RAND_RRA877-1.pdf
861.9 KB
RAND Corp (Part 2): How we built a friendly AI, that isn't trying to kill you, honest!! (Drop 2 of 5)
1) Digital Infrastructure and Digital Presence A Framework for Assessing the Impact on Future Military Competition and Conflict
2) Support to the DOD Cyber Workforce Zero-Based Review Developing a Repeatable Process for Conducting ZBRs within DoD
3) Characterizing the Risks of North Korean Chemical and Biological Weapons, Electromagnetic Pulse, and Cyber Threats
4) Emerging Technology Beyond 2035
5) Preparing for Post-Quantum Critical Infrastructure Assessments of Quantum Computing Vulnerabilities of National Critical Functions
6) Prioritizing Investments in Game-Changing Technologies The Evaluation and Comparison Process Framework
7) French Army Approaches to Networked Warfare
8) Planning for Significant Cyber Incidents An Introduction for Decisionmakers
9) RAND Arroyo Centre Annual Report
10) Virtual roundtable labelling initiatives, codes of conduct, voluntary mechanisms to build trustworthy (AI)
1) Digital Infrastructure and Digital Presence A Framework for Assessing the Impact on Future Military Competition and Conflict
2) Support to the DOD Cyber Workforce Zero-Based Review Developing a Repeatable Process for Conducting ZBRs within DoD
3) Characterizing the Risks of North Korean Chemical and Biological Weapons, Electromagnetic Pulse, and Cyber Threats
4) Emerging Technology Beyond 2035
5) Preparing for Post-Quantum Critical Infrastructure Assessments of Quantum Computing Vulnerabilities of National Critical Functions
6) Prioritizing Investments in Game-Changing Technologies The Evaluation and Comparison Process Framework
7) French Army Approaches to Networked Warfare
8) Planning for Significant Cyber Incidents An Introduction for Decisionmakers
9) RAND Arroyo Centre Annual Report
10) Virtual roundtable labelling initiatives, codes of conduct, voluntary mechanisms to build trustworthy (AI)
RAND_RRA595-1.pdf
1.1 MB
RAND Corp (Part 2): How we built a friendly AI, that isn't trying to kill you, honest!! (Drop 3 of 5)
1) Disrupting Deterrence Examining the Effects of Technologies on Strategic Deterrence in the 21st Century
2) How Extremism Operates Online
3) Competition in the Gray Zone Countering China’s Coercion Against U.S. Allies
4) Using Social Media to Extract Information About Chemical Weapons Incidents A Methodology and Demonstration of Concept from the Civil War in Syria
5) To Disclose, or Not to Disclose, That Is the Question Approach for Examining & Improving the US Govs Vulnerabilities Equities Process
6) RAND Review (Inhouse Periodical Magazine)
7) Cyber Mission Thread Analysis An Implementation Guide for Process Planning and Execution
8) Competition and Restraint in Cyberspace The Role of International Norms in Promoting U.S. Cybersecurity
9) Evaluation of the COVID-19 Genomics UK (COG-UK) Consortium
10) An Exploratory Analysis of Trends in Text Data from Congressional Oversight Hearings
1) Disrupting Deterrence Examining the Effects of Technologies on Strategic Deterrence in the 21st Century
2) How Extremism Operates Online
3) Competition in the Gray Zone Countering China’s Coercion Against U.S. Allies
4) Using Social Media to Extract Information About Chemical Weapons Incidents A Methodology and Demonstration of Concept from the Civil War in Syria
5) To Disclose, or Not to Disclose, That Is the Question Approach for Examining & Improving the US Govs Vulnerabilities Equities Process
6) RAND Review (Inhouse Periodical Magazine)
7) Cyber Mission Thread Analysis An Implementation Guide for Process Planning and Execution
8) Competition and Restraint in Cyberspace The Role of International Norms in Promoting U.S. Cybersecurity
9) Evaluation of the COVID-19 Genomics UK (COG-UK) Consortium
10) An Exploratory Analysis of Trends in Text Data from Congressional Oversight Hearings
RAND_RRA1498-2.pdf
3.7 MB
RAND Corp (Part 2): How we built a friendly AI, that isn't trying to kill you, honest!! (Drop 4 of 5)
1) Comparing the Organizational Cultures of the Department of Defense and Silicon Valley
2) Russian Disinformation Efforts On Social Media
3) America’s 5G Era Balancing Big Data and Privacy
4) Use of Predictive Analytic Tools to Assess Technological Emergences and Acquisition Targets
5) Disclosure of Software Supply Chain Risks
6) Managing Response to Significant Cyber Incidents Comparing Event Life Cycles and Incident Response Across Cyber and Non-Cyber Events
7) Exploring the CivilMilitary Divide over Artificial Intelligence
8) Leveraging Machine Learning for Operation Assessment
9) Securing 5G A Way Forward in the U.S. and China Security Competition
10) Many Hands in the Cookie Jar Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response
1) Comparing the Organizational Cultures of the Department of Defense and Silicon Valley
2) Russian Disinformation Efforts On Social Media
3) America’s 5G Era Balancing Big Data and Privacy
4) Use of Predictive Analytic Tools to Assess Technological Emergences and Acquisition Targets
5) Disclosure of Software Supply Chain Risks
6) Managing Response to Significant Cyber Incidents Comparing Event Life Cycles and Incident Response Across Cyber and Non-Cyber Events
7) Exploring the CivilMilitary Divide over Artificial Intelligence
8) Leveraging Machine Learning for Operation Assessment
9) Securing 5G A Way Forward in the U.S. and China Security Competition
10) Many Hands in the Cookie Jar Case Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response
👍1