<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000200309</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-2-4684</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Benefits and Challenges of Military Artificial Intelligence in the Field of Defense]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Márquez-Díaz]]></surname>
<given-names><![CDATA[Jairo Eduardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Cundinamarca Facultad de Ingeniería ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>2</numero>
<fpage>309</fpage>
<lpage>323</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000200309&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000200309&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000200309&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The article explores the growing integration of AI in the military sphere. It highlights its potential to improve efficiency and accuracy in field operations, predictive analytics, and logistics due to its ability to process large volumes and learn autonomously. The study also emphasizes the role of AI in analyzing data from various sources such as satellite images, intelligence information and social media, which helps in target identification and operation of autonomous vehicles. It also addresses important ethical and legal challenges, including transparency in decision-making and liability for errors or collateral damage. It raises concerns about the vulnerability of military systems to attack, their tampering and the potential for accidental damage. The research employs a qualitative review of existing literature on types of AI and applications in the military context, focusing on benefits and risks. The study aims to synthesize key issues related to military AI capabilities, oversight, and governance, providing directions and precautions for responsible development of AI in defense.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Artificial intelligence]]></kwd>
<kwd lng="en"><![CDATA[algorithms]]></kwd>
<kwd lng="en"><![CDATA[military]]></kwd>
<kwd lng="en"><![CDATA[neural networks]]></kwd>
<kwd lng="en"><![CDATA[technology]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Machine learning: Así funciona la disciplina que les enseña a las computadoras a aprender por sí mismas]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balestriero]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sobal]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Morcos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shekhar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldstein]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldblum]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A cookbook of self-supervised learning]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blanchard]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Floridi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Taddeo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The doctrine of double effect &amp; lethal autonomous weapon systems]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Can]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Under the leadership of our president:&#8216;Potemkin AI&#8217;and the Turkish approach to artificial intelligence]]></article-title>
<source><![CDATA[Third World Quarterly]]></source>
<year>2023</year>
<volume>44</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>356-76</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Evron]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Bitzinger]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The fourth industrial revolution and military-civil fusion: A new paradigm for military innovation?]]></source>
<year>2023</year>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gaba]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Budhiraja]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Martha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Khurmi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Askar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Abouhawwash]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A systematic analysis of enhancing cyber security using deep learning for cyber physical systems]]></article-title>
<source><![CDATA[IEEE]]></source>
<year>2024</year>
<volume>12</volume>
<page-range>6017-35</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gandharv]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Best reliable deep-tech to track criminals]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gill]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence and international security: the long view]]></article-title>
<source><![CDATA[Ethics &amp; International Affairs]]></source>
<year>2019</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>169-79</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gregory]]></surname>
<given-names><![CDATA[T. H. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chuan]]></surname>
<given-names><![CDATA[N. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bingquan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Self-supervised learning with deep neural networks for computer vision]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Chekole]]></surname>
<given-names><![CDATA[E. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lakshmanan]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[IRC-SET 2021]]></source>
<year>2022</year>
<publisher-loc><![CDATA[Singapore ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grill]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sandvig]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Military AI&#8217;s next frontier: your work computer]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence &amp; future warfare: implications for international security]]></article-title>
<source><![CDATA[Defense &amp; Security Analysis]]></source>
<year>2019</year>
<volume>35</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>147-69</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence, drone swarming and escalation risks in future warfare]]></article-title>
<source><![CDATA[The RUSI Journal]]></source>
<year>2020</year>
<volume>165</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>26-36</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence: A threat to strategic stability]]></article-title>
<source><![CDATA[Strategic studies quarterly]]></source>
<year>2020</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>16-39</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koch]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[AI for aerospace and electronic systems: Technical dimensions of responsible design]]></article-title>
<source><![CDATA[IEEE Aerospace and Electronic Systems Magazine]]></source>
<year>2022</year>
<volume>38</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>106-11</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lamnabhi-Lagarrigue]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Samad]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social, organizational, and individual impacts of automation]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Nof]]></surname>
<given-names><![CDATA[S.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Springer Handbook of Automation]]></source>
<year>2023</year>
<page-range>61-75</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laudien]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ernst]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmerwitz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bringing a colored head-down display symbology heads up: display fidelity review of a low-cost see-through HMD]]></source>
<year>2023</year>
<volume>12538</volume>
<conf-name><![CDATA[ Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>191-7</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet de las cosas (IoT) y grandes datos frente ataques de denegación de servicio distribuido (DDoS)]]></source>
<year>2021</year>
<conf-name><![CDATA[ UMNG, VI Congreso Internacional de Administración de la Seguridad y Salud en el Trabajo. Gestión del riesgo: una visión global e integral]]></conf-name>
<conf-loc> </conf-loc>
<page-range>189-235</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Virtual world as a complement to hybrid and mobile Learning]]></article-title>
<source><![CDATA[International Journal of Emerging Technologies in Learning]]></source>
<year>2020</year>
<volume>15</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>267-74</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Large language models as optimizers]]></source>
<year>2023</year>
<page-range>1-42</page-range><publisher-name><![CDATA[Google DeepMind]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Dronica as an option for the security and defense of cities]]></source>
<year>2021</year>
<numero>861</numero>
<issue>861</issue>
<page-range>1-3</page-range><publisher-name><![CDATA[Academia Letters]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Desarrollos tecnológicos e implicaciones de los drones autónomos militares: perspectivas en la geopolítica mundial]]></article-title>
<source><![CDATA[Revista Tecnológica]]></source>
<year>2023</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>137-51</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maschmeyer]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Subverting skynet: the strategic promise of lethal autonomous weapons and the perils of exploitation]]></source>
<year>2022</year>
<volume>700</volume>
<conf-name><![CDATA[ 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>155-71</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montasari]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[National artificial intelligence strategies: A Comparison of the UK, EU and US approaches with those adopted by state adversaries]]></article-title>
<source><![CDATA[Countering Cyberterrorism: The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity]]></source>
<year>2023</year>
<volume>101</volume>
<page-range>139-64</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Müller]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Rotter]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neurotechnology: Current developments and ethical issues]]></article-title>
<source><![CDATA[Frontiers in Systems Neuroscience]]></source>
<year>2017</year>
<volume>11</volume>
<numero>93</numero>
<issue>93</issue>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nadibaidze]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Great power identity in Russia&#8217;s position on autonomous weapons systems]]></article-title>
<source><![CDATA[Contemporary security policy]]></source>
<year>2022</year>
<volume>43</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>407-35</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pekarev]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attitudes of military personnel towards unmanned ground vehicles (UGV): a study of in-depth interview]]></article-title>
<source><![CDATA[Discover Artificial Intelligence]]></source>
<year>2023</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>24</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Qian]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Fink]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Una ley de Moore para fibras permite tejidos inteligentes]]></article-title>
<source><![CDATA[Revista Nacional de Ciencias]]></source>
<year>2023</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quirión]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brain organoids: are they for real?]]></article-title>
<source><![CDATA[Frontiers in Science]]></source>
<year>2023</year>
<volume>1</volume>
<page-range>1148127</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raaijmakers]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Artificial intelligence for law enforcement: Challenges and Opportunities]]></article-title>
<source><![CDATA[IEEE Security &amp; Privacy]]></source>
<year>2019</year>
<volume>17</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>74-7</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rani]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Nabi]]></surname>
<given-names><![CDATA[S. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mittal]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Self-supervised learning: A succinct review]]></article-title>
<source><![CDATA[Archives of Computational Methods in Engineering]]></source>
<year>2023</year>
<volume>30</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>2761-75</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sattler]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pietralla]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Public attitudes towards neurotechnology: Findings from two experiments concerning brain stimulation devices (BSDs) and brain-computer interfaces (BCIs)]]></article-title>
<source><![CDATA[PloS One]]></source>
<year>2022</year>
<volume>17</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>e0275454</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scollick]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Irish defence forces in the drone age. The EU, Irish Defence Forces and Contemporary Security]]></source>
<year>2023</year>
<page-range>295-314</page-range><publisher-loc><![CDATA[Cham ]]></publisher-loc>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smirnova]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[P. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Hartung]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Organoid intelligence (OI) the ultimate functionality of a brain microphysiological system]]></article-title>
<source><![CDATA[ALTEX Alternatives to animal experimentation]]></source>
<year>2023</year>
<volume>40</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>191-203</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Speith]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Speith]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Becker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Biega]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Expanding explainability: From explainable artificial intelligence to explainable hardware]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taddeo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Blanchard]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accepting moral responsibility for the actions of autonomous weapons systems: A moral gambit]]></article-title>
<source><![CDATA[Philosophy &amp; Technology]]></source>
<year>2022</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>78</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yamin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Katt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Weaponized AI for cyberattacks]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2021</year>
<volume>57</volume>
<page-range>102722</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
