The next iteration of the Structured Threat Information eXchange machine-to-machine cyberthreat information-sharing language is nearing completion.
Government Computer News From ACM TechNews | April 20, 2017
A failed missile launch in North Korea Sunday has brought renewed attention to reports that the United States is trying to degrade North Korea's missile capabilities...CNN From ACM News | April 19, 2017
Some experts warn deep-learning artificial intelligence technologies cannot be adopted without reservations if their creators cannot understand how they reason....Technology Review From ACM TechNews | April 17, 2017
Researchers from the Swiss Federal Institute of Technology Zurich in Switzerland have used the fifth-most powerful supercomputer in the world to simulate the behavior...Technology Review From ACM TechNews | April 17, 2017
I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...IEEE Spectrum From ACM News | April 14, 2017
Steven Smith at MIT's Lincoln Laboratory has developed an algorithmic technique to thwart the collection of online users' browsing history. The algorithm conceals...NextGov.com From ACM TechNews | April 14, 2017
DARPA this month plans to detail its System Security Integrated Through Hardware and Firmware program, with the goal of developing new integrated circuit architectures... From ACM TechNews | April 13, 2017
Just as ancient Greeks fantasized about soaring flight, today's imaginations dream of melding minds and machines as a remedy to the pesky problem of human mortality...The Conversation From ACM Opinion | April 13, 2017
Vanderbilt University professor Eugene Vorobeychik and colleagues have combined game theory and computer security expertise to design a method for auditing electoral...The Conversation From ACM TechNews | April 13, 2017
Experts say the growing pervasiveness and maturity of machine learning makes it an increasingly attractive candidate for cybersecurity applications.
Government Computer News From ACM TechNews | April 11, 2017
Researchers have successfully tricked Google's Cloud Video Intelligence application programming interface into identifying a video about gorillas as one dealing...Digital Trends From ACM TechNews | April 6, 2017
Researchers say they have conducted the first-ever large-scale systematic study of how the trusty applications on Android phones are able to talk to one another...Virginia Tech News From ACM TechNews | April 3, 2017