The use of Verification and Validation (V&V) in the development of AI/ML softwareIn light of the recent discovery of a major bug in Intel’s Neural Compressor software that was identified (Ramesh & Ross, 2024) this month…May 22May 22
PassGPT and AI/ML: Cracking PasswordsWith all the recent buzz about ChatGPT, it isn’t surprising that a password-guessing model, PassGPT, has surfaced based on OpenAI’s GPT-2…Jun 13, 2023Jun 13, 2023
Chapter 1: Programming for Artificial Intelligence and Machine Learning: Introduction to SWI-PrologA note about this series on SWI-Prolog programmingJun 12, 20231Jun 12, 20231
Methods to Enhance Cybersecurity for Remote Access Software (RAS)IntroductionJun 12, 2023Jun 12, 2023
Cloud Computing Forensics: Summary of a NIST UpdateThe NIST Cloud Computing Forensic Science Working Group recently released changes embodied in the NIST IR 8006, NIST Cloud Computing…Feb 8, 2023Feb 8, 2023
What happened to CarMax?In 2022, CarMax experienced a decline in auto sales due to the increase in inflation and ramping interest rates (Ballard, 2022). As a…Jan 24, 20232Jan 24, 20232
Manufacturing is at risk in the U.S.: Manufacturing, Operational Technology, and CybersecurityManufacturing is a broad term and can include anything from manufacturing wires and cables, developing custom parts for the Department of…Jan 5, 2023Jan 5, 2023
Discrete Math: Propositional LogicAs my promise to all Computer Science and Information Technology students who have contacted me, I am writing a small series of…Jan 4, 2023Jan 4, 2023