These are the sources and citations used to research week 7 CSIA 459. This bibliography was generated on Cite This For Me on

  • Website

    Ak, I.

    7 Sneaky Ways Hackers Are Using Machine Learning to Steal Your Data | Hacker Noon

    2020

    In-text: (Ak, 2020)

    Your Bibliography: Ak, I., 2020. 7 Sneaky Ways Hackers Are Using Machine Learning to Steal Your Data | Hacker Noon. [online] Hackernoon.com. Available at: <https://hackernoon.com/7-sneaky-ways-hackers-are-using-machine-learning-to-steal-your-data-d0933w6a> [Accessed 1 October 2021].

  • Website

    CISO MAG

    How Hackers are using AI Technologies to develop intelligent malware

    2019

    In-text: (CISO MAG, 2019)

    Your Bibliography: CISO MAG, 2019. How Hackers are using AI Technologies to develop intelligent malware. [online] CISO MAG | Cyber Security Magazine. Available at: <https://cisomag.eccouncil.org/hackers-using-ai/> [Accessed 3 October 2021].

  • Website

    Gabel, F.

    Some studies in machine learning using the game of checkers

    2019 - University of Heidelberg

    In-text: (Gabel, 2019)

    Your Bibliography: Gabel, F., 2019. Some studies in machine learning using the game of checkers. [online] Hci.iwr.uni-heidelberg.de. Available at: <https://hci.iwr.uni-heidelberg.de/system/files/private/downloads/636026949/report_frank_gabel.pdf> [Accessed 29 September 2021].

  • Website

    IBM

    What is Artificial Intelligence (AI)?

    2020

    In-text: (IBM, 2020)

    Your Bibliography: IBM, 2020. What is Artificial Intelligence (AI)?. [online] Ibm.com. Available at: <https://www.ibm.com/cloud/learn/what-is-artificial-intelligence#toc-artificial-ouSSEEmA> [Accessed 29 September 2021].

  • Website

    IBM

    What is Machine Learning?

    2020

    In-text: (IBM, 2020)

    Your Bibliography: IBM, 2020. What is Machine Learning?. [online] Ibm.com. Available at: <https://www.ibm.com/cloud/learn/machine-learning> [Accessed 29 September 2021].

  • Dissertation

    McCarthy, J.

    WHAT IS ARTIFICIAL INTELLIGENCE?

    2004

    In-text: (McCarthy, 2004)

    Your Bibliography: McCarthy, J., 2004. WHAT IS ARTIFICIAL INTELLIGENCE?. Stanford University.

  • Journal

    NEC

    The Potential of AI to Propose Security Countermeasures

    2017 - NEC Technical Journal

    In-text: (NEC, 2017)

    Your Bibliography: NEC, 2017. The Potential of AI to Propose Security Countermeasures. NEC Technical Journal, [online] 12(2). Available at: <https://www.nec.com/en/global/techrep/journal/g17/n02/170216.html> [Accessed 3 October 2021].

  • Website

    Segal, E.

    The Impact of AI on Cybersecurity

    2021 - IEEE Computer Society

    In-text: (Segal, 2021)

    Your Bibliography: Segal, E., 2021. The Impact of AI on Cybersecurity. [online] Computer.org. Available at: <https://www.computer.org/publications/tech-news/trends/the-impact-of-ai-on-cybersecurity> [Accessed 1 October 2021].

  • Website

    Vincent, J.

    Google uses DeepMind AI to cut data center energy bills

    2016

    In-text: (Vincent, 2016)

    Your Bibliography: Vincent, J., 2016. Google uses DeepMind AI to cut data center energy bills. [online] The Verge. Available at: <https://www.theverge.com/2016/7/21/12246258/google-deepmind-ai-data-center-cooling> [Accessed 1 October 2021].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join