User Options
Toggle navigation
Fabric
Login
Register
Login
Register
5015 Objects
About
Browse
Objects
Analytics
Analytics
Research
Contact
Decimal
5 Object Results
Filter results
Add all results to lightbox
Select results to add to lightbox
Sort by:
Date
Title
Sort order:
Ascending
Descending
Start Over
Download results as:
Checklist
PDF (thumbnails)
Excel (basic information)
PowerPoint (basic information)
Add selected results to lightbox
Technology:
Cyberattacks
AI can now defend itself against malicious messages hidden in speech
Hackers Have Already Started to Weaponize Artificial Intelligence
Johns Hopkins scientists show how easy it is to hack a drone and crash it
Biological Warfare: Tampering With Implantable Medical Devices
Body Hacking: Do Implantable Medical Devices Make Humans Susceptible To Cyber-Attacks?
Next 36
Filter by
HCI Platform
Implantable
Other
Relation to body
In
Discursive Type
A Response to an Invention
Persuasive Type
Academic
Information
Media Type
Loading...
collection
Surveillance Issues and Technologies
Surveillance, Sousveillance, and Security Technologies: A variety of wearable computing devices (2019)
Writing Futures: Collaborative, Algorithmic, Autonomous (2022-2023)
Augments
Attacking
Communicating
Defending
Healing
Informing
Living
Predicting
Preventing
Protecting
Securing
Treating
Working
and 5 more
People/Companies/Related Entities
Alexandros Dimakis
Billy Rios
Bo Li
Brian Wallace
Deepak Dutt
Food and Drug Administration (FDA)
G/O Media Inc.
George Dvorsky
Harrisburg University of Science and Technology
Harvard Medical School
Jay Liebowitz
Johns Hopkins University
Johns Hopkins Whiting School of Engineering
Lanier A. Watkins
Marc Goodman
Matthew Hutson
Matthew Mientka
Medtronic
Michael Hooper
Nicholas Carlini
OpenAI
Robert Schaller
Shanghai Jiao Tong University
Springer Nature Publishing
Staffan Truvé
Terry McCorkle
US Department of Homeland Security
University Of Pennsylvania
University of Illinois at Urbana–Champaign
University of Texas at Austin
William Maisel
Zhoulin Yang
and 25 more
Technology
Algorithms
Artificial Intelligence (AI)
Audio
Big Data
Biohacking
Bionic limbs
Biotechnology
Body Hacking
Cyber-conflict
Cyberattacks
Cybercriminals
Cybersecurity
Cyborgs
Data Mining
Deep Learning
Drones
Facial Recognition
Hackers
Implantable Medical Devices
Information Security (Infosec)
Machine Learning
Malware
Medical Device
Medical implants
Neural Networks
Phishing
Smartphone Applications
Social Networks
Virtual Assistants
Wireless Connectivity
and 23 more
Marketing
60 Minutes
Amazon
Amazon Alexa
Apple
Apple Siri
Black Hat USA 2017
Bluetooth
Cylance
Fortune Magazine
Google
Google Assistant
Google Brain
IBM Deep Blue
IBM Watson
James Bond
Medtronic
OpenAI
OpenAI GPT-2
Recorded Future
SNAP_R
Terminator
The Conversation
Twitter
U.S. Food and Drug Administration
University of Oxford
ZeroFOX
Zighra
and 20 more
Keyword
Agriculture
Composition
Crime
Ethics
Futurism
Medical
Military
Postal Service
Privacy
Research
Security
Speech
Surveillance
and 6 more
title
AI can now defend itself against malicious messages hidden in speech
Biological Warfare: Tampering With Implantable Medical Devices
Body Hacking: Do Implantable Medical Devices Make Humans Susceptible To Cyber-Attacks?
Hackers Have Already Started to Weaponize Artificial Intelligence
Johns Hopkins scientists show how easy it is to hack a drone and crash it
Publication Title
Gizmodo
HUB
Nature: International Journal of Science
Science/Tech
Securing IT