Sunday, May 24, 2020

The Honor Tug Of War - 2009 Words

The Honor Tug of War In The First Part of King Henry IV, Shakespeare integrates the concept of honor throughout the whole play. Honor is often thought of as a symbol that signifies approval or distinction, but it is how one embodies this honor that varies in the play. Certain characters are so fixated with honor that they forget about the other aspects of their life, in direct contrast other characters have no belief in honor and only care about self-preservation. Shakespeare uses characters like this to illustrate how the positive traits can be contained in one man who embodies the truest form of honor, this being Prince Hal. By comparing Hotspur and Falstaff’s opposing views of honor, Shakespeare exposes that the Prince has the beneficial traits of the two, therefore making him the symbol of rational and noble honor. The ballad â€Å"A lamentable Ditty composed upon the Death of Robert Lord Devereux, late Earle of Essex, who was be-headed in the Tower of London, on Ashwenes day in the morning, 1600.To the tune of Welladay† illustrates how honor was viewed in the Renaissance through the story telling of a recently passed on Lord. The fourth stanza of the ballad explains how Robert Lord Devereux achieved his honor on the battlefield by stating â€Å"All men that is and was, / evermore still: / One day as it was soone, / in honour of our Queene, / Such deeds hath nere bin seene, / as he did doe.† (Pepys 27-32). This quote demonstrates that Devereux completed tasks on the battlefieldShow MoreRelatedThe Is The State Of Being A Child851 Words   |  4 Pageshate it. I hate being stuck in the middle of two sides, trapped in the center of the conflict, with no place to turn. I’m not on one side and I’m not on the other—I’m just lost in the middle. When I close my eyes, I imagine that it’s all a game of tug-of-war. I am the rope that each parent is so desperate to gain. They each pull without compromise, determined to win me over. Each pull is a painful blow, a searing pain. Sometimes I think the solution would be to just go to one side—to give one parentRead MoreTaking a Look at Capital Punishment677 Words   |  3 PagesRevolution (â€Å"Part I†). A tug-of-war has seemed to exist for centuries on the topic of the death penalty. As citizens nationwide becomes more and more left-leaning, we are seeing a growing number of votes against this inhumane use of punishment. However, the voice of those who continue to fight for the practice of the death penalty is loud. They argue that even though the innocent have been killed by the death penalty, they are still receiving their justice and rightful honor by being later exoneratedRead MoreEssay on Looking Forward to Starting High School631 Words   |  3 Pagesof the world. I am sure that they have prepared me for high school, and it will be a breeze. The first experience of eighth grade that I had really enjoyed was being in many extracurricular activities such as Academic Superbowl, National Junior Honors Society, and even band. These activities have created many memorable memories for me to hold onto for the years to come. I have also made many friends that hopefully I will never forget. The main highlight of the eighth grade year was probablyRead MoreThe Declaration, Facts And Emotions909 Words   |  4 Pagesdeeply within the writings of The Declaration of Independence. Thomas Jefferson believed that all of man’s rights came from God, and in the Preamble he expresses the thoughts of the people when he wrote â€Å"although a document justifying revolutionary war, the Declaration argues throughout on the basis of universal reason by paying â€Å"decent respect to the opinions of mankind† and appealing to â€Å"the Laws of Nature and of Nature’s God† (qtd. First Principles Series 1). Although God played a very importantRead MoreThe Myth Of The Elephant Festival862 Words   |  4 Pageschosen elephant based on his physical features to carry the honorable relic during the festival. The chosen elephant must be a male, have a trunk and tail that touches the ground and the elephants riding area must be as flat as possible. After a priest honors the relic at its temple home, it is placed in a golden casket that is tied to the back of the Chief of the Elephants and is carried from the temple to the streets (Lopta, Peg). During the festival in Jaipur, Rajasthan India, the tourists are portrayedRead MoreAnalysis Of The Documentary Latino Americans 954 Words   |  4 Pagesand was part of the first airborne migration in American’s history. Juanita settled in ‘el barrio’ in 1953. This community stuck together and helped each other through the rough times. Juanita met Joe Sanabria, who served oversea during the Korean War, in a New York nightclub which she later married. Many Puerto Ricans felt like then we’re Americans until they came to the U.S and experienced the reality of it. Juanita explains that it was awful, one time she got on a bus and tried to sit next toRead MoreThe Great Dictator s Speech By Charlie Chaplin1182 Words   |  5 Pages In â€Å"The Great Dictator’s Speech† spoken by Charlie Chaplin, a famous actor in the early 20th century, seems to talk about the evils in the world and how mankind should all unite and make peace with one anothe r without the need for war, death, and petty rivalries. However, the goal of the speaker in this speech actually points towards his desire to gain power, which he will then abuse as it is written in the name,† The Great Dictators Speech.† The main purpose of the speech itself is to informRead More Julius Caesar Essay: Brutuss and Antonys Speeches1054 Words   |  5 Pagesair is once again illustrated at the very opening line of his oration when he demands the attention of the people, Romans, countrymen, and lovers, hear me for my / cause, and be silent, that you may hear.nbsp; Believe me / for mine honor and have respect to mine honor, that / you may believe(Act III, scene ii, lines 13-16).nbsp; Antony uses a similar opening that contrasts in meaning, Friends, Romans, countrymen, lend me your ears (Act III, scene ii, line 75).nbsp; In just this one line, AntonyRead MoreThe Olympics : A Major Dream Of Young Athletes1695 Words   |  7 PagesBeing an athlete in the Olymp ics is a major dream of young athletes today, but what if there were no Olympics? The Olympics originally began as a way to honor the Greek gods, after many years the Olympics were brought back to become an annual event, and now the games are a major part of sports entertainment today. The ancient Greek games are believed to be founded around 776 BC, although not much proof has been found to justify this date. These games only known to be celebrations of the powerfulRead MoreThe History of Naming U.S Navy Ships1431 Words   |  6 PagesWorld War 1 a new ship was made called the minesweeper (Ship Naming in the United States Navy). So it was time for the new way to name the ships. Assistant Secretary of the Navy at that time was Franklin D. Roosevelt, who had a keen interest in amateur ornithology (Ship Naming in the United States Navy). So he pretty much named the ships off bird names. Ships that obtained the names from Roosevelt served as the backbone of the Navy’s mine force for the next quarter century; many earned honors in World

Thursday, May 14, 2020

One Cold Winter Night A Woman - 1520 Words

One cold winter night a pregnant woman Nicole Jackson, a wife, and also a mother of two tried to get in contact with her husband who was in the navy. Her husband John left his wife in the worst pain of her life, to go on duty. Nicole knew when she married her husband that he was dedicated to his job, but she thought being a supportive wife and mother to her family would somehow make him come around more. Two days went by and Nicole hasn’t heard nor seen her husband. The kids started to worry about their father. Since Nicole was pregnant she couldn’t control her feelings and emotions. The kids are asking â€Å"Why is mom crying?† and â€Å"Where is daddy?† Nicole had no answers for her children because honestly she also had no idea where he is†¦show more content†¦Later on that Tuesday afternoon, Nicole went to have coffee with her two friends Sarah and Amy. Sarah never liked John because before Nicole married him and had children by him, he used to beat her. To this day Nicole always says â€Å"He will never go back to beating me again, he has changed†. â€Å"Listen Nicole, I’m your friend and I will always be here for you, so if you say he has changed I have no choice but to believe you. I love you and don’t want you to get hurt again.† Says Sarah. On the 6th day, the same lady that Nicole had spoken to first about her husband called her back to inform her that John had not been enrolled in the Navy for 8 years now. â€Å"This is absurd, this has to be a lie. He’s been back in fourth from home to the navy going for the past 15 years.† Cries Nicole. â€Å"I’m sorry ma’am but this is the truth.† So now Nicole is worried. She waits another 2 weeks to see if her husband will return. After those 2 weeks she started to look at places where he would mostly likely be. She was going to any sources she could but her first stop was his home office. Nicole starts to really worry about her husband, the kids are started to see their mother cry every day, what is there left to do? 3 weeks pasted and Nicole finally had some led to where her husband might be. That Wednesday night she asked her friend Amy can she watch her kids for a little while, Amy said â€Å"Yes, but she what’s going on?† Nicole told her â€Å"I have an idea

Wednesday, May 6, 2020

The Problem Of Climate Change - 1188 Words

Who is involved with the climate change in California? Humans, corporations, electricity generators, petroleum refineries facilities, oil and gas production, hydrogen plants, and cogeneration. What part of the country is exactly doing the most damage? Long Beach - Los Angeles, CA. How many people are affected, according to official records? People who are residences in California, are the one who are most affected. Mostly the general people, who is in the radius of climate change. For example Sacramento, California is lacking rain which is causing lots of wildfires. Why is this issue so clearly unfair? The reason why climate change is so unfair, is because of the aftermath it causes due to our everyday activities. For example California is†¦show more content†¦It also claims to be only 51% average instead of being 100%. This is also caused from the current storms situation or known as climate change. Another bad situation of recent events in California is when The Rough, a w ildfire in Sierra Nevada forest grew about 85,894 acres. This event was bound to happen due to California lack of water supply. Which was most likely due to dry forest due to climate change. What kind of groups in the country is working to help improve this situation? Companies like 350.org, Sierra Club, Greenpeace, Idle No More, and Union of concerned scientist are actually working on the situations of climate change. What groups or individuals in Alexandria is working to help improve this situation? Those would be the individuals who are using different kind of ways to support their needs without depending on fossil fuels as an energy source. For example someone deciding to use solar power energy instead of natural gas and electricity that are harming our environments.What kind of individuals or groups in the country say that it’s not a issue or problem? That would be the citizens who are blinded by the truth. The kind of individuals who don t have the knowledge on how many companies like Exxon, BP, and Chevron and citizen who actually use fossil fuels to spread the harmful CO2 into the air we breathe. What individuals or groups in the country are working to mak e sure that this

Tuesday, May 5, 2020

The Offense Balance in Cyberspace-Free-Samples-Myassignmenthelp

Question: How will Artificial Intelligence Shift the Offense-Defense Balance in Cyberspace? Answer: Introduction Technology is continuously evolving, cyber-attacks and cyber security also being advanced and evolving at the same pace as technology. Cybersecurity threats graphs are continuously increasing and most of the threats generally become undetectable unless it harms in the real world. For a general human, it is a very complex matter to analyse all the data saved in the system[1]. This report focuses on the role of Artificial Intelligence in balancing the Offense and Defense in cyberspace. AI is not a very new technology as robots have been around since 1950's of which, many practical applications are available in our daily life. This report presents the objectives related to the cybersecurity and emphasizes on cyberattacks those are becoming a common factor for the data and information saved in the system either offline or online. The Internet has become an integral part of the life living for almost every human being and saving data or information on the internet makes them vulnerable to cyberattacks. This report presents an idea of how AI could change the face of the cybersecurity and contribute to the Defense through a debate. Watson, GoogleDeepmind, and Showan are some of the examples of AI those are contributing to enhancing the cybersecurity. The Offense-Defence Balance (ODB) theory has been discussed in this report with regard to the international stability and how AI could be implemented and used for the good cause. Role of Artificial Intelligence in Cyberspace Artificial Intelligence John McCarthy defined this as, The science and engineering of making intelligent machines, especially intelligent computer programs. It can be described as a way of making the software, computer, and computer-controlled robot much smarter, similar to the human intelligence. Various researchers are trying to implement such thinking for decades and success is leading to various attempts[2]. It can be described as the mixture of Philosophy, computer science, neuron science, biology, psychology, math, and sociology. There are various applications of AI in the current world including games, expert systems, speech recognition, natural language processing, intelligent robots, handwriting recognition and much more[3]. Artificial Intelligence (AI) could act as a boon for such issues and could help in analysing a very wide range of data in very less time as compared to the data processed by humans.Offense-Defense in cyberspace is another concerning topic related to the virtual computer world t hat could be overcome by Artificial intelligence[4]. Following graph shows the growth in the investment in AI technology for the cybersecurity in future: Figure 1: Rate of growing investment in AI for Cybersecurity (Source: Kishor, 2017) Cyberspace Cyberspace can be defined as the virtual world for the computers or an electronic medium that could be used from a global computer network in a manner to accomplish online communication. The world computes operating TCP/IP protocol, which contributes to the large virtual computer network in a manner to aid the data exchange and communication between the computers[5]. It can also be described as a platform for the virtual and interactive environment for a wide range of participants. Offense Defence Strategy The most common application of AI could be seen in Google search engine other than virtual gaming, Big Data, Data Mining, military weapons, etc. AI is advancing every technology anyone could think of. Various features of the cyberspace suggest that AI has been used for offense more, over the Defense and following are some the considerations on which these objectives depends: Key Vulnerabilities: Vulnerabilities in the systems are the main cause behind every cyberattack as malicious coding, malware, viruses and other similar threats can only be executed if there is any vulnerability in the system. Other general factors can be related to the flaws in the software or if the intruder gets access to the network[6]. Technically, it can be said that it is impossible for any programmer or IT specialist to rule out flaws in the design of the software and in practical life, it is unfeasible to detach the computer from the network. One of the major characteristics of cyber defense can be stated as it changes much rapidly, which could lead to unanticipated and catastrophic consequences[7]. Offense progress is more rapid than Defense: Cyberspace is not a natural objective or phenomenon rather it has resulted from the technological revolution[8]. Technology is being continuously evolved and so the features of the cyberspace, offense-defense balance also being evolved. It can be seen that offense and defense both are developing and improving, and the constant upgrades in hardware and software is one of the major causes for this. However, the rate of the growth in defense is lagging the development of the offense. Slayyton (2017) stated, Offense-Defense curves at levels which characterize that todays cyberspace favours the offense. That is, another dollars worth of offense requires far more than another dollars worth of defence to restore prior levels of security[9]. Following graph can depicts the role of AI in offense defense strategy: Figure 2: Role of AI in Offense-Defense strategy (Source: Riley, 2017) Attribution is Difficult: The cyberattacks could be executed from a very far distance via the internet, which makes it difficult to identify the main culprit behind the offense penetration. Considering the fact that, a handful of people are needed to plan and execute such attacks, and the government might clearly deny from such responsibilities[10]. For instance, the attack which was executed on Estonian websites in 2007, in which botnets were used to deliver DoS attack, in which various requests showed the involvement of Kremlin in the attack. However, there was no concrete evidence that they carried out the attack and arguments became plausible[11]. Offense-defense system is not directly affected by the difficulty in attribution but indirectly it supports the offense as it nourished, that the attack could be carried out without any punishment. Cyberspace is currently a Defence Dominant Domain Cyberspace has become the favorite platform for the intrusion and breaches because a good programmer could use the same machine learning and manipulate the system for their own purpose easily, and could target a bigger prey. Technology is evolving with rapid speed than any other innovation and cyberattacks are the threats that are not going towards an end any soon. Artificial Intelligence could play a major role in guarding the systems and preventing such intrusions. Artificial intelligence could be helpful in detecting the advancing threat, shortening the response times for the defense and refining the techniques that might be helpful in differentiating between the actions that must be ignored, and dreadful efforts for compromising the security[12]. Some examples of offense that could affect the individuals in the globe could be stated, as firstly, one the most devastating cyberattacks was Ransomware, using WannaCry as a malware, which affected most of the multinational companies, h ospitals, federals and many other places. This attack had been expected to be started on May 12, 2017. Secondly, national cyber incident response centre reported that hospital clinics in the UK were affected by a malware called Bad Rabbit. Many other federals systems were shut down and most of the organizations were not able to function well[13]. There are many other threats including the hacking of IoT devices those should be considered while talking about cybersecurity and Artificial Intelligence[14]. IoT devices are the general application of machine learning. Certain unwanted activities have shown that these are very easy subjects to be manipulated. Artificial intelligence will take no time in responding to such situations those might be detected as a threat element for the system. Harknett and Nyre in 2017, stated that before AI, it was being assumed that ninety percent of the data is fine as there was bandwidth to analyse only ten percent of the data. Many human labours could be saved using artificial intelligence, as AI mimics what a proper analyst would do[15]. In the current situation, IBM is also investing into Artificial Intelligence for the security using the cognitive computing platform. The company is contributing by making Watson much advanced and well-read through a wide range of security research. Currently, about fifty customers are using Watson in a manner to gain more information about the analytic platforms and security intelligence[16]. Watson is an example how AI could play a vital role in contributing to defense in an efficient and effective manner, with minimum time consumption. It was reported by IBM that AI used in Watson, could be helpful in performing investigation process for the bugs and glitches, sixty times faster than any human investigator[17]. This could lead to the solution from a complex analysis of any incident that could take a minute or an hour, which is way less time than what a programmer would take. AI with machine learning, could be the futuristic technology, whose evolvement is at a high pace and leading to the rapidness in the laborious process of data sorting, and comparing it based on the calculations and other circumstances[18]. Aiming at the quantum computing is another important aspect that will be helpful in ensuring that no stone is left unturned, and every data is well processed and evaluated. Computers are generally represented in zeroes and ones, AI could make it much easy through quantum computing by executing both, but neither at the same time. Quantum computing enables the users to look into every piece of the haystack through machine knowledge and explore the threat or bugs that might affect the security of the system. Examples of Artificial Intelligence Several experiments are still going on, if AI is used in, many advances then it might cause damage. An example could be taken from the Transformers' movie that states how high level of AI (Skynet) could cause damage. However, there are the many examples of AI technology that could contribute to balancing the cyber offense defense as cybersecurity is the most concerning objective related to the technology innovation nowadays. IBM, MIT, Google and many other big companies are continuously introducing the technologies implemented with AI and allowing more applications for this technology[19]. Showan, IBMs Watson, and Googles Deepmind are some of the examples that are contributing in securing the virtual world. Artificial intelligence collects the information related to the actions and activities of the commands through using Intelligent Automation (IA)[20]. Classic automation is another process, which is the technology that contributes to the machine learning and allows the machine to u nderstand the best probability of the actions. However, intelligent automation is a different objective related to the classic automation that could be helpful for machines in eliminating the unscaleable and expensive human intelligence without eliminating the factors related to the reliability or quality of the process. Merat and Amuhdati (2015) presented a paper emphasizing on Showan, as the artificial intelligence application in a manner to improve the cyber security in the virtual computer field[21]. They have introduced that machine learning can be understood as different types of computing processes and it can be mapped within a multitasking environment. Showan is software modelling and mapping paradigm that has been developed in a manner to characterize and learn the behaviour of the systems concerning the cyber security awareness against several concurrent threats[22]. Like other AI applications at its earlier stage, it was not much efficient, later on as the data storage wa s improved, the machine learning goes on enhancing and the calculations and upgrades resulted in an efficient technology. The aim was to develop a process that could be contended with more than one concurrent thread during the task performance[23]. This enables large data being transferred with a minimum time delay with the help of the machine learning and without compromising the security of the systems. Offense Defence Theory for International Stability Critics and Proponents of the Offense Defence Balance (ODB) hypothesis are generally concerned with international stability remarking as topical issues including the war inception, escalation, and security dilemma. The relative or assumed strength of defense over offense or offense over the defense of a country can lead towards opposite outcomes for the arguments related to these phenomena[24]. Considering the facts when conquests and the attack are held to be far easy than protection of the subjected target, theory of ODB can be helpful in predicting the common systematic outcomes that could be a security dilemma, possibilities of war to be happened, and tendency to increase the aims of the war[25]. Regarding the policies and strategies of the ODB implementation, there are various ways and they could be convinced that the offense has more advantage over the defense; the attackers might tend to perpetrate pre-emptive attacks. However, considering the facts related to the defense is easier than offense, "states have more incentives in a manner to compromise, embark on binding strategies and even engage in disarmament policies. Regarding the international stability, it is important to concern on the defense regardless of the offense, as the offense will only lead towards the destruction and loss of different countries properties (Kremmer and Muller 2013). The defense will always focus on eliminating the factors related to the threat to the system's data and information and this will be helpful in creating international peace. Most of the offense system targets on the subjects related to different countries in a manner to affect the stability and economic of that country and some of the governments support the attackers and try to protect them. This could also happen to the same country and the attackers might be protected by the affected country, however, there is not any profit in such intrusions and will only destroy the properties of those countries[26]. The defense strategy will not help the different countries in protecting their internal properties; rather it will also help in protecting the threats from outside the country and will ensure peace among them. Most of the countries' military is spending a lot of money in implementing AI into the weapons in a manner to make them much advanced and for a mass destruction. However, as stated above spending on offense will only lead to the wastage of money and stability will always be unbalanced. Cyberspace has a dual nature such as soft and hard, or virtual and real that is results in a peculiar battleground for the cyber programmers and target highly paying preys. Here different attackers attempt for the different purposes including disruptive processes such as destroying physical infrastructure. Another aspect related to the ODB can be stated as equally peculiar, is the centrality for the internet for the non-military and the military actors. Regardless of the difference between the non-military and military actors, they use either same software or hardware for the networks. (Abraham and Biddle 2016) stated, "the result is two-fold: on the one hand, cyber-threats can take the form of either criminal activities or acts of war just depending on the target of the attack[27]." The source of the threats related to the ODB varies conspicuously that range from the hackers, intelligent services, or to terrorists. Cyberattacks include unauthorized access to data and information through advance coding that makes the cyber espionage and other unauthorized tracking or monitoring system a cyberattacks too. No matter what the purpose is but, accessing the data or information related to the individual without having properly authorized access can be put in the category of cyber attacks. Companies facing cyberattacks can be represented in following graph: Figure 3: Share of companies facing cyberattacks (Source: Riley, 2017) The complexity of comparison between the offense and defense theory could be minimized if the attention has been drawn on both objectives separately while discussing the terms related to the ODB theory. Equally important, it is easier to assess their relative costs, as the main purpose of the action is not to control a territory but to compromise/ensure the effectiveness of a system or network[28].Considering the traditional war domains, it could be stated that it is probably impossible for measuring the ODB as if it were an equation. Conclusion Based on the above report it can be concluded that AI could be used as either an offense or a defense system that depends on how the application will be carried out. This report mainly focused on defense dominant domain of the AI in cybersecurity. Cybersecurity and national security are the two very vast and sensitive chapters for a human being and combining the thinking capability of a human being with the quantum computing strength of the computer could result in overcoming such shortcomings. AI could evaluate every haystack of data and information saved in the database in much easy and with very less time consumption that makes it a reliable technology. Despite so many advantages, there are certain issues with the AI as nothing is perfect in this world and AI could be used as an offensive system. Using AI for the offense could result in mass destruction and the intruder could easily operate such unwanted actions from the very far distance and easily get away with any law allegatio ns. AI is not only being used for the defense purpose however, even the government is using it in the offense in a manner to make the missiles more efficient and accurate. This report presents the bright side of the AI including how AI could be used against the cyberattacks. However, it is necessary to increase the boundary of the experiments considering the dark side of such advanced technology. References Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800 times)."International Security21, no. 1 (1996): 186-191. Betts, Richard K., ed.Conflict after the Cold War: arguments on causes of war and peace. Taylor Francis, 2017. Betz, David J.Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017. Cummins, Shannon C.The Garrison Domain: Civil Military Relations in the Cyberspace Domain. AIR COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB United States, 2015. Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac imaging: harnessing big data and advanced computing to provide personalized medical diagnosis and treatment."Current cardiology reports16, no. 1 (2014): 441. Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in cyberspace."Security Studies24, no. 2 (2015): 316-348. Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to earth."International Security38, no. 2 (2013): 41-73. Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in Cyberspace?."International Security(2017). Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial Intelligence Expert System." (2016). Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches." InPhilosophy of Systems Biology, pp. 169-180. Springer International Publishing, 2017. Kishor, N. (2017).Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by 2023: PS Market Research. [online] Houseofbots.com. Available at: https://houseofbots.com/news-detail/1419-1-artificial-intelligence-in-cyber-security-market-to-reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017]. Kremer, Jan-Frederik, and Benedikt Mller, eds.Cyberspace and international relations: Theory, prospects and challenges. Springer Science Business Media, 2013. Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians." (2017).. Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai. "Artificial Intelligence in Precision Cardiovascular Medicine."Journal of the American College of Cardiology69, no. 21 (2017): 2657-2664. Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but will never replace doctors' intuition."Contemporary OB/GYN62, no. 4 (2017): 30-32. Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare.Cyber Analogies, pp.96-107. Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss., Monterey, California: Naval Postgraduate School, 2015. Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-security acquirement." InElectrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on, pp. 1445-1450. IEEE, 2015. Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised classification on data streams." InBusiness Intelligence, pp. 88-125. Springer International Publishing, 2015. Miller, Steven E., and Stephen Van Evera, eds.The Star Wars Controversy: An" International Security" Reader. Princeton University Press, 2014. Pan, Yunhe. "Heading toward artificial intelligence 2.0."Engineering2, no. 4 (2016): 409-413. Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-darklight-gaming-changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017]. Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell.Neoclassical realist theory of international politics. Oxford University Press, 2016. Saltzman, Ilai. "Cyber posturing and the offense-defense balance."Contemporary Security Policy34, no. 1 (2013): 40-63. Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial Intelligence in Oncology."JNCI: Journal of the National Cancer Institute109, no. 5 (2017). Shaheen, Salma. "Offensedefense balance in cyber warfare." InCyberspace and International Relations, pp. 77-93. Springer Berlin Heidelberg, 2014. Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment."International Security41, no. 3 (2017): 72-109. Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract S6-07: Double blinded validation study to assess performance of IBM artificial intelligence platform, Watson for oncology in comparison with Manipal multidisciplinary tumour boardFirst study of 638 breast cancer cases." (2017): S6-07. Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures."arXiv preprint arXiv:1610.07997(2016). Kasprick, Robert, Jordan Hoffman, Jeremy Straub, and Eunjin Kim. "Cyber Security Artificial Intelligence Expert System." (2016). Miller, Steven E., and Stephen Van Evera, eds.The Star Wars Controversy: An" International Security" Reader. Princeton University Press, 2014. Krittanawong, Chayakrit, HongJu Zhang, Zhen Wang, Mehmet Aydar, and Takeshi Kitai. "Artificial Intelligence in Precision Cardiovascular Medicine."Journal of the American College of Cardiology69, no. 21 (2017): 2657-2664. Yampolskiy, Roman V., and M. S. Spellchecker. "Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures."arXiv preprint arXiv:1610.07997(2016). Betz, David J.Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge, 2017. Lieber, K., 2014. The Offense-Defence Balance and Cyber Warfare.Cyber Analogies, pp.96-107. Gartzke, Erik. "The myth of cyberwar: bringing war in cyberspace back down to earth."International Security38, no. 2 (2013): 41-73. Saltzman, Ilai. "Cyber posturing and the offense-defense balance."Contemporary Security Policy34, no. 1 (2013): 40-63. Slayton, Rebecca. "What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment."International Security41, no. 3 (2017): 72-109. Shaheen, Salma. "Offensedefense balance in cyber warfare." InCyberspace and International Relations, pp. 77-93. Springer Berlin Heidelberg, 2014. Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in cyberspace."Security Studies24, no. 2 (2015): 316-348. Lemaire, Vincent, Christophe Salperwyck, and Alexis Bondu. "A survey on supervised classification on data streams." InBusiness Intelligence, pp. 88-125. Springer International Publishing, 2015. Cummins, Shannon C.The Garrison Domain: Civil Military Relations in the Cyberspace Domain. AIR COMMAND AND STAFF COLL MAXWELL AFB AL MAXWELL AFB United States, 2015. Pan, Yunhe. "Heading toward artificial intelligence 2.0."Engineering2, no. 4 (2016): 409-413. Harknett, Richard J., and Joseph S. Nye Jr. "Is Deterrence Possible in Cyberspace?."International Security(2017) Schmidt, Charlie. "MD Anderson Breaks With IBM Watson, Raising Questions About Artificial Intelligence in Oncology."JNCI: Journal of the National Cancer Institute109, no. 5 (2017). Somashekhar, S. P., R. Kumarc, A. Rauthan, K. R. Arun, P. Patil, and Y. E. Ramya. "Abstract S6-07: Double blinded validation study to assess performance of IBM artificial intelligence platform, Watson for oncology in comparison with Manipal multidisciplinary tumour boardFirst study of 638 breast cancer cases." (2017): S6-07. Dilsizian, Steven E., and Eliot L. Siegel. "Artificial intelligence in medicine and cardiac imaging: harnessing big data and advanced computing to provide personalized medical diagnosis and treatment."Current cardiology reports16, no. 1 (2014): 441. Levine, Brian A. "AI has brains--but it's no MD: artificial intelligence has uses in medicine, but will never replace doctors' intuition."Contemporary OB/GYN62, no. 4 (2017): 30-32. Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell.Neoclassical realist theory of international politics. Oxford University Press, 2016. Merat, Soorena, and Wahab Almuhtadi. "Artificial intelligence application for improving cyber-security acquirement." InElectrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on, pp. 1445-1450. IEEE, 2015. Krittanawong, C. "The rise of artificial intelligence and the uncertain future for physicians." (2017).. Riley, S. (2017). [online] Available at: https://www.houseofbots.com/pulse/introducing-darklight-gaming-changing-artificial-cyber-shawn-riley/ [Accessed 13 Nov. 2017]. Betts, Richard K., ed.Conflict after the Cold War: arguments on causes of war and peace. Taylor Francis, 2017. Medvedev, Sergei A. "Offense-defense theory analysis of Russian cyber capability." PhD diss., Monterey, California: Naval Postgraduate School, 2015. Kishor, N. (2017).Artificial Intelligence in Cyber Security Market to Reach $18.2 Billion by 2023: PS Market Research. [online] Houseofbots.com. Available at: https://houseofbots.com/news-detail/1419-1-artificial-intelligence-in-cyber-security-market-to-reach-dollar18.2-billion-by-2023-ps-market-research [Accessed 13 Nov. 2017]. Abrahms, Max, and Stephen Biddle. "Free Access Why Terrorism Does Not Work (8800 times)."International Security21, no. 1 (1996): 186-191. Kitano, Hiroaki. "Biological Complexity and the Need for Computational Approaches." InPhilosophy of Systems Biology, pp. 169-180. Springer International Publishing, 2017.