본문 바로가기

전체 글376

Lecture 2: Network Security Physical Layer 목차 Network Security Network security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, users, and applications to wokr in a secure manner. A Network A network consists of two or more computers that are linked to share resources, exchange files, or allow electronic communications. The.. 2024. 3. 3.
Lecture 1: Introduction to Computer Security 목차 What is security? Computer security deals with protecting data, programs, and systems against intelligent adversaries. Safety vs Security: - Safety means being secure against unintended threats - Security is the protection against deliberate threats. Why is security hard? Security is hard to test for. Building secure applications requires deep understanding of all technologies involved in the.. 2024. 3. 3.
Lecture 2: Requirements & Elicitation & Analysis 목차 Requirements A requirement is something the product must do or a quality that the product must have. Functional Requirements: what the system must do Non-Functional Requirements: qualities that the system must have e.g. usability, performance, security Prioritizing requirements: MoSCoW method Query Techniques: Focus Groups Focus groups: group discussions chaired by moderator Widely used in ma.. 2024. 3. 3.
Lecture 6: Social Choice Part 2 목차 Voting rules A voting rule is a function f : R(U)ⁿ → F(U) Every voting rule is usually seen as a Social Choice Function (SCF), but not always the other way round. - A SCF, defined by f: R(U)ⁿ × F(U) → F(U), requires the definition of a feasible subset of the alternatives - Some of the SCFs cannot be considered voting rules because they are not discriminatory enough. Some properties of voting .. 2024. 3. 3.
Lecture 5: Computational Social Choice Part 1 To be continued 2024. 3. 3.
Lecture 4: Trust part 2 To be continued 2024. 3. 3.
Lecture 3: Trust part 1 수업 전 준 자료 (논문): Jacovi et al. Formalizing Trust in AI 요약본: Trust is a central component of the interaction between people and AI, in that ’incorrect’ levels of trust may cause misuse, abuse or disuse of the technology This model rests on two key properties of the vulnerability of the user and the ability to anticipate the impact of the AI model’s decisions. We incorporate a formalization of ‘con.. 2024. 3. 3.
Lecture 2: Coactive Design To be continued 2024. 3. 3.
반응형