfare lacks studies that apply both game theory modelling and comparative case analysis.
claimAlpcan and Başar (2010) use the Stackelberg game model to determine optimal defense strategies, demonstrating the potential of game theory in cybersecurity.
Cyber Insights 2025: Open Source and Software Supply Chain ... securityweek.com SecurityWeek Jan 15, 2025 5 facts
perspectiveSoftware Bill of Materials (SBOMs) are not considered reliable, and regulations, while potentially improving cybersecurity, do not prevent breaches.
claimSecurityWeek’s Cyber Insights 2025 report examines expert opinions on the expected evolution of more than a dozen areas of cybersecurity interest over the next 12 months.
perspectiveThe author of the SecurityWeek Cyber Insights 2025 report asserts that the cybersecurity landscape will experience a continuously bumpy ride for the foreseeable future.
claimArtificial intelligence is expected to be the primary disruptor to cybersecurity in 2025, with significant impacts on open-source software (OSS) security.
referenceSecurityWeek's 'Cyber Insights 2025' report provides expert opinions on the expected evolution of over a dozen cybersecurity areas over the next 12 months, based on interviews with hundreds of individual experts.
Independence play: Europe's pursuit of strategic autonomy ecfr.eu European Council on Foreign Relations Jul 18, 2019 4 facts
perspectiveCzech policymakers view transportation, communication, cyber security, intelligence, and precision weapons as the areas in which Europe should work hardest to achieve strategic autonomy.
perspectiveThe Estonian government hopes that Europe will formulate a common strategy for cyber security.
claimLithuania advocates for greater investment in intelligence capabilities and prioritizes cybersecurity as a key field of action.
perspectiveCzech policymakers and policy experts advocate for the European Union to increase its influence through strategic autonomy in Eastern Europe, countries bordering the Mediterranean, sub-Saharan Africa, space, and cyber security.
A Comprehensive Review of Neuro-symbolic AI for Robustness ... link.springer.com Springer Dec 9, 2025 3 facts
referenceExisting survey papers on neuro-symbolic AI generally focus on broad overviews or specific applications, including cybersecurity, military operations, reinforcement learning, knowledge graph reasoning, and validation and verification.
claimNeuro-symbolic systems offer a solution to the limitations of purely statistical models in high-stakes domains such as healthcare, cybersecurity, and autonomous systems by bridging perception and reasoning.
claimUncertainty-aware neuro-symbolic intrusion detection systems in cybersecurity combine probabilistic symbolic reasoning with high-throughput neural traffic classifiers to identify previously unseen threats through open-set detection.
Course Schedule - Texas Law law.utexas.edu University of Texas School of Law 3 facts
claimThe 'Cybersecurity Law & Policy' course at Texas Law is cross-listed with another school and covers legal and policy issues associated with cybersecurity.
claimThe federal False Claims Act influences compliance in sectors including health care, defense, cybersecurity, education, and international trade.
referenceThe Strauss Center's 'Integrated Cybersecurity Studies' program is a Hewlett Foundation-funded project designed to increase interdisciplinary education regarding cybersecurity.
Hybrid War: High-tech, Information and Cyber Conflicts connections-qj.org Connections: The Quarterly Journal Mar 1, 2026 3 facts
claimJeffrey Carr, a United States specialist in cyber security, characterizes Cyber Berkut as a group of Russian activists.
perspectiveState policies regarding advanced technological, information, and cyber security support systems are among the most critical components of national security policy in the military sphere.
procedureEffective countermeasures to crisis situations in cyberspace, based on experience from the Anti-Terrorist Operation (ATO) in occupied areas of Ukraine, include: (1) systematic development of forms, methods, and means of operational detecting, protection, and active countermeasures to information threats; (2) scientific research and development of specialized software and hardware for information activity; (3) professional military education and training based on combat experience; (4) conducting applied national and international training, war gaming, and consultations; (5) improving the training and education of military and civil specialists in information and cyber security; and (6) operational implementation of lessons learned in national and international security systems.
From FOIAs to planes, Jeffrey Epstein's brushes with the CIA sashaingber.substack.com Sasha Ingber · Substack Feb 16, 2026 2 facts
claimSherrill L. Nicely is a CIA official who, according to her biography, was responsible for overseeing the defensive posture of the CIA's cyber security capabilities.
claimSherrill L. Nicely, a CIA official responsible for overseeing the agency's cyber security capabilities, was scheduled to be a speaker at a 2017 Deutsche Bank-organized lunch attended by Jeffrey Epstein and Paul Barrett.
Strategic Rivalry between United States and China swp-berlin.org SWP 2 facts
claimThe European Union faces a threat of global digital commons collapse if it fails to establish permanent security- and confidence-building measures with major powers, including China, regarding cybersecurity and Industry 4.0.
claimThe European Union faces a threat of a global collapse of the digital commons if it fails to work with major powers, including China, to establish security- and confidence-building measures for cybersecurity and Industry 4.0.
United States Foreign Intelligence Relationships everycrsreport.com EveryCRSReport.com May 15, 2019 2 facts
claimUnited States intelligence relationships with foreign partners are strategic and cover national security priorities including national defense, emerging threats, counterterrorism, counter-proliferation, treaty compliance, cybersecurity, economic and financial security, counter-narcotics, and piracy.
claimUnited States intelligence relationships with foreign counterparts are generally strategic and address national security priorities including national defense, emerging threats, counterterrorism, counter-proliferation, treaty compliance, cybersecurity, economic and financial security, counter-narcotics, and piracy.
Cyber Warfare in 2026: Trends, Threats, AI & Global Risks eccu.edu ECCU 2 days ago 2 facts
claimIndividuals with military backgrounds are particularly valuable in cyber warfare because they can combine their understanding of military operations with cybersecurity expertise.
claimCyber warfare requires interdisciplinary expertise that spans cybersecurity, artificial intelligence, geopolitics, and risk management.
Neural-Symbolic AI: The Next Breakthrough in Reliable and ... hu.ac.ae Heriot-Watt University Dec 29, 2025 2 facts
referenceThere is a growing need for AI systems that act predictably in the face of uncertainty, particularly in high-stakes fields such as healthcare, autonomous driving, and cybersecurity (Zhang & Sheng, 2024).
claimHybrid AI models in cybersecurity use neural networks to detect abnormal activities while applying threat intelligence rules to enable proactive cyber defense.
Political and social trends in the future of global security. A meta ... link.springer.com Springer Dec 5, 2017 2 facts
referenceForesight studies emphasize the importance of cyber defense and security for state strategic resources, such as armed forces, public administration, and critical infrastructure, as well as the necessity of collaborating with private companies to protect strategic private interests like the financial and energy sectors.
claimIt is assumed that vital cyber security needs on a smaller scale will be provided as a service by the market.
Neurosymbolic AI: The Future of Artificial Intelligence - LinkedIn linkedin.com Karthik Barma · LinkedIn May 24, 2024 2 facts
claimNeurosymbolic AI identifies potential security breaches by analyzing network traffic patterns and applying security protocols and rules, which enhances the detection of sophisticated threats and reduces response times.
claimNeurosymbolic AI automates incident response in cybersecurity by combining real-time data analysis with predefined security policies to minimize damage and ensure swift containment.
Weekly Innovations and Future Trends in Open Source dev.to Vitali Sorenko · DEV Community May 19, 2025 2 facts
claimBetween April 28 and May 4, 2025, the open source software landscape experienced growth in the fields of artificial intelligence, DevOps, and cybersecurity.
claimLinux Kernel 6.10 integrates improved security modules designed to help system administrators defend servers and IoT devices against cybersecurity threats.
War in the Middle East and the Role of AI-Powered Cyberattacks manaramagazine.org Manara Magazine Mar 13, 2026 1 fact
claimMachine learning systems are utilized for defensive cybersecurity tasks, including intrusion detection, log analysis, and automated response.
What Is Open Source Software? - IBM ibm.com IBM 1 fact
claimOpen source intelligence (OSINT) functions as a cybersecurity tool by using vast amounts of open data to identify threats, track potential risks, and ensure that open source software remains secure and reliable.
Open-source software - Wikipedia en.wikipedia.org Wikipedia 1 fact
claimCybersecurity concerns, including accidental vulnerabilities and attacks by outside agents, have led to increased governmental interest in contributing to software governance.
Study about the impact of open source software and hardware ... digital-strategy.ec.europa.eu European Commission Sep 2, 2021 1 fact
claimThe study identified strengths, weaknesses, opportunities, and challenges of open source in ICT policy areas including cybersecurity, artificial intelligence, digitizing European industry, connected cars, high-performance computing, big data, and distributed ledger technologies.
KR 2026 : 23rd International Conference on Principles of ... - WikiCFP wikicfp.com WikiCFP 1 fact
claimThe field of Knowledge Representation and Reasoning (KR) has contributed to AI areas including agents, automated planning, robotics, and natural language processing, as well as fields such as data management, the semantic web, verification, software engineering, computational biology, and cybersecurity.
Defense Tech Trends for 2026: Innovation in Action - NSTXL nstxl.org NSTXL 1 fact
claimCybersecurity and cyberwarfare are evolving as core defense components due to the expansion of digital infrastructure, software-defined systems, and networked operations.
How NATO can integrate AI to prevail in future algorithmic warfare atlanticcouncil.org Atlantic Council 4 days ago 1 fact
claimMilitary applications of artificial intelligence range from low-stakes administrative automation and training to operational functions like logistics and cybersecurity, and high-stakes roles in targeting, electronic warfare, and human-machine teaming in combat.
The impact of remote and hybrid work models on small and Medium ... link.springer.com Springer Sep 26, 2025 1 fact
measurementSharma et al. (2023) observed productivity and profitability improvements among 200 small and medium-sized enterprises (SMEs) in India, while also noting challenges related to cybersecurity and communication breakdowns.
Cyber Insights 2025: Open Source and Software Supply Chain ... hendryadrian.com SecurityWeek Jan 15, 2025 1 fact
referenceSecurityWeek's Cyber Insights 2025 report analyzes expert predictions regarding the evolving cybersecurity landscape, specifically focusing on Open Source Software (OSS) and the software supply chain.
Geopolitics of the energy transition: between global challenges and ... geoprogress-edition.eu Simona Epasto · Geoprogress Edition Oct 26, 2025 1 fact
claimThe energy transition introduces new geopolitical challenges, specifically regarding cybersecurity and access to minerals essential for renewable technologies, creating a complex and evolving geopolitical landscape.
(PDF) Supply Chain 4.0: A Survey of Cyber Security Challenges ... researchgate.net ResearchGate Oct 15, 2025 1 fact
referenceThe paper 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions' examines the nature of military supply chains 4.0, specifically comparing them to commercial supply chains to reveal differences in strengths, weaknesses, dependencies, and foundational technologies.
What is Open Source: Understanding Its Impact on Technology and ... algocademy.com Algocademy 1 fact
claimOpen source software contributes to cybersecurity by providing transparency through code inspection for vulnerabilities, enabling rapid release of security patches by the community, and offering a variety of tools to address different security needs.
Navigating the Digital Battlefield - Joint Air Power Competence Centre japcc.org JAPCC 1 fact
measurementBetween 2013 and 2015, Iranian cybersecurity spending increased significantly, leading to the creation of Hezbollah’s Cyber Army (HCA).
Sustainable Energy Transition for Renewable and Low Carbon Grid ... frontiersin.org Frontiers Mar 23, 2022 1 fact
claimCyber security in the context of smart grids refers to vulnerabilities that compromise computer-based systems and operations, including data inputs, data analysis, data processing, real-time operation and coordination of electricity supply systems, energy delivery, and end-use systems control.
Iran's Strategies in Response To Changes in US-China Relations mepc.org Middle East Policy Council 1 fact
claimChina and Iran collaborate on technological assistance in fields including artificial intelligence and cybersecurity.
A systematic literature review of knowledge graph construction and ... sciencedirect.com ScienceDirect Feb 15, 2024 1 fact
claimKnowledge graphs are designed to visually represent complex concepts in cybersecurity, which aids students in understanding and implementing project challenges.
Why Epstein's Links to the CIA Are So Important | The Nation thenation.com The Nation Dec 19, 2025 1 fact
quoteIn a 2014 email to Ehud Barak regarding cybersecurity, cyberwarfare, and surveillance, Jeffrey Epstein wrote: “with civil unrest exploding in ukraine syria, somolia [sic], libya, and the desperation of those in power, isn’t this perfect for you.”
Rethinking Espionage in the Modern Era cjil.uchicago.edu Chicago Journal of International Law 1 fact
perspectiveSusanna Bagdasarova argues that the international community should centralize cybersecurity efforts due to the potential economic and personal costs of large-scale cyberattacks.
Hybrid Warfare 2026: Cyber & Kinetic Threats Converge - Cyble cyble.com Cyble 3 days ago 1 fact
claimProactive measures such as multi-factor authentication, network segmentation, and robust incident response frameworks are important for cybersecurity.
7 Benefits of Artificial Intelligence (AI) for Business - UC Online online.uc.edu University of Cincinnati Online 1 fact
claimAI enhances cybersecurity by identifying potential threats, monitoring network activity, and responding to security breaches in real-time, while machine learning algorithms detect anomalies or vulnerabilities to predict attacks.
LLM Knowledge Graph: Merging AI with Structured Data - PuppyGraph puppygraph.com PuppyGraph Feb 19, 2026 1 fact
claimLLM knowledge graphs enhance cybersecurity by fusing contextual reasoning with structured threat data to enable precise attack detection, rapid vulnerability mapping, and explainable risk mitigation.
Refreshing global energy security policy and infrastructure for the ... global-solutions-initiative.org Global Solutions Initiative 1 fact
claimKey considerations for G20 members regarding power sector transition include the roles of coal and natural gas, power system flexibility, electricity market reforms, regional electricity market integration, flexibility in gas markets, digitalization, cybersecurity, and end-use sector coupling.
UFOs and the U.S. government: The push towards greater ... - WBUR wbur.org WBUR Nov 14, 2023 1 fact
claimGarrett Graff is a national security writer who has covered national security in Washington, D.C. for 20 years, focusing on the intelligence community, federal law enforcement, cybersecurity, and counterterrorism.
European Union | Springer Nature Link link.springer.com Springer Jan 2, 2026 1 fact
referenceGeorge Christou's 2016 book 'Cybersecurity in the European Union: Resilience and adaptability in governance policy' analyzes the governance, resilience, and adaptability of cybersecurity policies within the European Union.
Strategic Autonomy or Transatlantic Dependency The EU's Evolving ... strasbourgcentre.com Strasbourg Centre Aug 12, 2025 1 fact
claimThe European Union's concept of strategic autonomy encompasses economic diversification, industrial innovation, cybersecurity, and critical infrastructure protection.
https://scholar.google.com/citations?view_op=view_... scholar.google.com Theresa Sobb, Benjamin Turnbull, Nour Moustafa · MDPI 1 fact
claimThe technologies used in Supply Chain 4.0, both individually and in combination, create cyber security issues that require addressing.
Call for Papers: Special Session on KR and Machine Learning kr.org KR 1 fact
claimThe Special Session on KR and Machine Learning at KR2022 welcomes papers on topics including learning symbolic knowledge (ontologies, knowledge graphs, action theories, commonsense knowledge, spatial/temporal theories, preference/causal models), logic-based/relational learning algorithms, machine-learning driven reasoning, neural-symbolic learning, statistical relational learning, multi-agent learning, symbolic reinforcement learning, learning symbolic abstractions from unstructured data, explainable AI, expressive power of learning representations, knowledge-driven natural language understanding and dialogue, knowledge-driven decision making, knowledge-driven intelligent systems for IoT and cybersecurity, and architectures combining data-driven techniques with formal reasoning.