{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:27Z","timestamp":1750220847943,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T00:00:00Z","timestamp":1571270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,17]]},"DOI":"10.1145\/3358331.3358376","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Methodological Approach to Weaponizing Machine Learning"],"prefix":"10.1145","author":[{"given":"Chuck","family":"Easttom","sequence":"first","affiliation":[{"name":"Capitol Technology University, Laurel, Maryland USA"}]}],"member":"320","published-online":{"date-parts":[[2019,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE 6th International Conference onCyber Conflict (CyCon)","author":"Cobb S.","year":"2015","unstructured":"S. Cobb & A. Lee . \"Malware is called malicious for a reason: The risks of weaponizing code \". IEEE 6th International Conference onCyber Conflict (CyCon) , 2015 . S. Cobb & A. Lee. \"Malware is called malicious for a reason: The risks of weaponizing code\". IEEE 6th International Conference onCyber Conflict (CyCon), 2015."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Connell & S. Vogler. \"Russia's Approach to Cyber Warfare.\" Center for Naval Analyses Arlington United States 2017.  M. Connell & S. Vogler. \"Russia's Approach to Cyber Warfare.\" Center for Naval Analyses Arlington United States 2017."},{"volume-title":"Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR","year":"2016","key":"e_1_3_2_1_3_1","unstructured":"Khan, Rafiullah, \" Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR . 2016 . Khan, Rafiullah, et al. \"Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR. 2016."},{"key":"e_1_3_2_1_4_1","unstructured":"Gronberg. \"Rules of Engagement for Cyber Warfare Don't Exist.\" Government Technology. 2016 http:\/\/www.govtech.com\/security\/Rules-of-Engagement-for-Cyber-Warfare-Dont-Exist.html.  Gronberg. \"Rules of Engagement for Cyber Warfare Don't Exist.\" Government Technology. 2016 http:\/\/www.govtech.com\/security\/Rules-of-Engagement-for-Cyber-Warfare-Dont-Exist.html."},{"key":"e_1_3_2_1_5_1","volume-title":"Military: A Canadian Perspective. AI Magazine, 40(1).","author":"Thorpe S.","year":"2019","unstructured":"Wasilow, S. and Thorpe , J. B. , 2019 . Artificial Intelligence , Robotics, Ethics , and the Military: A Canadian Perspective. AI Magazine, 40(1). Wasilow, S. and Thorpe, J.B., 2019. Artificial Intelligence, Robotics, Ethics, and the Military: A Canadian Perspective. AI Magazine, 40(1)."},{"key":"e_1_3_2_1_6_1","unstructured":"Vallejos E.P. Wortham R. and Miakinkov E. 2017 June. When AI goes to war: youth opinion fictional reality and autonomous weapons. In CEPE\/ETHICOMP 2017.  Vallejos E.P. Wortham R. and Miakinkov E. 2017 June. When AI goes to war: youth opinion fictional reality and autonomous weapons. In CEPE\/ETHICOMP 2017."},{"volume-title":"2018 AAAI Spring Symposium Series.","author":"Cohen K.","key":"e_1_3_2_1_7_1","unstructured":"Wang, Y., Friyia, D., Liu, K. and Cohen , R ., 2018, March. An Architecture for a Military AI System with Ethical Rules . In 2018 AAAI Spring Symposium Series. Wang, Y., Friyia, D., Liu, K. and Cohen, R., 2018, March. An Architecture for a Military AI System with Ethical Rules. In 2018 AAAI Spring Symposium Series."},{"key":"e_1_3_2_1_8_1","volume-title":"ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited","author":"Easttom C.","year":"2018","unstructured":"C. Easttom . \" The Role of Weaponized Malware in Cyber Conflict and Espionage.\" ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited , 2018 . C. Easttom. \"The Role of Weaponized Malware in Cyber Conflict and Espionage.\" ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited, 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon. Broadway books","author":"Zetter K.","year":"2014","unstructured":"K. Zetter . Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon. Broadway books , 2014 . K. Zetter. Countdown to Zero Day: Stuxnet and the launch of the world's first digital weapon. Broadway books, 2014."},{"key":"e_1_3_2_1_10_1","first-page":"47","article-title":"Stuxnet and its hidden lessons on the ethics of cyberweapons","author":"Singer P.","year":"2015","unstructured":"P. Singer . \" Stuxnet and its hidden lessons on the ethics of cyberweapons .\" Case W. Res. J. Int'l L. 47 , 2015 . P. Singer. \"Stuxnet and its hidden lessons on the ethics of cyberweapons.\" Case W. Res. J. Int'l L. 47, 2015.","journal-title":"Case W. Res. J. Int'l L."},{"issue":"2","key":"e_1_3_2_1_11_1","article-title":"An Examination of the Operational Requirements of Weaponized Malware","volume":"17","author":"Easttom C.","year":"2018","unstructured":"C. Easttom \" An Examination of the Operational Requirements of Weaponized Malware \". Journal of Information Warfare 17 ( 2 ), 2018 . C. Easttom \"An Examination of the Operational Requirements of Weaponized Malware\". Journal of Information Warfare 17 (2), 2018.","journal-title":"Journal of Information Warfare"},{"key":"e_1_3_2_1_12_1","volume-title":"Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR","author":"Khan R.","year":"2016","unstructured":"R. Khan , \" Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR . 2016 . R. Khan, et al. \"Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid.\" ICS-CSR. 2016."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2016.0116"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2013.784468"},{"volume-title":"2013 IEEE International Conference on (pp. 73--75)","author":"Dehlawi Z.","key":"e_1_3_2_1_15_1","unstructured":"Z. Dehlawi & N. Abokhodair \" Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident.\" In Intelligence and Security Informatics (ISI) , 2013 IEEE International Conference on (pp. 73--75) . IEEE. Z. Dehlawi & N. Abokhodair \"Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident.\" In Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on (pp. 73--75). IEEE."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.atmosres.2014.10.016"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_3_2_1_20_1","volume-title":"A survey.\" arXiv preprint arXiv:1701.07179","author":"Sahoo D.","year":"2017","unstructured":"D. Sahoo , L. Chenghao , & C. Steven . \" Malicious URL detection using machine learning : A survey.\" arXiv preprint arXiv:1701.07179 , 2017 . D. Sahoo, L. Chenghao, & C. Steven. \"Malicious URL detection using machine learning: A survey.\" arXiv preprint arXiv:1701.07179, 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"Adaptive cyber-security analytics.\" U.S. Patent No. 9,032,521","author":"Amini L.","year":"2015","unstructured":"L. Amini , \" Adaptive cyber-security analytics.\" U.S. Patent No. 9,032,521 . 12 May 2015 . L. Amini, et al. \"Adaptive cyber-security analytics.\" U.S. Patent No. 9,032,521. 12 May 2015."},{"key":"e_1_3_2_1_22_1","unstructured":"E. Nakashima.\"Obama moves to split cyberwarfare command from the NSA.\" The Washington Post (2016).  E. Nakashima.\"Obama moves to split cyberwarfare command from the NSA.\" The Washington Post (2016)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.007"},{"key":"e_1_3_2_1_24_1","volume-title":"Palgrave Macmillan","author":"Colarik A.","year":"2015","unstructured":"A. Colarik & L. Janczewski . \"Establishing cyber warfare doctrine.\" Current and Emerging Trends in Cyber Operations . Palgrave Macmillan , London , 2015 . 37--50. A. Colarik & L. Janczewski. \"Establishing cyber warfare doctrine.\" Current and Emerging Trends in Cyber Operations. Palgrave Macmillan, London, 2015. 37--50."},{"key":"e_1_3_2_1_25_1","volume-title":"Foundations of machine learning","author":"Mehryar M.","year":"2018","unstructured":"M. Mehryar , A. Rostamizadeh , & A. Talwalkar . Foundations of machine learning . MIT press , 2018 . M. Mehryar, A. Rostamizadeh, & A. Talwalkar. Foundations of machine learning. MIT press, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"37","author":"Hand D.","year":"2018","unstructured":"D. Hand . \" Evaluating Statistical and Machine Learning Supervised Classification Methods .\" Statistical Data Science ( 2018 ): 37 . D. Hand. \"Evaluating Statistical and Machine Learning Supervised Classification Methods.\" Statistical Data Science (2018): 37."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000102"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107298019","volume-title":"Understanding machine learning: From theory to algorithms","author":"Shalev-Shwartz S.","year":"2014","unstructured":"S. Shalev-Shwartz & D. Understanding machine learning: From theory to algorithms . Cambridge university press , 2014 . S. Shalev-Shwartz & D. Understanding machine learning: From theory to algorithms. Cambridge university press, 2014."},{"key":"e_1_3_2_1_29_1","volume-title":"International Scientific Conference\" Strategies XXI\".","volume":"2","author":"Tanu G.","year":"2018","unstructured":"G. Tanu . \" THE USE OF PATRIOT SURFACE-TO-AIR MISSILE SYSTEMS DURING THE MODERN MILITARY CONFLICTS.\" International Scientific Conference\" Strategies XXI\". Vol. 2 . \" Carol I\" National Defence University , 2018 . G. Tanu. \"THE USE OF PATRIOT SURFACE-TO-AIR MISSILE SYSTEMS DURING THE MODERN MILITARY CONFLICTS.\" International Scientific Conference\" Strategies XXI\". Vol. 2. \" Carol I\" National Defence University, 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"automated classification of malware samples.\" In Proceedings of the 22nd International Conference on World Wide Web (pp. 829--832). ACM","author":"Mohaisen A.","year":"2013","unstructured":"A. Mohaisen & O. Alrawi , \" Unveiling zeus : automated classification of malware samples.\" In Proceedings of the 22nd International Conference on World Wide Web (pp. 829--832). ACM . 2013 . A. Mohaisen & O. Alrawi, \"Unveiling zeus: automated classification of malware samples.\" In Proceedings of the 22nd International Conference on World Wide Web (pp. 829--832). ACM. 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2458581"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"J. Lalande & S. Wendzel \" Hiding privacy leaks in android applications using lowattention raising covert channels.\" In 2013 International Conference on Availability Reliability and Security (pp. 701--710). IEEE. 2013.  J. Lalande & S. Wendzel \" Hiding privacy leaks in android applications using lowattention raising covert channels.\" In 2013 International Conference on Availability Reliability and Security (pp. 701--710). IEEE. 2013.","DOI":"10.1109\/ARES.2013.92"},{"key":"e_1_3_2_1_33_1","volume-title":"Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 137--143)","author":"Raveendranath R.","year":"2014","unstructured":"R. Raveendranath , V. Rajamani , A. Babu , & S. Datta , \" Android malware attacks and countermeasures : Current and future directions.\" In 2014 International Conference on Control , Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 137--143) . IEEE. 2014 . R. Raveendranath, V. Rajamani, A. Babu, & S. Datta, \"Android malware attacks and countermeasures: Current and future directions.\" In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 137--143). IEEE. 2014."}],"event":{"name":"AIAM 2019: 2019 International Conference on Artificial Intelligence and Advanced Manufacturing","acronym":"AIAM 2019","location":"Dublin Ireland"},"container-title":["Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358331.3358376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:08Z","timestamp":1750202588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,17]]},"references-count":33,"alternative-id":["10.1145\/3358331.3358376","10.1145\/3358331"],"URL":"https:\/\/doi.org\/10.1145\/3358331.3358376","relation":{},"subject":[],"published":{"date-parts":[[2019,10,17]]},"assertion":[{"value":"2019-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}