364

Graph of Effort: Quantifying Risk of AI Usage for Vulnerability Assessment

Main:6 Pages
4 Figures
Bibliography:2 Pages
Abstract

With AI-based software becoming widely available, the risk of exploiting its capabilities, such as high automation and complex pattern recognition, could significantly increase. An AI used offensively to attack non-AI assets is referred to as offensive AI.

View on arXiv
Comments on this paper