{"id":56158,"date":"2025-06-19T11:59:33","date_gmt":"2025-06-19T10:59:33","guid":{"rendered":"https:\/\/virtual-routes.org\/?post_type=event&#038;p=56158"},"modified":"2025-11-06T10:31:24","modified_gmt":"2025-11-06T09:31:24","slug":"ai-in-snipinejimo-programine-iranga","status":"publish","type":"event","link":"https:\/\/virtual-routes.org\/lt\/ivykis\/ai-in-snipinejimo-programine-iranga\/","title":{"rendered":"AI pa\u017eadai ir pavojai, susij\u0119 su mobili\u0173j\u0173 gr\u0117smi\u0173 aptikimu"},"content":{"rendered":"<p>Mobili\u0173j\u0173 \u012frengini\u0173 pa\u017eeidimo ir gynybos pusiausvyra spar\u010diai kei\u010diasi. Viena vertus, daug\u0117ja dideli\u0173 gr\u0117smi\u0173, pavyzd\u017eiui, komercini\u0173 \u0161nipin\u0117jimo program\u0173, pradedant labai sud\u0117tingomis, sunkiai aptinkamomis galimyb\u0117mis, kurias naudoja vyriausyb\u0117s, ir baigiant paprastesn\u0117mis schemomis ir programomis, kurias naudoja kibernetiniai nusikalt\u0117liai ir piktnaud\u017eiautojai. Kita vertus, tiek \"Apple iOS\", tiek \"Google Android\" atlieka svarbius pakeitimus, kurie \u017eada geresn\u0119 apsaug\u0105 nuo \u0161i\u0173 gr\u0117smi\u0173 - vieni savo iniciatyva, kiti priversti reguliavimo. \u0160ioje sesijoje pristatomi original\u016bs tyrimai ir naujos mobili\u0173j\u0173 gr\u0117smi\u0173 aptikimo priemon\u0117s, sprend\u017eiant pagrindin\u012f klausim\u0105, kiek AI daro \u012ftak\u0105 \u0161iai kat\u0117s ir pel\u0117s dinamikai.<\/p>\n<p>\u0160is renginys skirtas tik AI-Kibernetinio saugumo tyrim\u0173 ir politikos centro nariams. Nor\u0117dami prisijungti, u\u017esiregistruokite kaip narys <a href=\"https:\/\/forms.gle\/JkfPXKrx3ZqSmrxJ9\">\u010dia<\/a>.<\/p><\/p>","protected":false},"excerpt":{"rendered":"<p>\u0160ioje sesijoje pristatomi original\u016bs tyrimai ir naujos mobili\u0173j\u0173 gr\u0117smi\u0173 aptikimo priemon\u0117s, sprend\u017eiant pagrindin\u012f klausim\u0105, kiek AI turi \u012ftakos \u0161iai kat\u0117s ir pel\u0117s dinamikai.<\/p>","protected":false},"featured_media":55703,"template":"","meta":{"_acf_changed":true,"_seopress_robots_primary_cat":"","_seopress_titles_title":"The Promise and Perils of AI for Mobile Threat Detection","_seopress_titles_desc":"This session presents original research and new tools for mobile threat detection, addressing the key question of how far AI affects this cat and mouse dynamic.","_seopress_robots_index":"","inline_featured_image":false},"event-category":[2151],"event-type":[2154],"special-filter":[],"class_list":["post-56158","event","type-event","status-publish","has-post-thumbnail","hentry","event-category-ai-cybersecurity-research-and-policy-hub","event-type-online-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/event\/56158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/media\/55703"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/media?parent=56158"}],"wp:term":[{"taxonomy":"event-category","embeddable":true,"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/event-category?post=56158"},{"taxonomy":"event-type","embeddable":true,"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/event-type?post=56158"},{"taxonomy":"special-filter","embeddable":true,"href":"https:\/\/virtual-routes.org\/lt\/wp-json\/wp\/v2\/special-filter?post=56158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}