{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:01:42Z","timestamp":1773248502471,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/milcom64451.2025.11309858","type":"proceedings-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:35:33Z","timestamp":1767292533000},"page":"1377-1382","source":"Crossref","is-referenced-by-count":1,"title":["Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments"],"prefix":"10.1109","author":[{"given":"Sai Sree Laya","family":"Chukkapalli","sequence":"first","affiliation":[{"name":"IBM Research,NY,USA"}]},{"given":"David","family":"Ledbetter","sequence":"additional","affiliation":[{"name":"University of Maryland,MD,USA"}]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Maryland,MD,USA"}]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[{"name":"University of Maryland,MD,USA"}]},{"given":"Jade","family":"Freeman","sequence":"additional","affiliation":[{"name":"DEVCOM Army Research Lab,MD,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3288221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135988"},{"key":"ref3","article-title":"The future battlefield is digital","author":"Booz","year":"2025"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00068"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12245030"},{"key":"ref6","article-title":"Internet of battlefield things ontology","author":"Chukkapalli","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.2618106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-023-01881-8"},{"key":"ref9","first-page":"4223","article-title":"HAWatcher: Semantics-aware anomaly detection for appified smart homes","volume-title":"30th USENIX Security Symposium","author":"Fu"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225819"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3040224"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2018.2876611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3239944"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3194813"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093797"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25010-6_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3532194"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/64.363270"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3250756"},{"key":"ref23","article-title":"Uco: A unified cybersecurity ontology","volume-title":"Workshops at the thirtieth AAAI conference on artificial intelligence","author":"Syed"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ADICS58448.2024.10533619"},{"key":"ref25","article-title":"Sparql 1.1 overview","volume-title":"Technical report","year":"2013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3387328"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION43075.2019.9011397"}],"event":{"name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2025,10,6]]},"end":{"date-parts":[[2025,10,10]]}},"container-title":["MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11309822\/11309347\/11309858.pdf?arnumber=11309858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T06:01:59Z","timestamp":1767333719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11309858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/milcom64451.2025.11309858","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}