{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:39:37Z","timestamp":1756571977042},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030334314"},{"type":"electronic","value":"9783030334321"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33432-1_1","type":"book-chapter","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T14:02:44Z","timestamp":1580824964000},"page":"1-21","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems"],"prefix":"10.1007","author":[{"given":"Paul","family":"Theron","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Kott","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Dra\u0161ar","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Rzadca","sequence":"additional","affiliation":[]},{"given":"Beno\u00eet","family":"LeBlanc","sequence":"additional","affiliation":[]},{"given":"Mauno","family":"Pihelgas","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"de Gaspari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,5]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ambrosin, M. et al., 2016. SANA: Secure and Scalable Aggregate Network Attestation. New York, NY, USA, ACM, pp. 731\u2013742.","DOI":"10.1145\/2976749.2978335"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Baumann, A., Peinado, M. & Hunt, G., 2015. Shielding Applications from an Untrusted Cloud with Haven. ACM Trans. Comput. Syst., 8, Volume 33, pp. 8:1\u20138:26.","DOI":"10.1145\/2799647"},{"key":"1_CR3","unstructured":"Blakely, B. & Theron, P., 2018. Decision flow-based Agent Action Planning. Prague, 18\u201320 October 2017: \nhttps:\/\/export.arxiv.org\/pdf\/1804.07646\n\n."},{"key":"1_CR4","unstructured":"Booch, G., 1991. Object-Oriented Analysis and Design with Applications. The Benjamin Cummings Publishing Company ed. San Francisco, CA: Pearson Education."},{"key":"1_CR5","unstructured":"Boulanin, V. & Verbruggen, M., 2017. Mapping the development of autonomy in weapon systems, Solna, Sweden, available at \nhttps:\/\/www.sipri.org\/publications\/2017\/other-publications\/mapping-development-autonomy-weapon-systems:\n\n SIPRI."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Bowen, B. M., Hershkop, S., Keromytis, A. D. & Stolfo, S. J., 2009. Baiting Inside Attackers Using Decoy Documents. s.l., Springer, Berlin, Heidelberg, pp. 51\u201370.","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Carrasco, A. et al., 2010. Multi-agent and embedded system technologies applied to improve the management of power systems. JDCTA, 4(1), pp. 79\u201385.","DOI":"10.4156\/jdcta.vol4.issue1.8"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chen, B. & Cheng, H. H., 2010. A review of the applications of agent technology in traffic and transportation systems. Trans. Intell. Transport. Sys., 11(2), pp. 485\u2013497.","DOI":"10.1109\/TITS.2010.2048313"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"De Gaspari, F., Jajodia, S., Mancini, L. V. & Panico, A., 2016. AHEAD: A New Architecture for Active Defense, Vienna, Austria: SafeConfig\u201916, October 24 2016.","DOI":"10.1145\/2994475.2994481"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Defense Science Board, 2012. Task Force Report: The Role of Autonomy in DoD Systems, Washington, D.C.: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics.","DOI":"10.21236\/ADA566864"},{"key":"1_CR11","unstructured":"Defense Science Board, 2016. Summer Study on Autonomy, Washington, D.C.: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Mancini, L. V. & Mei, A., 2003. Random Key-assignment for Secure Wireless Sensor Networks. New York, NY, USA, ACM, pp. 62\u201371.","DOI":"10.1145\/986858.986868"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Mancini, L. V. & Mei, A., 2006. Energy Efficient Node-to-node Authentication and Communication Confidentiality in Wireless Sensor Networks. Wireless Networks, 11, Volume 12, pp. 709\u2013721.","DOI":"10.1007\/s11276-006-6530-5"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Disso, J. P., Jones, K. & Bailey, S., 2013. A Plausible Solution to SCADA Security Honeypot Systems. IEEE, Eighth International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 443\u2013448.","DOI":"10.1109\/BWCCA.2013.77"},{"key":"1_CR15","unstructured":"Eldefrawy, K., Francillon, A., Perito, D. & Tsudik, G., 2012. SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust. 19th Annual Network and Distributed System Security Symposium, February 5\u20138 ed. San Diego, CA: NDSS 2012."},{"key":"1_CR16","unstructured":"Elmenreich, W., 2003. Intelligent methods for embedded systems. In: J. 2. Vienna University of Technology 2003, ed. Proceedings of the First Workshop on Intelligent Solutions in Embedded Systems. Austria: Vienna: Vienna University of Technology, pp. 3\u201311."},{"key":"1_CR17","unstructured":"Gamma, E., Helm, R., Johnson, R. & Vlissides, J., 1994. Design patterns: elements of reusable object-oriented software. Reading, Massachusetts: Addison-Wesley."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Hofmann, O. S. et al., 2013. InkTag: Secure Applications on an Untrusted Operating System. New York, NY, USA, ACM, pp. 265\u2013278.","DOI":"10.1145\/2499368.2451146"},{"key":"1_CR19","unstructured":"Huang, H.-P., Liang, C.-C. & Lin, C.-W., 2001. Construction and soccer dynamics analysis for an integrated multi-agent soccer robot system. Natl. Sci. Counc. ROC(A), Volume 25, pp. 84\u201393."},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Jamont, J.-P. & Occello, M., 2011. A framework to simulate and support the design of distributed automation and decentralized control systems: Application to control of indoor building comfort. In: IEEE Symposium on Computational Intelligence in Control and Automation. Paris, France: IEEE, pp. 80\u201387.","DOI":"10.1109\/CICA.2011.5945762"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Jamont, J.-P., Occello, M. & Lagr\u00e8ze, A., 2010. A multiagent approach to manage communication in wireless instrumentation systems. Measurement, 43(4), pp. 489\u2013503.","DOI":"10.1016\/j.measurement.2009.12.018"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Kott, A. et al., 2019. Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture, Release 2.0, Adelphi, MD: US Army Research Laboratory, ARL SR-0421, September 2019, available from \nhttps:\/\/arxiv.org\/abs\/1803.10664\n\n.","DOI":"10.1177\/1548512919886163"},{"key":"1_CR23","unstructured":"LeBlanc, B., Losiewicz, P. & Hourlier, S., 2017. A Program for effective and secure operations by Autonomous Agents and Human Operators in communications constrained tactical environments. Prague: NATO IST-152 workshop."},{"key":"1_CR24","unstructured":"Lin, J. & Singer, P. W., 2014. University Tests Long-Range Unmanned Mini Sub. [Online]  Available at: \nhttps:\/\/www.popsci.com\/blog-network\/eastern-arsenal\/not-shark-robot-chinese-university-tests-long-range-unmanned-mini-sub\n\n [Accessed 11 May 2018]."},{"issue":"4","key":"1_CR25","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/TPWRS.2007.908471","volume":"22","author":"Stephen D. J. McArthur","year":"2007","unstructured":"McArthur, S. D. et al., 2007. Multi-Agent Systems for Power Engineering Applications - Part I: Concepts, Approaches, and Technical Challenges. IEEE TRANSACTIONS ON POWER SYSTEMS, 22(4), pp. 1743\u20131752.","journal-title":"IEEE Transactions on Power Systems"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Muller, J.-P., 2004. Emergence of collective behaviour and problem solving. In: A. Omicini, P. Petta & J. Pitt, eds. Engineering Societies in the Agents World IV. volume 3071: Lecture Notes in Computer Science, pp. 1\u201320.","DOI":"10.1007\/978-3-540-25946-6_1"},{"key":"1_CR27","unstructured":"NAP, 2012. Intelligent Human-Machine Collaboration: Summary of a Workshop, available at \nhttp:\/\/nap.edu\/13479:\n\n National Academies Press."},{"key":"1_CR28","unstructured":"NAP, 2014. Autonomy Research for Civil Aviation: Toward a New Era of Flight, available at \nhttp:\/\/nap.edu\/18815:\n\n National Academies Press."},{"key":"1_CR29","unstructured":"NAP, 2016. Protection of Transportation Infrastructure from Cyber Attacks: A Primer, Available at \nhttp:\/\/nap.edu\/23516:\n\n National Academies Press."},{"issue":"3","key":"1_CR30","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1017\/S026988890000789X","volume":"11","author":"Hyacinth S. Nwana","year":"1996","unstructured":"Nwana, H. S., 1996. Software agents: An overview. The knowledge engineering review, 11(3), pp. 205\u2013244.","journal-title":"The Knowledge Engineering Review"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Papernot, N. et al., 2016. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. IEEE, 37th IEEE Symposium on Security & Privacy, pp. 582\u2013597.","DOI":"10.1109\/SP.2016.41"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"P\u011bchou\u010dek, M., Jakob, M. & Nov\u00e1k, P., 2010. Towards Simulation-Aided Design of Multi-Agent Systems. In: R. Collier, J. Dix & P. Nov\u00e1k, eds. Programming Multi-Agent Systems. Toronto, ON, Canada: Springer, 8th InternationalWorkshop, ProMAS 2010, 11 May 2010, Revised Selected Papers, pp. 3\u201321.","DOI":"10.1007\/978-3-642-28939-2_1"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Pechoucek, M. & Mar\u00edk, V., 2008. Industrial deployment of multi-agent technologies: review and selected case studies. Autonomous Agents and Multi-Agent Systems, Volume 17, p. 397\u2013431.","DOI":"10.1007\/s10458-008-9050-0"},{"key":"1_CR34","unstructured":"Provos, N., 2004. A Virtual Honeypot Framework. Berkeley, USENIX Association, pp. 1\u20131."},{"key":"1_CR35","unstructured":"Rasch, R., Kott, A. & Forbus, K. D., 2002. AI on the battlefield: An experimental exploration. AAAI\/IAAI."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Rasch, R., Kott, A. & Forbus, K. D., 2003. Incorporating AI into military decision making: an experiment. IEEE Intelligent Systems, 18(4), pp. 18\u201326.","DOI":"10.1109\/MIS.2003.1217624"},{"key":"1_CR37","unstructured":"Russell, S. J. & Norvig, P., 2003. Artificial Intelligence: A Modern Approach. 2nd ed. Upper Saddle River, New Jersey: Prentice Hall."},{"key":"1_CR38","unstructured":"Russell, S. J. & Norvig, P., 2010. Artificial Intelligence: a Modern Approach. 3rd ed. Upper Saddle River, NJ: Pearson Education."},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Seufert, S. & O\u2019Brien, D., 2007. Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks. IEEE, ICC 2007 proceedings, pp. 1217\u20131222.","DOI":"10.1109\/ICC.2007.206"},{"issue":"7676","key":"1_CR40","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1038\/nature24270","volume":"550","author":"David Silver","year":"2017","unstructured":"Silver, D. et al., 2017. Mastering the game of Go without human knowledge. Nature, 10, Volume 550, p. 354.","journal-title":"Nature"},{"key":"1_CR41","unstructured":"Sislak, D., Volf, P., Kopriva, S. & P\u011bchou\u010dek, M., 2012. AgentFly: Scalable, High-Fidelity Framework for Simulation, Planning and Collision Avoidance of Multiple UAVs. In: P. Angelov, ed. Sense and Avoid in UAS: Research and Applications. Wiley Online Library: Wiley: John Wiley&Sons, Inc., \nhttps:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781119964049.ch9\n\n, pp. 235-264."},{"key":"1_CR42","unstructured":"Snyder, D. et al., 2015. Improving the Cybersecurity of U.S. Air Force Military Systems Throughout Their Life Cycles, Santa Monica, CA: RAND Corporation."},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Stytz, M. R., Lichtblau, D. E. & Banks, S. B., 2005. Toward using intelligent agents to detect, assess, and counter cyberattacks in a network-centric environment, Alexandria, VA: Institute For Defense Analyses.","DOI":"10.21236\/ADA464134"},{"key":"1_CR44","unstructured":"Tactical AGENTFLY, 2018. Agent Technology Center. [Online] Available at: \nhttp:\/\/agents.felk.cvut.cz\/projects\/agentfly\/tactical\n\n [Accessed 6 June 2018]."},{"key":"1_CR45","unstructured":"Th\u00e9ron, P., 2017. La cyber r\u00e9silience, un projet coh\u00e9rent transversal \u00e0 nos trois th\u00e8mes, et la probl\u00e9matique particuli\u00e8re des Syst\u00e8mes Multi Agent de Cyber D\u00e9fense. Le\u00e7on inaugurale, 5 d\u00e9cembre 2017, ed. Salon de Provence, France: Chaire Cyber R\u00e9silience A\u00e9rospatiale (Cyb\u2019Air)."},{"key":"1_CR46","unstructured":"Von Neumann, J., 1951. The General and Logical Theory of Automata. In: L. A. Jeffress, ed. Cerebral Mechanisms in Behavior: The Hixon Symposium, September 1948, Pasadena. New York: John Wiley & Sons, Inc, pp. 1\u201331."},{"issue":"4","key":"1_CR47","doi-asserted-by":"publisher","first-page":"628","DOI":"10.2307\/2393339","volume":"38","author":"Karl E. Weick","year":"1993","unstructured":"Weick, K., 1993. The Collapse of Sensemaking in Organizations: The Mann Gulch Disaster. Administrative Science Quarterly, 38(4), pp. 628\u2013652.","journal-title":"Administrative Science Quarterly"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Wooldridge, M. & Jennings, N. R., 1995. Intelligent agents: Theory and practice. The knowledge engineering review, 10(2), pp. 115\u2013152.","DOI":"10.1017\/S0269888900008122"},{"key":"1_CR49","unstructured":"Yuill, J., Zappe, M., Denning, D. & Feer, F., 2004. Honeyfiles: deceptive files for intrusion detection. IEEE Xplore, Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, 10\u201311 June 2004, pp. 116\u2013122."}],"container-title":["Adaptive Autonomous Secure Cyber Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33432-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T14:08:53Z","timestamp":1580825333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33432-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030334314","9783030334321"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33432-1_1","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}