Difference between revisions of "Games - Security"
m |
m |
||
(11 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
|title=PRIMO.ai | |title=PRIMO.ai | ||
|titlemode=append | |titlemode=append | ||
− | |keywords=artificial, intelligence, machine, learning, models | + | |keywords=ChatGPT, artificial, intelligence, machine, learning, GPT-4, GPT-5, NLP, NLG, NLC, NLU, models, data, singularity, moonshot, Sentience, AGI, Emergence, Moonshot, Explainable, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Hugging Face, OpenAI, Tensorflow, OpenAI, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, LLM, metaverse, assistants, agents, digital twin, IoT, Transhumanism, Immersive Reality, Generative AI, Conversational AI, Perplexity, Bing, You, Bard, Ernie, prompt Engineering LangChain, Video/Image, Vision, End-to-End Speech, Synthesize Speech, Speech Recognition, Stanford, MIT |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools |
− | |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | + | |
+ | <!-- Google tag (gtag.js) --> | ||
+ | <script async src="https://www.googletagmanager.com/gtag/js?id=G-4GCWLBVJ7T"></script> | ||
+ | <script> | ||
+ | window.dataLayer = window.dataLayer || []; | ||
+ | function gtag(){dataLayer.push(arguments);} | ||
+ | gtag('js', new Date()); | ||
+ | |||
+ | gtag('config', 'G-4GCWLBVJ7T'); | ||
+ | </script> | ||
}} | }} | ||
− | [ | + | [https://www.youtube.com/results?search_query=~game+Cyber+security+artificial+intelligence+deep+learning+ai Youtube search...] |
− | [ | + | [https://www.google.com/search?q=~game+Cyber+security+artificial+intelligence+deep+learning+ai ...Google search] |
+ | * [[Gaming]] ... [[Game-Based Learning (GBL)]] ... [[Games - Security|Security]] ... [[Game Development with Generative AI|Generative AI]] ... [[Metaverse#Games - Metaverse|Games - Metaverse]] ... [[Games - Quantum Theme|Quantum]] ... [[Game Theory]] ... [[Game Design | Design]] | ||
* [[Case Studies]] | * [[Case Studies]] | ||
− | |||
** [[Education]] | ** [[Education]] | ||
** [[Healthcare]] | ** [[Healthcare]] | ||
− | * [[ | + | * [[What is Artificial Intelligence (AI)? | Artificial Intelligence (AI)]] ... [[Machine Learning (ML)]] ... [[Deep Learning]] ... [[Neural Network]] ... [[Reinforcement Learning (RL)|Reinforcement]] ... [[Learning Techniques]] |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
* [[Q Learning]] | * [[Q Learning]] | ||
** [[Deep Q Network (DQN)]] | ** [[Deep Q Network (DQN)]] | ||
− | * [[Cybersecurity]] | + | * [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]] |
− | * [[Python]] | + | * [[Python]] ... [[Generative AI with Python|GenAI w/ Python]] ... [[JavaScript]] ... [[Generative AI with JavaScript|GenAI w/ JavaScript]] ... [[TensorFlow]] ... [[PyTorch]] |
− | * [[Development]] | + | * [[Analytics]] ... [[Visualization]] ... [[Graphical Tools for Modeling AI Components|Graphical Tools]] ... [[Diagrams for Business Analysis|Diagrams]] & [[Generative AI for Business Analysis|Business Analysis]] ... [[Requirements Management|Requirements]] ... [[Loop]] ... [[Bayes]] ... [[Network Pattern]] |
− | * [ | + | * [[Development]] ... [[Notebooks]] ... [[Development#AI Pair Programming Tools|AI Pair Programming]] ... [[Codeless Options, Code Generators, Drag n' Drop|Codeless]] ... [[Hugging Face]] ... [[Algorithm Administration#AIOps/MLOps|AIOps/MLOps]] ... [[Platforms: AI/Machine Learning as a Service (AIaaS/MLaaS)|AIaaS/MLaaS]] |
− | * [ | + | * [https://shostack.org/games.html Tabletop Security Games & Cards | Shoestack + Associates] |
− | * [ | + | * [https://www.csiac.org/csiac-report/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Hypergaming for Cyber - Strategy for Gaming a Wicked Problem] |
− | * [ | + | * [https://www.circadence.com/ Circadence] |
+ | * [https://cyberstart.com/ CyberStart] | ||
{|<!-- T --> | {|<!-- T --> | ||
Line 35: | Line 39: | ||
<youtube>1IoY_RyX1-w</youtube> | <youtube>1IoY_RyX1-w</youtube> | ||
<b>CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem | <b>CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem | ||
− | </b><br>CSIAC [ | + | </b><br>CSIAC [https://www.csiac.org/podcast/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Learn more] Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented. |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
Line 43: | Line 47: | ||
<youtube>wv7I_TjPWDE</youtube> | <youtube>wv7I_TjPWDE</youtube> | ||
<b>Live Project Ares Walk Through | <b>Live Project Ares Walk Through | ||
− | </b><br>If you are interested in playing Project Ares, please fill out this form - | + | </b><br>If you are interested in playing Project Ares, please fill out this form - https://bit.ly/ITCQ-ARES-Q Project Ares Gamified Cyber Security Training from Circadence https://www.circadence.com www.zachtalkstech.com teespring.com/stores/it-career-questions |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> |
Latest revision as of 22:03, 3 November 2024
Youtube search... ...Google search
- Gaming ... Game-Based Learning (GBL) ... Security ... Generative AI ... Games - Metaverse ... Quantum ... Game Theory ... Design
- Case Studies
- Artificial Intelligence (AI) ... Machine Learning (ML) ... Deep Learning ... Neural Network ... Reinforcement ... Learning Techniques
- Q Learning
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Python ... GenAI w/ Python ... JavaScript ... GenAI w/ JavaScript ... TensorFlow ... PyTorch
- Analytics ... Visualization ... Graphical Tools ... Diagrams & Business Analysis ... Requirements ... Loop ... Bayes ... Network Pattern
- Development ... Notebooks ... AI Pair Programming ... Codeless ... Hugging Face ... AIOps/MLOps ... AIaaS/MLaaS
- Tabletop Security Games & Cards | Shoestack + Associates
- Hypergaming for Cyber - Strategy for Gaming a Wicked Problem
- Circadence
- CyberStart
|
|
|
|