{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T03:21:30Z","timestamp":1771989690405,"version":"3.50.1"},"reference-count":112,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T00:00:00Z","timestamp":1755129600000},"content-version":"vor","delay-in-days":225,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100004415","name":"NATO","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004415","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Many weapons operate within complex computerized systems, and are integrated with sensors and platforms. Armed forces rely extensively on digital battlefield management and decision support systems. Exploitation of vulnerabilities in such systems can render them unreliable or unusable, which can adversely affect national security and lead to losses of human life. This paper seeks to establish, first, whether states have an obligation under international law to take cybersecurity measures with respect to weapon systems. Second, the paper examines whether states have, to comply with their legal obligations or otherwise, set cybersecurity requirements, standards, or guidelines that apply to weapon systems, either by articulating them or referring to previously existing standards that apply to cyber\u2013physical systems.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf017","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T10:06:36Z","timestamp":1752746796000},"source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity of weapon systems: international law requirements and technical standards"],"prefix":"10.1093","volume":"11","author":[{"given":"Aleksi","family":"Kajander","sequence":"first","affiliation":[{"name":"Law Branch, NATO Cooperative Cyber Defence Centre of Excellence , 10132 Tallinn ,","place":["Estonia"]},{"name":"Tallinn University of Technology Department of Law, , 12616 Tallinn ,","place":["Estonia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0226-0936","authenticated-orcid":false,"given":"Rain","family":"Liivoja","sequence":"additional","affiliation":[{"name":"School of Law, University of Queensland , Brisbane QLD 4072 ,","place":["Australia"]}]},{"given":"Maarja","family":"Naagel","sequence":"additional","affiliation":[{"name":"Estonian Ministry of Foreign Affairs International Law Division, Legal Department, , 15049 Tallinn ,","place":["Estonia"]}]}],"member":"286","published-online":{"date-parts":[[2025,8,14]]},"reference":[{"key":"2025081410322586500_bib1","article-title":"The F-35 is more \u201cflying computer\u201d than fighter jet, and that\u2019s changing how America fights","author":"Osborn","year":"2020","journal-title":"The National Interest"},{"key":"2025081410322586500_bib2","article-title":"The F-35 of the future just took flight: here\u2019s everything you need to know about it","author":"Mizokami","year":"2023","journal-title":"Popular Mechanics"},{"key":"2025081410322586500_bib3","volume-title":"Cyber Security Risk Assessment Process for Military Systems","author":"NATO Science and Technology Organization","year":"2021"},{"key":"2025081410322586500_bib4","volume-title":"Framework for Improving Critical Infrastructure Cybersecurity","author":"National Institute of Standards and Technology","year":"2018"},{"key":"2025081410322586500_bib5","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.CSWP.29","volume-title":"The NIST Cybersecurity Framework (CSF) 2.0","author":"National Institute of Standards and Technology","year":"2024"},{"key":"2025081410322586500_bib6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ITMS64072.2024.10741938","article-title":"IT governance in critical sectors: towards the NIS2 implementation","volume-title":"Proceedings of the\u00a02024 IEEE 65th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS)","author":"Veigurs","year":"2024"},{"key":"2025081410322586500_bib7","volume-title":"Nuclear Weapons in the New Cyber Age: Report of the Cyber-Nuclear Weapons Study Group","author":"Stoutland","year":"2018"},{"key":"2025081410322586500_bib8","volume-title":"Cybersecurity of Nuclear Weapons Systems: Threats, Vulnerabilities and Consequences","author":"Unal","year":"2018"},{"key":"2025081410322586500_bib9","volume-title":"Hacking the Bomb: Cyber Threats and Nuclear Weapons","author":"Futter","year":"2018"},{"key":"2025081410322586500_bib10","doi-asserted-by":"publisher","DOI":"10.1515\/9781503630406","volume-title":"Cyber Threats and Nuclear Weapons","author":"Lin","year":"2021"},{"key":"2025081410322586500_bib11","volume-title":"Task Force Report: Resilient Military Systems and the Advanced Cyber Threat","author":"Defense Science Board (USA)","year":"2012"},{"key":"2025081410322586500_bib12","volume-title":"Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities","author":"Government Accountability Office (USA)","year":"2018"},{"key":"2025081410322586500_bib13","volume-title":"Weapon Systems Cybersecurity: Guidance Would Help DOD Programs Better Communicate Requirements to Contractors","author":"Government Accountability Office (USA)","year":"2021"},{"key":"2025081410322586500_bib14","volume-title":"AEP-4853 Cyber Methodology for Land Systems","author":"NATO Standardization Office","year":"2023","edition":"Edition A"},{"key":"2025081410322586500_bib15","volume-title":"Implementing Article 36 Weapon Reviews in the Light of Increasing Autonomy in Weapon Systems","author":"Boulanin","year":"2015"},{"key":"2025081410322586500_bib16","volume-title":"Directive 3000.09: Autonomy in Weapon Systems","author":"Department of Defense (USA)","year":"2023"},{"key":"2025081410322586500_bib17","article-title":"ICRC position on autonomous Weapon Systems and Background paper","author":"International Committee of the Red Cross","year":"2021"},{"key":"2025081410322586500_bib18","article-title":"Fighting back against the drones","author":"Bollier","year":"2013","journal-title":"Al Jazeera"},{"key":"2025081410322586500_bib19","volume-title":"The Weaponization of Increasingly Autonomous Technologies: Autonomous Weapon Systems and Cyber Operations","author":"United Nations Institute for Disarmament Research","year":"2017"},{"key":"2025081410322586500_bib20","first-page":"77","article-title":"Autonomisten j\u00e4rjestelmien kyberturvallisuus","volume-title":"Puolustustutkimuksen Vuosikirja 2023","author":"Halunen","year":"2023"},{"key":"2025081410322586500_bib21","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s42400-018-0012-9","article-title":"A survey of practical adversarial example attacks","volume":"1","author":"Sun","year":"2018","journal-title":"Cybersecur"},{"key":"2025081410322586500_bib22","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2024.23350","article-title":"LiDAR spoofing meets the new-gen: capability improvements, broken assumptions, and new attack strategies","volume-title":"Proceedings of the 2024 Network and Distributed System Security Symposium","author":"Sato","year":"2024"},{"key":"2025081410322586500_bib23","doi-asserted-by":"crossref","DOI":"10.1126\/science.aau8383","article-title":"A turtle\u2014or a rifle? Hackers easily fool AIs into seeing the wrong thing","author":"Hutson","year":"2018","journal-title":"Science"},{"key":"2025081410322586500_bib24","volume-title":"Attacking and Deceiving Military AI Systems","author":"Kamrani","year":"2023"},{"key":"2025081410322586500_bib25","article-title":"U.S. was warned of predator drone hacking","author":"McCullagh","year":"2009","journal-title":"CBS News"},{"key":"2025081410322586500_bib26","article-title":"Insurgents hack U.S. drones","author":"Gorman","year":"2009","journal-title":"The Wall Street Journal"},{"key":"2025081410322586500_bib27","article-title":"Iraqi insurgents hacked predator drone feeds, U.S. Official indicates","author":"Mount","year":"2009","journal-title":"CNN"},{"key":"2025081410322586500_bib28","article-title":"Iran hijacked US drone, says Iranian engineer","author":"Peterson","year":"2011","journal-title":"Christian Science Monitor"},{"key":"2025081410322586500_bib29","article-title":"Iran broadcasts footage \u2018extracted from CIA spy drone\u2019","author":"Dehghan","year":"2013","journal-title":"The Guardian"},{"key":"2025081410322586500_bib30","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","article-title":"Unmanned aircraft capture and control via GPS spoofing","volume":"31","author":"Kerns","year":"2014","journal-title":"J Field Rob"},{"key":"2025081410322586500_bib31","article-title":"GPS circle spoofing and electronic attacks","author":"Katoch","year":"2021","journal-title":"SP\u2019s MAI"},{"key":"2025081410322586500_bib32","article-title":"Hackerangriffe auf deutsche \u2018Patriot\u2019-flugabwehrsysteme im t\u00fcrkisch-syrischen Grenzgebiet: \u2018Unerkl\u00e4rliche Befehle\u2019 ausgef\u00fchrt","year":"2015","journal-title":"Beh\u00f6rden Spiegel"},{"key":"2025081410322586500_bib33","article-title":"Bundeswehr: hackerattacke auf Patriot-raketenstation?","author":"Hegmann","year":"2015","journal-title":"Welt"},{"key":"2025081410322586500_bib34","article-title":"Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies","author":"Nakashima","year":"2013","journal-title":"The Washington Post"},{"key":"2025081410322586500_bib35","article-title":"German missiles \u2018hacked by foreign source\u2019","author":"Gaffey","year":"2015","journal-title":"Newsweek"},{"key":"2025081410322586500_bib36","volume-title":"Protocol against the Illicit Manufacturing of and Trafficking in Firearms, Their Parts and Components and Ammunition, Supplementing the United Nations Convention against Transnational Organized Crime","year":"2001"},{"key":"2025081410322586500_bib37","volume-title":"Programme of Action to Prevent,\u00a0Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects","year":"2001"},{"key":"2025081410322586500_bib38","volume-title":"Computer Security for Nuclear Security: Implementing Guide","author":"International Atomic Energy Agency","year":"2021"},{"key":"2025081410322586500_bib39","volume-title":"Computer Security Techniques for Nuclear Facilities: Technical Guidance","author":"International Atomic Energy Agency","year":"2021"},{"key":"2025081410322586500_bib40","volume-title":"Convention on the Physical Protection of Nuclear Material (CPPNM) and Its Amendment","year":"1979"},{"key":"2025081410322586500_bib41","volume-title":"Report of the 2017 Group of Governmental Experts on Lethal Autonomous Weapons Systems (LAWS)","year":"2017"},{"key":"2025081410322586500_bib42","volume-title":"Report of the 2018 Session of the Group of Governmental Experts on Emerging Technologies in the Area of Lethal Autonomous Weapons Systems","year":"2018"},{"key":"2025081410322586500_bib43","volume-title":"Report of the 2019 Session of the Group of Governmental Experts on Emerging Technologies in the Area of Lethal Autonomous Weapons Systems","year":"2019"},{"key":"2025081410322586500_bib44","volume-title":"Operationalizing the Guiding Principles: A Roadmap for the GGE on LAWS","author":"Brazil","year":"2020"},{"key":"2025081410322586500_bib45","volume-title":"Outline for a Normative and Operational Framework on Emerging Technologies in the Area of LAWS","author":"France, Germany","year":"2021"},{"key":"2025081410322586500_bib46","volume-title":"Joint Working Paper","author":"Argentina, Costa Rica, Ecuador","year":"2021"},{"key":"2025081410322586500_bib47","volume-title":"Roadmap Towards a New Protocol on Autonomous Weapons Systems","author":"Argentina, Costa Rica, Guatemala","year":"2022"},{"key":"2025081410322586500_bib48","volume-title":"Compilation of Replies Received to the Chair\u2019s Guiding Questions","author":"Chairperson (GGE LAWS)","year":"2024"},{"key":"2025081410322586500_bib49","volume-title":"Draft Protocol VI","author":"Argentina, Costa Rica, Ecuador","year":"2022"},{"key":"2025081410322586500_bib50","volume-title":"Draft Protocol on Autonomous Weapon Systems (Draft Protocol VI)","author":"Argentina, Ecuador, El Salvador","year":"2023"},{"key":"2025081410322586500_bib51","volume-title":"Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I)","year":"1977"},{"key":"2025081410322586500_bib52","doi-asserted-by":"crossref","DOI":"10.1017\/9781316822524","volume-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"Schmitt","year":"2017"},{"key":"2025081410322586500_bib53","volume-title":"Vienna Convention on the Law of Treaties","year":"1969"},{"key":"2025081410322586500_bib54","first-page":"613","article-title":"Protocol I\u2014Article 51\u2014Protection of the civilian population","volume-title":"Commentary on the Additional Protocols to the Geneva Conventions","author":"Pilloud","year":"1987"},{"key":"2025081410322586500_bib55","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/EE.1946.6441785","article-title":"V-2 range control technique","volume":"65","author":"Moore","year":"1946","journal-title":"Electr Eng"},{"key":"2025081410322586500_bib56","article-title":"Battle of the Remagen Bridgehead","author":"US Army Corps of Engineers Headquarters","year":"2020"},{"key":"2025081410322586500_bib57","article-title":"Technical considerations regarding performance enhancements for unguided multiple launch rocket system","volume-title":"Proceedings of International Scientific Conference \u2018Defense Technologies\u2019 DefTech 2023","author":"Zvincu","year":"2023"},{"key":"2025081410322586500_bib58","first-page":"100","article-title":"The use of explosive weapons in densely populated areas and the prohibition of indiscriminate attacks","volume-title":"Conduct of Hostilities: The Practice, the Law and the Future\u201437th Round Table on Current Issues of International Humanitarian Law (Sanremo, 4th-6th September 2014)","author":"Gisel","year":"2015"},{"key":"2025081410322586500_bib59","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1163\/18781527-00601007","article-title":"The crime of indiscriminate attack and unlawful conventional weapons: the legacy of the ICTY jurisprudence","volume":"6","author":"Ponti","year":"2015","journal-title":"J Int Humanit Legal Stud"},{"key":"2025081410322586500_bib60","doi-asserted-by":"publisher","DOI":"10.1017\/9781009090001","volume-title":"The Legality and Accountability of Autonomous Weapon Systems: A Humanitarian Law Perspective","author":"Seixas-Nunes","year":"2022"},{"key":"2025081410322586500_bib61","article-title":"Did the U.S. use new joint air-to-ground missile to kill Iran\u2019s General Soleimani?","author":"Roblin","year":"2020","journal-title":"Forbes"},{"key":"2025081410322586500_bib62","first-page":"677","article-title":"Protocol I\u2014Article 57\u2014Precautions in attack","volume-title":"Commentary on the Additional Protocols to the Geneva Conventions","author":"Pilloud","year":"1987"},{"key":"2025081410322586500_bib63","doi-asserted-by":"publisher","DOI":"10.1093\/law\/9780198791393.001.0001","volume-title":"Practitioners\u2019 Guide to Human Rights Law in Armed Conflict","author":"Murray","year":"2016"},{"key":"2025081410322586500_bib64","volume-title":"International Covenant on Civil and Political Rights","year":"1966"},{"key":"2025081410322586500_bib65","volume-title":"[European] Convention for the Protection of Human Rights and Fundamental Freedoms","year":"1950"},{"key":"2025081410322586500_bib66","volume-title":"Declaration Renouncing the Use, in Time of War, of Explosive Projectiles under 400 Grammes Weight","year":"1868"},{"key":"2025081410322586500_bib67","article-title":"Legality of the threat or use of nuclear weapons (Advisory Opinion)","year":"1996"},{"key":"2025081410322586500_bib68","article-title":"Centre for Legal Resources on behalf of Valentin Campeanu v. Romania","year":"2014"},{"key":"2025081410322586500_bib69","volume-title":"Guide on Article 2 of the European Convention on Human Rights: Right to Life","author":"Registry of the European Court of Human Rights","year":"2022"},{"key":"2025081410322586500_bib70","doi-asserted-by":"publisher","DOI":"10.1017\/9781108894784","volume-title":"Due Diligence Obligations in International Human Rights Law","author":"Monnheimer","year":"2021"},{"key":"2025081410322586500_bib71","article-title":"McCann and Others v. United Kingdom","year":"1995"},{"key":"2025081410322586500_bib72","article-title":"Bubbins v. United Kingdom","year":"2005"},{"key":"2025081410322586500_bib73","article-title":"Huohvanainen v. Finland","year":"2007"},{"key":"2025081410322586500_bib74","article-title":"Osman v. United Kingdom","year":"1998"},{"key":"2025081410322586500_bib75","article-title":"Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory (Advisory Opinion)","year":"2004"},{"key":"2025081410322586500_bib76","article-title":"Al-Skeini and Others v. United Kingdom","year":"2011"},{"key":"2025081410322586500_bib77","first-page":"12","article-title":"Data privacy rights: the same in war and peace","volume-title":"The Rights to Privacy and Data Protection in Times of Armed Conflict","author":"O\u2019Connell","year":"2022"},{"key":"2025081410322586500_bib78","article-title":"Corfu Channel (UK v. Albania) (Merits)","year":"1949"},{"key":"2025081410322586500_bib79","volume-title":"Italian Position Paper on \u2018International Law and Cyberspace\u2019","author":"Italy","year":"2021"},{"key":"2025081410322586500_bib80","volume-title":"The Republic of Poland\u2019s Position on the Application of International Law in Cyberspace","author":"Poland","year":"2022"},{"key":"2025081410322586500_bib81","volume-title":"Position Paper of the Republic of Austria: Cyber Activities and International Law","author":"Austria","year":"2024"},{"key":"2025081410322586500_bib82","volume-title":"Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security","year":"2015"},{"key":"2025081410322586500_bib83","volume-title":"Report of the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security","year":"2021"},{"key":"2025081410322586500_bib84","volume-title":"A Tale of Two Draft Resolutions: A Report on the Polarising International Law Discussions at the 2023 OEWG Substantive Sessions","author":"Kajander","year":"2023"},{"key":"2025081410322586500_bib85","article-title":"Cyber due diligence","author":"Oxford Institute for Law, Ethics and Armed Conflict"},{"key":"2025081410322586500_bib86","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1093\/ejil\/chab056","article-title":"\u201cCyber due diligence\u201d: a patchwork of protective obligations in international law","volume":"32","author":"Coco","year":"2021","journal-title":"Eur J Int Law"},{"key":"2025081410322586500_bib87","volume-title":"Articles on Responsibility of States for Internationally Wrongful Acts","author":"International Law Commission","year":"2001"},{"key":"2025081410322586500_bib88","volume-title":"National Cyber Security Strategy 2019\u20132024","author":"Government of Ireland","year":"2019"},{"key":"2025081410322586500_bib89","volume-title":"National Cybersecurity Strategy 2022\u20132026","author":"National Cybersecurity Agency (Italy)","year":"2022"},{"key":"2025081410322586500_bib90","volume-title":"Cyber Security Strategy of the Ministry of Defence of Georgia 2021\u20132024","author":"Ministry of Defence of Georgia","year":"2021"},{"key":"2025081410322586500_bib91","first-page":"421","article-title":"Protocol I\u2014Article 36\u2014New weapons","volume-title":"Commentary on the Additional Protocols to the Geneva Conventions","author":"de\u00a0Preux","year":"1987"},{"key":"2025081410322586500_bib92","volume-title":"Non-Paper by the GGE Chair","author":"Chairperson (GGE LAWS)","year":"2020"},{"key":"2025081410322586500_bib93","volume-title":"Commentary on the \u2018Guiding Principles\u2019 of the CCW GGE on \u2018Lethal Autonomous Weapons Systems\u2019","author":"International Committee of the Red Cross","year":"2020"},{"key":"2025081410322586500_bib94","volume-title":"National Commentary by the Kingdom of the Netherlands Regarding the National Interpretation and Implementation of the Guiding Principles Affirmed by the Group of Governmental Experts on Emerging Technologies in the Area of Lethal Autonomous Weapons System","author":"Netherlands","year":"2020"},{"key":"2025081410322586500_bib95","volume-title":"Operationalization of the 11 Guiding Principles at National Level","author":"France","year":"2020"},{"key":"2025081410322586500_bib96","volume-title":"Considerations on the Operationalization of the Eleven Guiding Principles Adopted by the Group of Governmental Experts","author":"Israel","year":"2020"},{"key":"2025081410322586500_bib97","volume-title":"Commentaries by Portugal on Operationalizing all Eleven Guiding Principles at a National Level","author":"Portugal","year":"2020"},{"key":"2025081410322586500_bib98","volume-title":"Commonalities in National Commentaries on Guiding Principles","author":"Chairperson (GGE LAWS)","year":"2020"},{"key":"2025081410322586500_bib99","volume-title":"Lethal Autonomous Weapons Systems: National Commentary","author":"Australia","year":"2020"},{"key":"2025081410322586500_bib100","volume-title":"Commentaries on National Implementation of the Guiding Principles on LAWS","author":"Spain","year":"2020"},{"key":"2025081410322586500_bib101","volume-title":"Switzerland\u2019s Commentary on Operationalizing the Guiding Principles at a National Level","author":"Switzerland","year":"2020"},{"key":"2025081410322586500_bib102","volume-title":"Commentary on Operationalizing all Eleven Guiding Principles at a National Level","author":"Germany","year":"2020"},{"key":"2025081410322586500_bib103","volume-title":"Commentary on the Operationalization of the Guiding Principles Affirmed by the Group of Governmental Experts on Emerging Technologies in the Area of Lethal Autonomous Weapons Systems at National Level","author":"Japan","year":"2020"},{"key":"2025081410322586500_bib104","volume-title":"Directive 3000.09: Autonomy in Weapon Systems","author":"Department of Defense (USA)","year":"2012"},{"key":"2025081410322586500_bib105","volume-title":"Directive 3000.09: Autonomy in Weapon Systems","author":"Department of Defense (USA)","year":"2017"},{"key":"2025081410322586500_bib106","volume-title":"National Implementation of the Guiding Principles on Emerging Technologies in the Area of Lethal Autonomous Weapons Systems","author":"Russian Federation","year":"2020"},{"key":"2025081410322586500_bib107","volume-title":"Concept of Activities of the Armed Forces of the Russian Federation in the Development and Use of Weapons Systems with Artificial Intelligence Technologies","author":"Russian Federation","year":"2023"},{"key":"2025081410322586500_bib108","first-page":"11739","article-title":"Executive Order 13636: Improving critical infrastructure cybersecurity","volume":"78","author":"The President (USA)","year":"2013","journal-title":"Federal Register"},{"key":"2025081410322586500_bib109","volume-title":"Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies","author":"Boulanin","year":"2017"},{"key":"2025081410322586500_bib110","doi-asserted-by":"publisher","DOI":"10.1163\/9789004707047","volume-title":"A Functional Approach to the Legal Review of Autonomous Weapon Systems","author":"Copeland","year":"2025"},{"key":"2025081410322586500_bib111","volume-title":"Good Practices in the Legal Review of Weapons, Means and Methods of Warfare","author":"Asia-Pacific Institute for Law and Security","year":"2025"},{"key":"2025081410322586500_bib112","doi-asserted-by":"publisher","DOI":"10.14264\/c41c6fb","volume-title":"Advancing the Legal Review of Autonomous Weapon Systems","author":"Wolf","year":"2024"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf017\/64045185\/tyaf017.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf017\/64045185\/tyaf017.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T14:32:47Z","timestamp":1755181967000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf017\/8234438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":112,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf017","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf017"}}