{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:05:44Z","timestamp":1751429144036,"version":"3.41.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,13]]},"DOI":"10.1109\/icmcis64378.2025.11047950","type":"proceedings-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T17:36:43Z","timestamp":1751305003000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Characteristics of the Military Domain and their Impact on Military AI Applications"],"prefix":"10.1109","author":[{"given":"Antoine","family":"Smallegange","sequence":"first","affiliation":[{"name":"Defense Safety and Security TNO,The Hague,The Netherlands"}]},{"given":"Jurriaan","family":"Van Diggelen","sequence":"additional","affiliation":[{"name":"Defense Safety and Security TNO,Soesterberg,The Netherlands"}]},{"given":"Jonathan","family":"Kwik","sequence":"additional","affiliation":[{"name":"Asser Institute,The Hague,The Netherlands"}]}],"member":"263","reference":[{"article-title":"Who first originated the term VUCA (Volatility, Uncertainty, Complexity and Ambiguity)?","volume-title":"USAHEC Ask Us a Question. The United States Army War College","year":"2018","key":"ref1"},{"key":"ref2","article-title":"Collaboration within the JIMP (Joint, Interagency, Multinational, Public) Environment","author":"Thomson","year":"2010","journal-title":"Defence Research and Development Canada & DEPARTMENT OF NATIONAL DEFENCE, Defence Research and Development Canada (CR 2010\u2013136"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/s1816383124000067"},{"key":"ref5","article-title":"Mistakes","author":"Hathaway","year":"2024","journal-title":"War\u2019"},{"key":"ref6","article-title":"Transcending weapon systems: the ethical challenges of AI in military decision support systems","volume-title":"Humanitarian Law & Policy","author":"Klaus","year":"2025"},{"key":"ref7","article-title":"Military drones in Europe: Ensuring transparency and accountability","volume-title":"Chatham House","author":"Dorsey","year":"2025"},{"article-title":"Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy","volume-title":"United States Department of State","year":"2024","key":"ref8"},{"key":"ref9","article-title":"Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions","author":"Heyns","year":"2013","journal-title":"United Nations, A\/HRC\/23\/47"},{"key":"ref10","first-page":"509","article-title":"Legal Reviews of War Algorithms","volume":"97","author":"Vestner","year":"2021","journal-title":"International Law Studies"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-631-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9494-0"},{"key":"ref13","first-page":"645","article-title":"In This Era of Smart Weapons, Is a State under an International Legal Obligation to Use Precision-Guided Technology in Armed Conflict","volume":"18","author":"Puckett","year":"2004","journal-title":"Emory International Law Review"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-75434-0_4"},{"issue":"2","key":"ref15","first-page":"43","article-title":"MOTAKO and MOTIV: the German digitalization of land based operations","volume":"47","author":"Sierksma","year":"2018","journal-title":"Intercom"},{"volume-title":"Bias, explainability, transparency, and trust for AI-enabled military systems","author":"Pace","key":"ref16","doi-asserted-by":"crossref","DOI":"10.1117\/12.3012949"},{"key":"ref17","article-title":"Iterative Assessment for Military AI Systems","volume-title":"Designing International Law and Ethics into Military Artificial Intelligence","author":"Kwik","year":"2025"},{"volume-title":"Robustness of machine learning systems","year":"2023","author":"Brink","key":"ref18"},{"volume-title":"INHR: Levelling the International Playing Field for You. (n.d.)","key":"ref19","article-title":"Special TEVV vital for AI-Military"},{"volume-title":"Summary of the NATO Artificial intelligence Strategy. NATO","key":"ref20"}],"event":{"name":"2025 International Conference on Military Communication and Information Systems (ICMCIS)","start":{"date-parts":[[2025,5,13]]},"location":"Oerias, Portugal","end":{"date-parts":[[2025,5,14]]}},"container-title":["2025 International Conference on Military Communication and Information Systems (ICMCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11047255\/11047555\/11047950.pdf?arnumber=11047950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T05:41:56Z","timestamp":1751348516000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11047950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icmcis64378.2025.11047950","relation":{},"subject":[],"published":{"date-parts":[[2025,5,13]]}}}