Page 109 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 109
METODI HADJI-JANEV: HYPER THREATS TO CRITICAL INFRASTRUCTURES IN THE REGION OF SOUTH-EASTERN EUROPE:
A WAKE-UP CALL FOR SOUTH-EASTERN EUROPEAN LEADERSHIP
34. Koenig Nicole, (December 26, 2019), “The Pitfalls Of A ‘Geopolitical’ European Commission”,
BIRN, accessed at: https://balkaninsight.com/2019/12/26/the-pitfalls-of-a-geopolitical-european-
commission/
35. Lachert Jakub, (July 8, 2019), “Western Balkans and Geopolitics”, Warsaw Institute Review,
No11, Issue 4, accessed at: https://warsawinstitute.org/western-balkans-geopolitics/
36. Lauchlan Stuart (2019), “Armageddon by AI – declarations of Hyper War to scare Dr Strange-
love”, accessed at: https://diginomica.com/armageddon-ai-declarations-hyper-war-scare-dr-stran-
gelove
37. Marr Bernard, (September 28, 2018), “Artificial Intelligence: What Is Reinforcement Learning – A
Simple Explanation & Practical Examples”, Forbes, accessed: https://www.forbes.com/sites/ber-
nardmarr/2018/09/28/artificial-intelligence-what-is-reinforcement-learning-a-simple-explanation-
practical-examples/#f4f5fb4139ce.
38. Marisetty Suresh, (May 1, 2019), “Why You Should Care About Threat Modelling”, Security Blog,
accessed at: https://community.arm.com/developer/ip-products/security/b/security-ip-blog/posts/
why-you-should-care-about-threat-modelling?utm_source=google&utm_medium=cpc&utm_cam-
paign=2019_ebg-security_mk01-1_na_na_bol&utm_content=blog&utm_term=%2Biot%20%2Bv
ulnerabilities&gclid=Cj0KCQjw9ZzzBRCKARIsANwXaeKdcOd-W_XNAkboeaLWvb8twcN-
ebacriKmStJdfeX0VvE4STcV_a0aAl_yEALw_wcB
39. Mattis N. James, (January 19, 2018), “Remarks by Secretary Mattis on the National Defence Strat-
egy“, US Department of Defence, accessed at: https://www.defence.gov/Newsroom/Transcripts/
Transcript/Article/1420042/remarks-by-secretary-mattis-on-the-national-defence-strategy/
40. NATO ACT, (October 25, 2019), “Artificial Intelligence – A Game Changer for the Military”, ac-
cessed at: https://www.act.nato.int/articles/artificial-intelligence-game-changer-military)
41. Nye Joseph, (November 13, 2018), “Protecting Democracy in an Era of Cyber Information War”,
Hoover Institution, Fall Issue, 318, accessed at: https://www.hoover.org/research/protecting-de-
mocracy-era-cyber-information-war
42. O’Donnell Shea, (June 16, 2019), “A Short History of Unmanned Aerial Vehicles”, Consortiq, ac-
cessed at: https://consortiq.com/media-centre/blog/short-history-unmanned-aerial-vehicles-uavs.
43. Osborne Charlie, (January 27, 2020), “The US Army uses facial recognition to train AI. Now, it
needs to protect it”, ZDNet, accessed at: https://www.zdnet.com/article/the-us-army-uses-facial-
recognition-to-train-ai-now-it-needs-to-protect-it/
44. Patriot Act, (2001), the US Government Publishing office, accessed at: https://www.govinfo.gov/
content/pkg/PLAW-107publ56/html/PLAW-107publ56.htm
45. Pirovska Uranija, ed. (2018), “Annual report for 2018 – The rights of refugees, migrants and asy-
lum seekers in the Republic of Macedonia”, Helsinki Committee for Human Rights of the Repub-
lic of Macedonia, accessed at: https://mhc.org.mk/wp-content/uploads/2019/05/Help-On-Route-
ANG-2018-final.pdf
46. Rizzo Rachel, (February 01, 2020), “NATO: the challenge from within”, Observer Research Foun-
dation, accessed at: https://www.orfonline.org/expert-speak/nato-challenge-from-within-60977/
47. Rosenberg Marc, (April 13, 2013), “Knowledge Doubling Every 12 Months, Soon to be Every
12 Hours”, Industry Tap, accessed at: https://www.industrytap.com/knowledge-doubling-every-
12-months-soon-to-be-every-12-hours/3950
48. Siddiqui S., Kuly, (December, 2018), “Artificial intelligence and the risks of a ‘hyper-war’”, Asia
Times, accessed at: https://asiatimes.com/2018/07/artificial-intelligence-and-the-risks-of-a-hyper-war/
109