{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:46:36Z","timestamp":1759333596051},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540328322"},{"type":"electronic","value":"9783540328353"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11683704_1","type":"book-chapter","created":{"date-parts":[[2006,2,27]],"date-time":"2006-02-27T07:24:01Z","timestamp":1141025041000},"page":"1-13","source":"Crossref","is-referenced-by-count":7,"title":["Autonomous Agents and Multi \u2013agent Systems (AAMAS) for the Military \u2013 Issues and Challenges"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Beautement","sequence":"first","affiliation":[]},{"given":"David","family":"Allsopp","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Greaves","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Shannon","family":"Spires","sequence":"additional","affiliation":[]},{"given":"Simon G.","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Alberts, D.S., Hayes, R.E.: Power To the Edge. Command... Control... in the Information Age. In: CCRP (2003)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Allsopp, D.N., Beautement, P., Bradshaw, J.M., Durfee, E.H., Kirton, M., Knoblock, C.A., Suri, N., Tate, A., Thompson, C.Q.: Coalition Agents Experiment: Multiagent Cooperation in International Coalitions. IEEE Intelligent Systems (May\/June 2002)","DOI":"10.1109\/MIS.2002.1005628"},{"issue":"6","key":"1_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MIC.2004.54","volume":"8","author":"M. Atighetchi","year":"2004","unstructured":"Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, C., Loyall, J.: Adaptive Cyberdefense for Survival and Intrusion Tolerance. IEEE Internet Computing\u00a08(6), 25\u201333 (2004)","journal-title":"IEEE Internet Computing"},{"key":"1_CR4","volume-title":"Handbook of Intelligent Information Technology","author":"J.M. Bradshaw","year":"2004","unstructured":"Bradshaw, J.M., Beautement, P., Breedy, M.R., Bunch, L., Drakunov, S.V., Feltovich, P., Hoffman, R.R., Jeffers, R., Johnson, M., Kulkarni, S., Lott, J., Raj, A.K., Suri, N., Uszok, A.: Making Agents Acceptable to People. In: Zhong, N., Liu, J. (eds.) Handbook of Intelligent Information Technology. IOS Press \/ Springer, Amsterdam (2004)"},{"key":"#cr-split#-1_CR5.1","unstructured":"Bates, J.C.: UltraLog: Securing Logistics Information on the Battlefield. Army Logistician??37(2) (March-April 2005);"},{"key":"#cr-split#-1_CR5.2","unstructured":"U.S. Government Printing Office ISSN 0004-2528"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Gorodetski, V., Kotenko, I.: The Multi-agent Systems for Computer Network Security Assurance: Frameworks and Case Studies. In: Proceedings of the 2002 IEEE International Conference on Artificial Intelligence Systems (ICAIS 2002), Geelong, Australia, February 12-15 (2002)","DOI":"10.1109\/ICAIS.2002.1048117"},{"key":"1_CR7","unstructured":"Hasard, Written answers (Hoon) Debate of The United Kingdom Parliament (May 15, 2000)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Hoile, C., Wang, F., Bonsma, E., Marrow, P.: Core Specification and Experiments in DIET: A Decentralised Ecosystem-inspired Mobile Agent System. In: Castelfranchi, C., Johnson, W.L. (eds.) Proceedings of First International Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy, July 15-19, pp. 623\u2013630 (2002)","DOI":"10.1145\/544862.544890"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Hollan, J., Hutchins, E., Kirsh, D.: Distributed cognition: Toward a new Foundation for Human-computer Interaction Research. University of California, San Diego (2000)","DOI":"10.1145\/353485.353487"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Helsinger, Wright, T.: Cougaar: A Robust Configurable Multi-Agent Platform. Submitted to IEEE Aerospace Conference 2005, BBN Technologies, Cambridge MA (2005)","DOI":"10.1109\/AERO.2005.1559614"},{"key":"1_CR11","volume-title":"Agent Technology Foundations, Applications and Markets","author":"N.R. Jennings","year":"1998","unstructured":"Jennings, N.R., Wooldridge, M.J.: Applications of Intelligent Agents. In: Jennings, N.R., Wooldridge, M.J. (eds.) Agent Technology Foundations, Applications and Markets. Springer, Heidelberg (1998)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1023\/A:1024176820874","volume":"7","author":"D.V. Pynasath","year":"2003","unstructured":"Pynasath, D.V., Tambe, M.: An Automated Teamwork Infrastructure for Hetrogeneous Software Agents and Humans. JAAMAS (Journal of Autonomous Agents and Multi- Agent Systems)\u00a07, 71\u2013100 (2003)","journal-title":"JAAMAS (Journal of Autonomous Agents and Multi- Agent Systems)"},{"key":"1_CR13","unstructured":"Kotenko: Active Vulnerability Assessment of Computer Networks by Simulation of Complex Remote Attacks. In: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing (ICCNMC 2003) Shanghai, China, October 20-23 (2003)"},{"key":"1_CR14","unstructured":"Sandhana, L.: The Drone Armies are Coming. Wired News (August 30, 2002)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Potok, T.E., Phillips, L., Pollock, R., Loebl, A., Sheldon, F.T.: Suitability of Agent Technology for Command and Control in Fault-tolerant, Safety-critical Responsive Decision Networks. In: Proc.16th Int\u2019l Conf. Parallel and Distributed Computing Systems, Reno NV, August 13-15 (2003)","DOI":"10.2172\/885642"},{"key":"1_CR16","unstructured":"Shadbolt, N., Ciravegna, F., Domingue, J., Hall, W., Motta, E., O\u2019Hara, K., Robertson, D., Sleemean, D., Tate, A., Wilks, Y.: Advanced Knowledge Technologies at the Midterm: Tools and Methods for the Semantic Web. In: Shadbolt, N., O\u2019Hara, K. (eds.) Advanced Knowledge Technologies, Selected Papers 2004, AKT, UK (2004) ISBN 85432 8122"},{"key":"1_CR17","unstructured":"Talbot, D.: How Technology Failed in Iraq. MIT Technology Review (November 2004), http:\/\/www.technologyreview.com\/articles\/04\/11\/talbot1104.asp"},{"key":"1_CR18","unstructured":"Wang, F., Gong, F., Sargor, C., Goseva-Popsto janova, K., Trivedi, K., Jou, F.: SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security T1B3 1100 United States Military Academy, West Point, NY, June 5-6 (2001)"}],"container-title":["Lecture Notes in Computer Science","Defence Applications of Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11683704_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T03:07:09Z","timestamp":1555470429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11683704_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540328322","9783540328353"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11683704_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}