{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T06:03:09Z","timestamp":1767333789589,"version":"3.48.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/milcom64451.2025.11310023","type":"proceedings-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:35:33Z","timestamp":1767292533000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["CONQUEST: CONtext-Aware QUantum-Inspired Intelligence for Espying AI-aided Cyberworm Security Threats in Military Networks"],"prefix":"10.1109","author":[{"given":"Simeon Okechukwu","family":"Ajakwe","sequence":"first","affiliation":[{"name":"Kumoh National Institute of Technology,Department of IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Ihunanya","family":"Udodiri Ajakwe","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,Department of IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Victor Ikenna","family":"Kanu","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,Department of IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Jae","family":"Min Lee","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,Department of IT Convergence Engineering,Gumi,South Korea"}]},{"given":"Dong-Seong","family":"Kim","sequence":"additional","affiliation":[{"name":"Kumoh National Institute of Technology,Department of IT Convergence Engineering,Gumi,South Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"The evolving threat of ai-powered cyber worms","volume-title":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","author":"Khan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC59683.2024.10837413"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.31219\/osf.io\/nvg65","article-title":"Ransomware detection through dynamic behavior-based profiling using real-time crypto-anomaly filtering","author":"Landril","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3519633"},{"article-title":"Aci iot network traffic dataset 2023","year":"2023","author":"Bastian","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SMC54092.2024.10831208"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SETCOM64758.2025.10932334"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00821-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM55135.2022.10017532"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-73110-5_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104920"},{"key":"ref12","first-page":"141","article-title":"Bridging the ai divide: The evolving arms race between ai-driven cyber attacks and ai-powered cybersecurity defenses","volume-title":"International Conference on Machine Intelligence & Security for Smart Cities (TRUST) Proceedings","volume":"1","author":"Waizel"}],"event":{"name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2025,10,6]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2025,10,10]]}},"container-title":["MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11309822\/11309347\/11310023.pdf?arnumber=11310023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T06:00:46Z","timestamp":1767333646000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11310023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/milcom64451.2025.11310023","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}