{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T03:08:12Z","timestamp":1775704092776,"version":"3.50.1"},"reference-count":90,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.engappai.2025.112822","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T02:35:52Z","timestamp":1761618952000},"page":"112822","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"P2","title":["The integration of emerging technologies in defense: A scientometric overview"],"prefix":"10.1016","volume":"163","author":[{"given":"Munish","family":"Bhatia","sequence":"first","affiliation":[]},{"family":"Pallvi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2025.112822_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jcrimjus.2025.102373","article-title":"Automation and artificial intelligence in police body-worn cameras: Experimental evidence of impact on perceptions of fairness among officers","volume":"97","author":"Adams","year":"2025","journal-title":"J. Crim. Justice"},{"key":"10.1016\/j.engappai.2025.112822_b2","series-title":"2021 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","first-page":"81","article-title":"Big data processing at the edge with data skew aware resource allocation","author":"Ahmadvand","year":"2021"},{"key":"10.1016\/j.engappai.2025.112822_b3","series-title":"DV-ARPA: data variety aware resource provisioning for big data processing in accumulative applications","author":"Ahmadvand","year":"2020"},{"key":"10.1016\/j.engappai.2025.112822_b4","series-title":"Latency and privacy-aware resource allocation in vehicular edge computing","author":"Ahmadvand","year":"2025"},{"issue":"4","key":"10.1016\/j.engappai.2025.112822_b5","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.3390\/make5040078","article-title":"Evaluating the role of machine learning in defense applications and industry","volume":"5","author":"Alc\u00e1ntara Su\u00e1rez","year":"2023","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"10.1016\/j.engappai.2025.112822_b6","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2024.3503587","article-title":"A systematic literature review of zero trust architecture for military UAV security systems","author":"Alquwayzani","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b7","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s43762-023-00097-8","article-title":"Understanding policy and technical aspects of ai-enabled smart video surveillance to address public safety","volume":"3","author":"Ardabili","year":"2023","journal-title":"Comput. Urban Sci."},{"key":"10.1016\/j.engappai.2025.112822_b8","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s11192-008-0216-y","article-title":"Which h-index?\u2014A comparison of WoS, scopus and google scholar","volume":"74","author":"Bar-Ilan","year":"2008","journal-title":"Scientometrics"},{"key":"10.1016\/j.engappai.2025.112822_b9","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.003.2400401","article-title":"Flighter: Decentralized federated learning and situational awareness for secure military aerial reconnaissance","author":"Beltran","year":"2025","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b10","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s00146-024-01866-7","article-title":"Ethical governance of artificial intelligence for defence: normative tradeoffs for principle to practice guidance","volume":"40","author":"Blanchard","year":"2025","journal-title":"AI Soc."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b11","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/s00146-022-01513-z","article-title":"Using artificial intelligence to prevent crime: implications for due process and criminal justice","volume":"39","author":"Blount","year":"2024","journal-title":"AI Soc."},{"key":"10.1016\/j.engappai.2025.112822_b12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1742-5581-3-1","article-title":"Scopus database: a review","volume":"3","author":"Burnham","year":"2006","journal-title":"Biomed. Digit. Libr."},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b13","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSMCC.2007.913919","article-title":"A comprehensive survey of multiagent reinforcement learning","volume":"38","author":"Busoniu","year":"2008","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"10.1016\/j.engappai.2025.112822_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.robot.2023.104410","article-title":"Cooperative artificial intelligence for underwater robotic swarm","volume":"164","author":"Cai","year":"2023","journal-title":"Robot. Auton. Syst."},{"key":"10.1016\/j.engappai.2025.112822_b15","series-title":"Quantum Technologies in Defense and Aerospace: A Scientometric Analysis of Emerging Trends and Opportunities. Available At SSRN 5265429","author":"Cecere","year":"2025"},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b16","first-page":"1","article-title":"The citespace manual","volume":"1","author":"Chen","year":"2014","journal-title":"Coll. Comput. Inform."},{"issue":"8","key":"10.1016\/j.engappai.2025.112822_b17","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1002\/asi.22688","article-title":"SciMAT: A new science mapping analysis software tool","volume":"63","author":"Cobo","year":"2012","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"10.1016\/j.engappai.2025.112822_b18","series-title":"Handbook of Tableau Methods","author":"D\u2019Agostino","year":"2013"},{"key":"10.1016\/j.engappai.2025.112822_b19","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.procs.2024.05.101","article-title":"Artificial intelligence as an innovative element of support in policing","volume":"237","author":"Dubravova","year":"2024","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.engappai.2025.112822_b20","series-title":"Digital Avionics Systems Conference, 2003. DASC\u201903. the 22nd","first-page":"8","article-title":"Application of artificial intelligence techniques in uninhabited aerial vehicle flight","volume":"Vol. 2","author":"Dufrene","year":"2003"},{"issue":"17","key":"10.1016\/j.engappai.2025.112822_b21","doi-asserted-by":"crossref","first-page":"9742","DOI":"10.3390\/app13179742","article-title":"Navigating the sea of data: a comprehensive review on data analysis in maritime IoT applications","volume":"13","author":"Durlik","year":"2023","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b22","first-page":"1","article-title":"Genetic fuzzy based artificial intelligence for unmanned combat aerial vehicle control in simulated air combat missions","volume":"6","author":"Ernest","year":"2016","journal-title":"J. D\u00e9f. Manag."},{"key":"10.1016\/j.engappai.2025.112822_b23","series-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"Eubanks","year":"2018"},{"issue":"11","key":"10.1016\/j.engappai.2025.112822_b24","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.3390\/machines10111033","article-title":"Air combat maneuver decision method based on A3C deep reinforcement learning","volume":"10","author":"Fan","year":"2022","journal-title":"Machines"},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b25","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13524","article-title":"An AI knowledge-based system for police assistance in crime investigation","volume":"42","author":"Fernandez-Basso","year":"2025","journal-title":"Expert Syst."},{"key":"10.1016\/j.engappai.2025.112822_b26","series-title":"Ground\/Air Multisensor Interoperability, Integration, and Networking for Persistent Isr Ix","first-page":"8","article-title":"Artificial intelligence and machine learning for future army applications","volume":"Vol. 10635","author":"Fossaceca","year":"2018"},{"issue":"4","key":"10.1016\/j.engappai.2025.112822_b27","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s13437-023-00312-7","article-title":"A comprehensive survey on the applications of machine learning techniques on maritime surveillance to detect abnormal maritime vessel behaviors","volume":"22","author":"Gamage","year":"2023","journal-title":"WMU J. Marit. Aff."},{"key":"10.1016\/j.engappai.2025.112822_b28","doi-asserted-by":"crossref","unstructured":"Geetha, M., Mohith, S., S., Raja., Venkatramani, R., Vignesh, S., 2024. Next-Generation Defense Security: Blockchain, IoT, Digital Twin, and Face Recognition-Based Smart Monitoring System. In: 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems. ICUIS, pp. 1463\u20131469.","DOI":"10.1109\/ICUIS64676.2024.10866097"},{"key":"10.1016\/j.engappai.2025.112822_b29","series-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"10.1016\/j.engappai.2025.112822_b30","doi-asserted-by":"crossref","unstructured":"Gu, Xiaodong, Fan, Zhiwen, Zhu, Siyu, Dai, Zuozhuo, Tan, Feitong, Tan, Ping, 2020. Cascade cost volume for high-resolution multi-view stereo and stereo matching. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 2495\u20132504.","DOI":"10.1109\/CVPR42600.2020.00257"},{"key":"10.1016\/j.engappai.2025.112822_b31","series-title":"MATLAB Guide","author":"Higham","year":"2016"},{"issue":"6","key":"10.1016\/j.engappai.2025.112822_b32","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0098679","article-title":"ForceAtlas2, a continuous graph layout algorithm for handy network visualization designed for the Gephi software","volume":"9","author":"Jacomy","year":"2014","journal-title":"PloS One"},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b33","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1108\/14684520510598066","article-title":"Google scholar: the pros and the cons","volume":"29","author":"Jacs\u00f3","year":"2005","journal-title":"Online Inf. Rev."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b34","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/13600826.2023.2205444","article-title":"Finding AI faces in the moon and armies in the clouds: anthropomorphising artificial intelligence in military human-machine interactions","volume":"38","author":"Johnson","year":"2024","journal-title":"Glob. Soc."},{"key":"10.1016\/j.engappai.2025.112822_b35","series-title":"2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques","first-page":"1","article-title":"AI & ML methodologies in navy & their systems","author":"Jyothi","year":"2023"},{"issue":"8","key":"10.1016\/j.engappai.2025.112822_b36","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s10462-024-10823-1","article-title":"Role of artificial intelligence in the crime prediction and pattern analysis studies published over the last decade: a scientometric analysis","volume":"57","author":"Kaur","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.engappai.2025.112822_b37","doi-asserted-by":"crossref","first-page":"17001","DOI":"10.1109\/ACCESS.2019.2893141","article-title":"Evolving rule-based explainable artificial intelligence for unmanned aerial vehicles","volume":"7","author":"Keneni","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.112822_b38","series-title":"2025 International Conference on Artificial Intelligence in Information and Communication","first-page":"0408","article-title":"AI-driven conversational voice communication for maritime autonomous surface ships","author":"Kim","year":"2025"},{"key":"10.1016\/j.engappai.2025.112822_b39","series-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"issue":"7","key":"10.1016\/j.engappai.2025.112822_b40","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.3390\/electronics9071121","article-title":"UAV autonomous aerial combat maneuver strategy generation with observation error based on state-adversarial deep deterministic policy gradient and inverse reinforcement learning","volume":"9","author":"Kong","year":"2020","journal-title":"Electronics"},{"key":"10.1016\/j.engappai.2025.112822_b41","series-title":"Implementing Machine Learning Techniques for the Anticipation of Maintenance Requirements in Naval Assets","first-page":"1","author":"Krishna","year":"2024"},{"key":"10.1016\/j.engappai.2025.112822_b42","series-title":"International Conference on Data Science and Big Data Analysis","first-page":"451","article-title":"AI-enabled crime intelligence extraction: Enhancing law enforcement capabilities through deep and dark web analysis and data correlation","author":"Kulkarn","year":"2024"},{"key":"10.1016\/j.engappai.2025.112822_b43","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.procs.2025.02.062","article-title":"Neoteric threat intelligence ensuring digital sovereignty and trust through ML-infused proactive defense analytics for NEXT-g and beyond ecosystems","volume":"254","author":"Kumar","year":"2025","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b44","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s44196-024-00539-z","article-title":"Application of artificial intelligence technology in vulnerability analysis of intelligent ship network","volume":"17","author":"Lan","year":"2024","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"10.1016\/j.engappai.2025.112822_b45","series-title":"2023 IEEE 29th International Conference on Parallel and Distributed Systems","first-page":"1476","article-title":"A cooperative multi-AUV mobile scheme with optical communication via DDPG approach","author":"Li","year":"2023"},{"key":"10.1016\/j.engappai.2025.112822_b46","series-title":"Privacy-preserving universal adversarial defense for black-box models","author":"Li","year":"2024"},{"issue":"12","key":"10.1016\/j.engappai.2025.112822_b47","first-page":"33","article-title":"AI-enhanced security for large-scale kubernetes clusters: Advanced defense and authentication for national cloud infrastructure","volume":"4","author":"Li","year":"2024","journal-title":"J. Theory Pr. Eng. Sci."},{"key":"10.1016\/j.engappai.2025.112822_b48","series-title":"2025 International Conference on Electronics, Information, and Communication","first-page":"1","article-title":"Enhancing naval mine detection through augmented side scan sonar data and synthetic image generation for manned and unmanned teaming systems","author":"Lim","year":"2025"},{"issue":"7","key":"10.1016\/j.engappai.2025.112822_b49","doi-asserted-by":"crossref","first-page":"7494","DOI":"10.1109\/TITS.2022.3162850","article-title":"Smart underwater pollution detection based on graph-based multi-agent reinforcement learning towards AUV-based network ITS","volume":"24","author":"Lin","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.engappai.2025.112822_b50","series-title":"2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies","first-page":"1","article-title":"Stand alone or non stand alone 5G tactical edge network architecture for military and use case scenarios","author":"Malik","year":"2024"},{"key":"10.1016\/j.engappai.2025.112822_b51","doi-asserted-by":"crossref","unstructured":"Matthew, Ugochukwu O., Kazaure, Jazuli S., Onyebuchi, Amaonwu, Daniel, Ogobuchi Okey, Muhammed, Ibrahim Hassan, Okafor, Nwamaka U., 2021. Artificial Intelligence Autonomous Unmanned Aerial Vehicle (UAV) System for Remote Sensing in Security Surveillance. In: 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA). pp. 1\u201310.","DOI":"10.1109\/CYBERNIGERIA51635.2021.9428862"},{"issue":"5","key":"10.1016\/j.engappai.2025.112822_b52","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MIC.2021.3055153","article-title":"Digital twin in the military field","volume":"26","author":"Mendi","year":"2022","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.engappai.2025.112822_b53","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s11192-015-1765-5","article-title":"The journal coverage of web of science and scopus: a comparative analysis","volume":"106","author":"Mongeon","year":"2016","journal-title":"Scientometrics"},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b54","article-title":"Scientometric study of research on AI & ML application in defence technology and military operations.","volume":"44","author":"Pandey","year":"2024","journal-title":"DESIDOC J. Libr. Inf. Technol."},{"issue":"2\u20133","key":"10.1016\/j.engappai.2025.112822_b55","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.techsoc.2004.01.035","article-title":"Military technology: an historical perspective","volume":"26","author":"Perry","year":"2004","journal-title":"Technol. Soc."},{"key":"10.1016\/j.engappai.2025.112822_b56","series-title":"Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations","author":"Perry","year":"2013"},{"issue":"12","key":"10.1016\/j.engappai.2025.112822_b57","doi-asserted-by":"crossref","first-page":"718","DOI":"10.3390\/drones8120718","article-title":"An AI-based deep learning with K-mean approach for enhancing altitude estimation accuracy in unmanned aerial vehicles","volume":"8","author":"Piyakawanich","year":"2024","journal-title":"Drones"},{"key":"10.1016\/j.engappai.2025.112822_b58","series-title":"2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering","first-page":"1624","article-title":"Artificial intelligence-based control strategies for unmanned aerial vehicles","volume":"Vol. 10","author":"Prabagar","year":"2023"},{"issue":"5","key":"10.1016\/j.engappai.2025.112822_b59","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSEC.2019.2925649","article-title":"Artificial intelligence for law enforcement: challenges and opportunities","volume":"17","author":"Raaijmakers","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.engappai.2025.112822_b60","article-title":"Trends and developments in military safety performance: a combined scientometric and scoping study","author":"Radzi","year":"2025","journal-title":"Soc. Secur. Manag. J."},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b61","first-page":"97","article-title":"Assessing the impact of ergonomic interventions in military settings: A scientometric and scoping approach","volume":"2","author":"Radzi","year":"2025","journal-title":"Spectrum"},{"key":"10.1016\/j.engappai.2025.112822_b62","article-title":"Privacy inference attack and defense in centralized and federated learning: A comprehensive survey","author":"Rao","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b63","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/IOTM.001.2400141","article-title":"Military IoT from management to perception: Challenges and opportunities across layers","volume":"8","author":"Rettore","year":"2025","journal-title":"IEEE Internet Things Mag."},{"issue":"4","key":"10.1016\/j.engappai.2025.112822_b64","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1111\/1467-9868.00095","article-title":"On Bayesian analysis of mixtures with an unknown number of components (with discussion)","volume":"59","author":"Richardson","year":"1997","journal-title":"J. R. Stat. Soc. Ser. B Stat. Methodol."},{"issue":"6088","key":"10.1016\/j.engappai.2025.112822_b65","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagating errors","volume":"323","author":"Rumelhart","year":"1986","journal-title":"Nature"},{"key":"10.1016\/j.engappai.2025.112822_b66","doi-asserted-by":"crossref","unstructured":"Saarnisaari, Harri, H\u00f6yhty\u00e4, Marko, Rantanen, Heikki, M\u00e4kel\u00e4, Juha, 2024. Military Communications in the 6G Era: Finnish Perspective. In: MILCOM 2024 - 2024 IEEE Military Communications Conference. MILCOM, pp. 135\u2013140.","DOI":"10.1109\/MILCOM61039.2024.10773716"},{"key":"10.1016\/j.engappai.2025.112822_b67","doi-asserted-by":"crossref","first-page":"70080","DOI":"10.1109\/ACCESS.2021.3078117","article-title":"Empirical analysis for crime prediction and forecasting using machine learning and deep learning techniques","volume":"9","author":"Safat","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2025.112822_b68","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1109\/OJVT.2023.3316181","article-title":"A comprehensive survey on artificial intelligence for unmanned aerial vehicles","volume":"4","author":"Sai","year":"2023","journal-title":"IEEE Open J. Veh. Technol."},{"key":"10.1016\/j.engappai.2025.112822_b69","series-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017"},{"key":"10.1016\/j.engappai.2025.112822_b70","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2020.108863","article-title":"Distributed implementation of nonlinear model predictive control for AUV trajectory tracking","volume":"115","author":"Shen","year":"2020","journal-title":"Automatica"},{"key":"10.1016\/j.engappai.2025.112822_b71","series-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014"},{"issue":"6","key":"10.1016\/j.engappai.2025.112822_b72","doi-asserted-by":"crossref","first-page":"5113","DOI":"10.1007\/s11192-021-03948-5","article-title":"The journal coverage of web of science, scopus and dimensions: A comparative analysis","volume":"126","author":"Singh","year":"2021","journal-title":"Scientometrics"},{"issue":"4","key":"10.1016\/j.engappai.2025.112822_b73","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1002\/asi.4630240406","article-title":"Co-citation in the scientific literature: a new measure of the relationship between two documents","volume":"24","author":"Small","year":"1973","journal-title":"Journal of the American Society for information Science"},{"key":"10.1016\/j.engappai.2025.112822_b74","article-title":"Application of machine learning (ML)-based multi-classifications to identify corrosion fatigue cracking phenomena in naval steel weldments","volume":"39","author":"Srivastava","year":"2024","journal-title":"Mater. Today Commun."},{"key":"10.1016\/j.engappai.2025.112822_b75","series-title":"Proceedings of the 6th International Conference on Social, Economic, and Academic Leadership","first-page":"432","article-title":"Artificial intelligence in the criminal justice system: Leading trends and possibilities","author":"Sushina","year":"2020"},{"key":"10.1016\/j.engappai.2025.112822_b76","unstructured":"Svenmarck, Peter, Luotsinen, Linus, Nilsson, Mattias, Schubert, Johan, 2018. Possibilities and challenges for artificial intelligence in military applications. In: Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists\u2019 Meeting. Vol. 1."},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b77","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2478\/raft-2021-0022","article-title":"Artificial intelligence in military application\u2013opportunities and challenges","volume":"26","author":"Szabadf\u00f6ldi","year":"2021","journal-title":"Land Forces Acad. Rev."},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b78","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1134\/S2075108724700214","article-title":"Review of scientific and technical periodicals on marine navigation equipment engineering","volume":"15","author":"Taranovskiy","year":"2024","journal-title":"Gyroscopy Navig."},{"key":"10.1016\/j.engappai.2025.112822_b79","doi-asserted-by":"crossref","DOI":"10.1016\/j.nancom.2024.100560","article-title":"Beyond 5G: Exploring key enabling technologies, use cases, and future prospects of 6 G communication","volume":"43","author":"Telagam","year":"2025","journal-title":"Nano Commun. Netw."},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b80","doi-asserted-by":"crossref","first-page":"1797","DOI":"10.1007\/s11192-020-03795-w","article-title":"A study of citations to STEM databases: ACM digital library, engineering village, IEEE Xplore, and MathSciNet","volume":"126","author":"Tomaszewski","year":"2021","journal-title":"Scientometrics"},{"issue":"2","key":"10.1016\/j.engappai.2025.112822_b81","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11192-009-0146-3","article-title":"Software survey: VOSviewer, a computer program for bibliometric mapping","volume":"84","author":"Van Eck","year":"2010","journal-title":"Scientometrics"},{"key":"10.1016\/j.engappai.2025.112822_b82","doi-asserted-by":"crossref","DOI":"10.1016\/j.oceaneng.2024.118777","article-title":"Sample-efficient and surrogate-based design optimization of underwater vehicle hulls","volume":"311","author":"Vardhan","year":"2024","journal-title":"Ocean Eng."},{"issue":"21","key":"10.1016\/j.engappai.2025.112822_b83","doi-asserted-by":"crossref","first-page":"9966","DOI":"10.3390\/app11219966","article-title":"A critical review of unmanned aerial vehicles (UAVs) use in architecture and urbanism: Scientometric and bibliometric analysis","volume":"11","author":"Videras Rodr\u00edguez","year":"2021","journal-title":"Appl. Sci."},{"issue":"7782","key":"10.1016\/j.engappai.2025.112822_b84","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1038\/s41586-019-1724-z","article-title":"Grandmaster level in StarCraft II using multi-agent reinforcement learning","volume":"575","author":"Vinyals","year":"2019","journal-title":"Nature"},{"key":"10.1016\/j.engappai.2025.112822_b85","doi-asserted-by":"crossref","unstructured":"Wang, Fangjinhua, Galliani, Silvano, Vogel, Christoph, Speciale, Pablo, Pollefeys, Marc, 2021a. Patchmatchnet: Learned multi-view patchmatch stereo. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp. 14194\u201314203.","DOI":"10.1109\/CVPR46437.2021.01397"},{"issue":"15","key":"10.1016\/j.engappai.2025.112822_b86","doi-asserted-by":"crossref","first-page":"2912","DOI":"10.3390\/rs13152912","article-title":"Social network and bibliometric analysis of unmanned aerial vehicle remote sensing applications from 2010 to 2021","volume":"13","author":"Wang","year":"2021","journal-title":"Remote. Sens."},{"issue":"8","key":"10.1016\/j.engappai.2025.112822_b87","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","article-title":"Edge computing security: State of the art and challenges","volume":"107","author":"Xiao","year":"2019","journal-title":"Proc. IEEE"},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b88","doi-asserted-by":"crossref","first-page":"146","DOI":"10.3390\/jmse12010146","article-title":"A bibliometric analysis and overall review of the new technology and development of unmanned surface vessels","volume":"12","author":"Yang","year":"2024","journal-title":"J. Mar. Sci. Eng."},{"key":"10.1016\/j.engappai.2025.112822_b89","doi-asserted-by":"crossref","first-page":"46605","DOI":"10.1109\/ACCESS.2020.2978883","article-title":"Evasive maneuver strategy for UCAV in beyond-visual-range air combat based on hierarchical multi-objective evolutionary algorithm","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.engappai.2025.112822_b90","article-title":"Novel defense schemes for artificial intelligence deployed in edge computing environment","volume":"2020","author":"Zhou","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625028532?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625028532?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T16:56:42Z","timestamp":1764953802000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197625028532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":90,"alternative-id":["S0952197625028532"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2025.112822","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"The integration of emerging technologies in defense: A scientometric overview","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2025.112822","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112822"}}