A

  • A* Search Pronounced 'A-star'. A graph traversal and pathfinding algorithm used in many fields of computer science due to its completeness, optimality, and optimal efficiency.
  • Abductive Logic Programming (ALP) A high-level knowledge-representation framework for solving problems declaratively based on abductive reasoning. Extends normal logic programming by allowing some predicates to be incompletely defined.
  • Abductive Reasoning (Abduction) A form of logical inference which starts with an observation or set of observations then seeks to find the simplest and most likely explanation. Unlike deductive reasoning, it yields a plausible conclusion but does not positively verify it.
  • Ablation The removal of a component of an AI system. An ablation study aims to determine the contribution of a component by removing it and analysing the resultant performance.
  • Abstraction The process of removing physical, spatial, or temporal details in the study of objects or systems to more closely attend to other details of interest.
  • Access Control The process of granting or denying requests for access to systems, applications and data. Can also refer to access control for facilities.
  • Access Cross Domain Solution A system permitting access to multiple security domains from a single client device.
  • Accountable Material Material requiring the strictest control over its access and movement, including TOP SECRET data, some caveated data, and any data designated as accountable by its originator.
  • Action Selection A way of characterising the most basic problem of intelligent systems: what to do next. Associated with intelligent agents and animats—artificial systems exhibiting complex behaviour in an agent environment.
  • Activation Function In artificial neural networks, the function of a node that defines the output of that node given an input or set of inputs.
  • Actuators Mechanical or electromechanical devices that convert energy into motion or physical action, essential components in robotics and automated systems.
  • Admissible Heuristic In pathfinding algorithms, a heuristic function that never overestimates the cost of reaching the goal. The cost it estimates is not higher than the lowest possible cost from the current point.
  • Adversarial Attack Techniques that attempt to deceive machine learning models through malicious input, exploiting vulnerabilities in how models process data.
  • Affective Computing The study and development of systems and devices that can recognise, interpret, process, and simulate human affects. An interdisciplinary field spanning computer science, psychology, and cognitive science.
  • Agent Architecture A blueprint for software agents and intelligent control systems, depicting the arrangement of components. Architectures implemented by intelligent agents are referred to as cognitive architectures.
  • Agentic AI AI systems capable of autonomous action, decision-making, and interaction with external systems without constant human oversight. While offering productivity benefits, agentic AI significantly expands the attack surface.
  • Aggregation (of data) A term used to describe compilations of data that may require a higher level of protection than their component parts.
  • AI Accelerator A class of microprocessor or computer system designed as hardware acceleration for artificial intelligence applications, especially neural networks, machine vision, and machine learning.
  • AI-Complete (AI-Hard) Problems whose difficulty is equivalent to solving the central artificial intelligence problem—making computers as intelligent as people.
  • AI Hallucination When an AI model generates false information presented as fact, including fabricated statistics, non-existent events, or plausible-sounding but incorrect technical details.
  • AI/ML Bill of Materials (BOM) A comprehensive inventory of all components, dependencies, and data sources used in an AI/ML system, similar to a software BOM but specific to machine learning assets.
  • AI Use Statement A transparent disclosure of how AI tools were used in creating academic or professional work, including which tools, for what purposes, and what human oversight was applied.
  • Algorithm An unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, data processing, and automated reasoning tasks.
  • AlphaGo A computer program developed by Google DeepMind that plays the board game Go. In 2015, it became the first program to beat a human professional Go player without handicaps on a full-sized board.
  • Anomalous Patterns Unusual or irregular patterns in data that deviate from expected behaviour, often indicating potential security threats, system failures, or areas requiring investigation.
  • Application Control An approach in which only an explicitly defined set of trusted applications are allowed to execute on systems.
  • Application Programming Interface (API) A set of subroutine definitions, communication protocols, and tools for building software. Provides clearly defined methods of communication among various components.
  • Artificial General Intelligence (AGI) A type of AI that matches or surpasses human cognitive capabilities across a wide range of cognitive tasks.
  • Artificial Intelligence (AI) Intelligence demonstrated by machines, in contrast to natural intelligence displayed by humans and animals. The study of 'intelligent agents': devices that perceive their environment and take actions to achieve goals.
  • Artificial Neural Network (ANN) A computing system inspired by biological neural networks. It consists of interconnected nodes (artificial neurons) organised in layers that process and transmit information.
  • ASCII Smuggling A prompt injection technique using special Unicode characters that appear invisible or render as whitespace to embed malicious instructions, bypassing content filtering.
  • Asset Anything of value, such as ICT equipment, software or data.
  • Astroturfing The practice of creating a deceptive impression of grassroots support for a policy, product, or opinion, when such support is artificially generated through coordinated campaigns.
  • ATSILIRN Protocols Guidelines developed by Aboriginal and Torres Strait Islander Library, Information and Resource Network for libraries and archives managing culturally restricted materials and sacred knowledge.
  • Attack Surface The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of malicious actors finding an exploitable vulnerability.
  • Attention Mechanism A machine learning technique that calculates 'soft' weights for each word (or its embedding) in the context window. It can operate in parallel (transformers) or sequentially (recursive neural networks).
  • Authentication Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system.
  • Authentication Header A protocol used in Internet Protocol Security (IPsec) that provides data integrity and data origin authenticity but not confidentiality.
  • Australian Government AI Technical Standard Mandatory requirements for federal agencies deploying AI systems, covering adversarial testing, security monitoring, bias testing, incident handling, and output controls.
  • Australian Privacy Principles (APPs) Thirteen principles under the Privacy Act 1988 governing how organisations collect, use, disclose, and secure personal information.
  • Automated Machine Learning (AutoML) A field of machine learning that aims to automatically configure an ML system to maximise its performance without requiring extensive manual tuning.
  • Automata Theory The study of abstract machines and automata, as well as the computational problems that can be solved using them. A theory in theoretical computer science and discrete mathematics.
  • Autonomous Robot A robot that performs behaviours or tasks with a high degree of autonomy, capable of sensing its environment and making decisions without continuous human guidance.

Z

  • Zero-Click Attack A cyberattack that requires no user interaction to execute. In AI systems, attacks where simply processing malicious content triggers exploitation.
  • Zero-shot Learning (ZSL) A problem setup where, at test time, a learner observes samples from classes not seen during training and must predict the correct class.