AI & Cybersecurity Glossary
Comprehensive terminology reference for artificial intelligence, machine learning, and cybersecurity. Supporting N.Tellgencya training programs for Northern Territory professionals.
Search Results
0 matchesA
- A* Search Pronounced 'A-star'. A graph traversal and pathfinding algorithm used in many fields of computer science due to its completeness, optimality, and optimal efficiency.
- Abductive Logic Programming (ALP) A high-level knowledge-representation framework for solving problems declaratively based on abductive reasoning. Extends normal logic programming by allowing some predicates to be incompletely defined.
- Abductive Reasoning (Abduction) A form of logical inference which starts with an observation or set of observations then seeks to find the simplest and most likely explanation. Unlike deductive reasoning, it yields a plausible conclusion but does not positively verify it.
- Ablation The removal of a component of an AI system. An ablation study aims to determine the contribution of a component by removing it and analysing the resultant performance.
- Abstraction The process of removing physical, spatial, or temporal details in the study of objects or systems to more closely attend to other details of interest.
- Access Control The process of granting or denying requests for access to systems, applications and data. Can also refer to access control for facilities.
- Access Cross Domain Solution A system permitting access to multiple security domains from a single client device.
- Accountable Material Material requiring the strictest control over its access and movement, including TOP SECRET data, some caveated data, and any data designated as accountable by its originator.
- Action Selection A way of characterising the most basic problem of intelligent systems: what to do next. Associated with intelligent agents and animats—artificial systems exhibiting complex behaviour in an agent environment.
- Activation Function In artificial neural networks, the function of a node that defines the output of that node given an input or set of inputs.
- Actuators Mechanical or electromechanical devices that convert energy into motion or physical action, essential components in robotics and automated systems.
- Admissible Heuristic In pathfinding algorithms, a heuristic function that never overestimates the cost of reaching the goal. The cost it estimates is not higher than the lowest possible cost from the current point.
- Adversarial Attack Techniques that attempt to deceive machine learning models through malicious input, exploiting vulnerabilities in how models process data.
- Affective Computing The study and development of systems and devices that can recognise, interpret, process, and simulate human affects. An interdisciplinary field spanning computer science, psychology, and cognitive science.
- Agent Architecture A blueprint for software agents and intelligent control systems, depicting the arrangement of components. Architectures implemented by intelligent agents are referred to as cognitive architectures.
- Agentic AI AI systems capable of autonomous action, decision-making, and interaction with external systems without constant human oversight. While offering productivity benefits, agentic AI significantly expands the attack surface.
- Aggregation (of data) A term used to describe compilations of data that may require a higher level of protection than their component parts.
- AI Accelerator A class of microprocessor or computer system designed as hardware acceleration for artificial intelligence applications, especially neural networks, machine vision, and machine learning.
- AI-Complete (AI-Hard) Problems whose difficulty is equivalent to solving the central artificial intelligence problem—making computers as intelligent as people.
- AI Hallucination When an AI model generates false information presented as fact, including fabricated statistics, non-existent events, or plausible-sounding but incorrect technical details.
- AI/ML Bill of Materials (BOM) A comprehensive inventory of all components, dependencies, and data sources used in an AI/ML system, similar to a software BOM but specific to machine learning assets.
- AI Use Statement A transparent disclosure of how AI tools were used in creating academic or professional work, including which tools, for what purposes, and what human oversight was applied.
- Algorithm An unambiguous specification of how to solve a class of problems. Algorithms can perform calculation, data processing, and automated reasoning tasks.
- AlphaGo A computer program developed by Google DeepMind that plays the board game Go. In 2015, it became the first program to beat a human professional Go player without handicaps on a full-sized board.
- Anomalous Patterns Unusual or irregular patterns in data that deviate from expected behaviour, often indicating potential security threats, system failures, or areas requiring investigation.
- Application Control An approach in which only an explicitly defined set of trusted applications are allowed to execute on systems.
- Application Programming Interface (API) A set of subroutine definitions, communication protocols, and tools for building software. Provides clearly defined methods of communication among various components.
- Artificial General Intelligence (AGI) A type of AI that matches or surpasses human cognitive capabilities across a wide range of cognitive tasks.
- Artificial Intelligence (AI) Intelligence demonstrated by machines, in contrast to natural intelligence displayed by humans and animals. The study of 'intelligent agents': devices that perceive their environment and take actions to achieve goals.
- Artificial Neural Network (ANN) A computing system inspired by biological neural networks. It consists of interconnected nodes (artificial neurons) organised in layers that process and transmit information.
- ASCII Smuggling A prompt injection technique using special Unicode characters that appear invisible or render as whitespace to embed malicious instructions, bypassing content filtering.
- Asset Anything of value, such as ICT equipment, software or data.
- Astroturfing The practice of creating a deceptive impression of grassroots support for a policy, product, or opinion, when such support is artificially generated through coordinated campaigns.
- ATSILIRN Protocols Guidelines developed by Aboriginal and Torres Strait Islander Library, Information and Resource Network for libraries and archives managing culturally restricted materials and sacred knowledge.
- Attack Surface The amount of ICT equipment and software used in a system. The greater the attack surface the greater the chances of malicious actors finding an exploitable vulnerability.
- Attention Mechanism A machine learning technique that calculates 'soft' weights for each word (or its embedding) in the context window. It can operate in parallel (transformers) or sequentially (recursive neural networks).
- Authentication Verifying the identity of a user, process or device as a prerequisite to allowing access to resources in a system.
- Authentication Header A protocol used in Internet Protocol Security (IPsec) that provides data integrity and data origin authenticity but not confidentiality.
- Australian Government AI Technical Standard Mandatory requirements for federal agencies deploying AI systems, covering adversarial testing, security monitoring, bias testing, incident handling, and output controls.
- Australian Privacy Principles (APPs) Thirteen principles under the Privacy Act 1988 governing how organisations collect, use, disclose, and secure personal information.
- Automated Machine Learning (AutoML) A field of machine learning that aims to automatically configure an ML system to maximise its performance without requiring extensive manual tuning.
- Automata Theory The study of abstract machines and automata, as well as the computational problems that can be solved using them. A theory in theoretical computer science and discrete mathematics.
- Autonomous Robot A robot that performs behaviours or tasks with a high degree of autonomy, capable of sensing its environment and making decisions without continuous human guidance.
Z
- Zero-Click Attack A cyberattack that requires no user interaction to execute. In AI systems, attacks where simply processing malicious content triggers exploitation.
- Zero-shot Learning (ZSL) A problem setup where, at test time, a learner observes samples from classes not seen during training and must predict the correct class.