{"id":56158,"date":"2025-06-19T11:59:33","date_gmt":"2025-06-19T10:59:33","guid":{"rendered":"https:\/\/virtual-routes.org\/?post_type=event&#038;p=56158"},"modified":"2025-11-06T10:31:24","modified_gmt":"2025-11-06T09:31:24","slug":"ai-in-spyware","status":"publish","type":"event","link":"https:\/\/virtual-routes.org\/ro\/eveniment\/ai-in-spyware\/","title":{"rendered":"Promisiunea \u0219i pericolele AI pentru detectarea amenin\u021b\u0103rilor mobile"},"content":{"rendered":"<p>Echilibrul infrac\u021biune-ap\u0103rare pentru dispozitivele mobile se schimb\u0103 rapid. Pe de o parte, amenin\u021b\u0103rile importante, cum ar fi programele spion comerciale, sunt \u00een cre\u0219tere, variind de la capacit\u0103\u021bi extrem de sofisticate, greu de detectat, utilizate de guverne, la scheme \u0219i aplica\u021bii mai simple utilizate de infractorii cibernetici \u0219i de cei care comit abuzuri. Pe de alt\u0103 parte, at\u00e2t iOS de la Apple, c\u00e2t \u0219i Android de la Google fac schimb\u0103ri majore care promit o mai bun\u0103 protec\u021bie \u00eempotriva acestor amenin\u021b\u0103ri - unele din proprie ini\u021biativ\u0103, iar altele for\u021bate de reglement\u0103ri. Aceast\u0103 sesiune prezint\u0103 cercet\u0103ri originale \u0219i noi instrumente pentru detectarea amenin\u021b\u0103rilor mobile, abord\u00e2nd \u00eentrebarea-cheie \u00een ce m\u0103sur\u0103 AI afecteaz\u0103 aceast\u0103 dinamic\u0103 de tip \"\u0219oarece \u0219i pisic\u0103\".<\/p>\n<p>Acest eveniment este destinat exclusiv membrilor AI-Cybersecurity Research and Policy Hub. Pentru a participa, v\u0103 rug\u0103m s\u0103 v\u0103 \u00eenregistra\u021bi ca membru <a href=\"https:\/\/forms.gle\/JkfPXKrx3ZqSmrxJ9\">aici<\/a>.<\/p><\/p>","protected":false},"excerpt":{"rendered":"<p>Aceast\u0103 sesiune prezint\u0103 cercet\u0103ri originale \u0219i instrumente noi pentru detectarea amenin\u021b\u0103rilor mobile, abord\u00e2nd \u00eentrebarea cheie \u00een ce m\u0103sur\u0103 AI afecteaz\u0103 aceast\u0103 dinamic\u0103 a \u0219oarecelui \u0219i pisicii.<\/p>","protected":false},"featured_media":55703,"template":"","meta":{"_acf_changed":true,"_seopress_robots_primary_cat":"","_seopress_titles_title":"The Promise and Perils of AI for Mobile Threat Detection","_seopress_titles_desc":"This session presents original research and new tools for mobile threat detection, addressing the key question of how far AI affects this cat and mouse dynamic.","_seopress_robots_index":"","inline_featured_image":false},"event-category":[2151],"event-type":[2154],"special-filter":[],"class_list":["post-56158","event","type-event","status-publish","has-post-thumbnail","hentry","event-category-ai-cybersecurity-research-and-policy-hub","event-type-online-session"],"acf":[],"_links":{"self":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/event\/56158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/media\/55703"}],"wp:attachment":[{"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/media?parent=56158"}],"wp:term":[{"taxonomy":"event-category","embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/event-category?post=56158"},{"taxonomy":"event-type","embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/event-type?post=56158"},{"taxonomy":"special-filter","embeddable":true,"href":"https:\/\/virtual-routes.org\/ro\/wp-json\/wp\/v2\/special-filter?post=56158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}