{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:42:14Z","timestamp":1775263334366,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/milcom47813.2019.9021038","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:00:21Z","timestamp":1583506821000},"page":"1-7","source":"Crossref","is-referenced-by-count":19,"title":["When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense"],"prefix":"10.1109","author":[{"given":"Paul","family":"Theron","sequence":"first","affiliation":[]},{"given":"Alxander","family":"Kott","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Collaborative Operations in Denied Environment (CODE)","author":"wierzbanowski","year":"0","journal-title":"DARPA"},{"key":"ref11","article-title":"Gremlins","author":"wierzbanowski","year":"0","journal-title":"DARPA"},{"key":"ref12","article-title":"Syst&#x00E8;me de combat a&#x00E9;rien du futur (SCAF)","year":"2019","journal-title":"French MoD"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"ref14","article-title":"Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture, Release 2.0","author":"kott","year":"2019","journal-title":"ARMY RESEARCH LAB ADELPHI MD"},{"key":"ref15","author":"russell","year":"2010","journal-title":"Artificial Intelligence A Modem Approach"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916395"},{"key":"ref17","first-page":"7","article-title":"Machine learning for Autonomous Cyber Defense","volume":"22","author":"ridley","year":"2018","journal-title":"The Next Wave"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2704_2"},{"key":"ref19","author":"blakely","year":"2017","journal-title":"Decision flow-based Agent Action Planning Prague"},{"key":"ref4","article-title":"Autonomous military drones: no longer science fiction","author":"dyndal","year":"2017","journal-title":"NATO Review magazine"},{"key":"ref27","article-title":"Big-Data Architecture for Cyber Attack Graphs Representing Security Relationships in NoSQL Graph Databases","author":"noel","year":"2015","journal-title":"HST 2015 IEEE Symposium on Technologies for Homeland Security"},{"key":"ref3","article-title":"Autonomous Weapon Systems: The Military's Smartest Toys?","author":"haas","year":"2014","journal-title":"National Interest"},{"key":"ref6","article-title":"Background on Lethal Autonomous Weapons Systems in the CCW","year":"2013","journal-title":"UNOG"},{"key":"ref5","article-title":"Understanding China's AI Strategy. Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security","author":"allen","year":"2019","journal-title":"Center for A New American Security"},{"key":"ref8","article-title":"DARPA wants robots that humans will trust","author":"atherton","year":"2019","journal-title":"C4ISRNet"},{"key":"ref7","article-title":"European Parliament resolution of 12 September 2018 on autonomous weapon systems (2018\/2752(RSP))","year":"2018","journal-title":"European Parliament"},{"key":"ref2","year":"2013","journal-title":"Report of the Special Rapporteur on extrajudicial summary or arbitrary executions Christof Heyns"},{"key":"ref9","article-title":"U.S. Navy Employment Options for Unmanned Surface Vehicles (USVs)","author":"savitz","year":"2013","journal-title":"Rand Corporation"},{"key":"ref1","article-title":"Bonware to the Rescue: the Future Autonomous Cyber Defense Agents","author":"kott","year":"2018","journal-title":"Conference on Applied Machine Learning for Information Security"},{"key":"ref20","author":"leblanc","year":"2017","journal-title":"A Program for effective and secure operations by Autonomous Agents and Human Operators in communications constrained tactical environments Prague NATO IST-152 workshop"},{"key":"ref22","article-title":"A Connectionist Implementation of the ACT-R Production System","author":"lebiere","year":"1993","journal-title":"Institute of Cognitive Science University of Colorado-Boulder"},{"key":"ref21","author":"theron","year":"2014","journal-title":"Lieutenant A and the rottweilers A Pheno-Cognitive Analysis of a fire-fighter's experience of a critical incident and peritraumatic resilience"},{"key":"ref24","article-title":"Naturalistic Decision Making. Perspectives on Decision Errors","author":"lipshitz","year":"1997","journal-title":"Naturalistic Decision Making"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0454-2.ch002"},{"key":"ref26","article-title":"Advanced cyber attack modeling, analysis, and visualization","author":"jajodia","year":"2010","journal-title":"George Mason University"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1858"}],"event":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","location":"Norfolk, VA, USA","start":{"date-parts":[[2019,11,12]]},"end":{"date-parts":[[2019,11,14]]}},"container-title":["MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8993674\/9020712\/09021038.pdf?arnumber=9021038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:47:45Z","timestamp":1658094465000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9021038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom47813.2019.9021038","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}