{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T06:12:25Z","timestamp":1778220745988,"version":"3.51.4"},"reference-count":185,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cyber Security Research Centre Limited"},{"name":"Australian Government\u2019s Cooperative Research Centres Programme"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. The critical civil and military domains include, but are not limited to, battlefield, healthcare, transportation, and rescue missions. Given the sensitive nature and modernization of tactical domains, the security of C3I systems has recently become a critical concern. This is because cyber-attacks on C3I systems have catastrophic consequences including loss of human lives. Despite the increasing number of cyber-attacks on C3I systems and growing concerns about C3I systems\u2019 security, there is a paucity of a comprehensive review to systematize the body of knowledge on the security of C3I systems. Therefore, in this article, we have gathered, analyzed, and synthesized the body of knowledge on the security of C3I systems. We have identified and reported security vulnerabilities, attack vectors, and countermeasures\/defenses for C3I systems. In particular, this article has enabled us to (i) propose a taxonomy for security vulnerabilities, attack vectors, and countermeasures; (ii) interrelate attack vectors with security vulnerabilities and countermeasures; and (iii) propose future research directions for advancing the state-of-the-art on the security of C3I systems. We believe that our findings will serve as a guideline for practitioners and researchers to advance the state-of-the-practice and state-of-the-art on the security of C3I systems.<\/jats:p>","DOI":"10.1145\/3558001","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T12:04:48Z","timestamp":1660737888000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["A Review on C3I Systems\u2019 Security: Vulnerabilities, Attacks, and Countermeasures"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-7587","authenticated-orcid":false,"given":"Hussain","family":"Ahmad","sequence":"first","affiliation":[{"name":"CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide, CSCRC - Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9010-1056","authenticated-orcid":false,"given":"Isuru","family":"Dharmadasa","sequence":"additional","affiliation":[{"name":"CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7678-1603","authenticated-orcid":false,"given":"Faheem","family":"Ullah","sequence":"additional","affiliation":[{"name":"CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9696-3626","authenticated-orcid":false,"given":"Muhammad Ali","family":"Babar","sequence":"additional","affiliation":[{"name":"CREST - The Centre for Research on Engineering Software Technologies, The University of Adelaide, CSCRC - Cyber Security Cooperative Research Centre, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,1,16]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2016. M2: Insecure Data Storage  \\(\\vert\\)  OWASP. Open Web Application Security Project (OWASP). Retrieved from https:\/\/bit.ly\/3p4eCi4."},{"key":"e_1_3_2_3_2","unstructured":"2016. OWASP TOP 10 2013: Unvalidated Redirects and Forwards - Detectify Blog. Detectify. Retrieved from https:\/\/bit.ly\/3wOY3vi."},{"key":"e_1_3_2_4_2","unstructured":"2017. DATA BREACH UNDER GDPR | How threat intelligence can reduce your liabilities. Outpost24. Retrieved from https:\/\/bit.ly\/3rcOB0d."},{"key":"e_1_3_2_5_2","unstructured":"2017. Top 10 2013-A7-Missing Function Level Access Control - OWASP. Open Web Application Security Project (OWASP). Retrieved from https:\/\/bit.ly\/38VCWgC."},{"key":"e_1_3_2_6_2","unstructured":"2019. The $30.5B Command & Control Technologies Market in Defense Law Enforcement & Public Safety - Forecast to 2025. GlobeNewswire Inc. Retrieved from https:\/\/bit.ly\/3qFovn1."},{"key":"e_1_3_2_7_2","unstructured":"2019. MacB Wins $41M Cybersecurity Task Order for AFLCMC. GlobeNewswire Inc. Retrieved from https:\/\/bit.ly\/3AY4H4z."},{"key":"e_1_3_2_8_2","unstructured":"2020. About the configuration store\u2014Documentation (10.3 and 10.3.1)  \\(\\vert\\)  ArcGIS Enterprise. ArcGIS Enterprise. Retrieved from https:\/\/bit.ly\/3DkPOcJ."},{"key":"e_1_3_2_9_2","unstructured":"2020. Kismet. Kismet. Retrieved from https:\/\/bit.ly\/2Z7UxMu."},{"key":"e_1_3_2_10_2","unstructured":"2021. C3 Modernization Strategy. U.S. Department of Defense. Retrieved from https:\/\/bit.ly\/3qXAcHu. [Online; accessed 9. Jan. 2022]."},{"key":"e_1_3_2_11_2","unstructured":"2021. CAPEC - CAPEC-112: Brute Force (Version 3.6). Common Attack Pattern Enumerations and Classifications (CAPEC). Retrieved from https:\/\/bit.ly\/3n9lXOp."},{"key":"e_1_3_2_12_2","unstructured":"Matias Madou. 2021. Coders Conquer Security OWASP Top 10 API Series-Missing Function Level Access Control. Retrieved from https:\/\/bit.ly\/3okNjB8."},{"key":"e_1_3_2_13_2","unstructured":"2021. CWE - CWE-521: Weak Password Requirements (4.6). Common Weakness Enumeration (CWE). Retrieved from https:\/\/bit.ly\/33fyclq."},{"key":"e_1_3_2_14_2","unstructured":"2021. CWE - CWE-922: Insecure Storage of Sensitive Information (4.6). Common Weakness Enumeration (CWE). Retrieved from https:\/\/bit.ly\/3HoXygo."},{"key":"e_1_3_2_15_2","unstructured":"2021. Defending Against Software Supply Chain Attacks. Cybersecurity and Infrastructure Security Agency. Retrieved from https:\/\/bit.ly\/3oENbfV."},{"key":"e_1_3_2_16_2","unstructured":"2021. Ethereal - Network analyzer - PRTG Alternative. Paessler. Retrieved from https:\/\/bit.ly\/3aWW79F."},{"key":"e_1_3_2_17_2","unstructured":"2021. Insecure direct object references (IDOR)  \\(\\vert\\)  Web Security Academy. PortSwigger. Retrieved from https:\/\/bit.ly\/30owDQQ."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3424311.3424329"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEE.2015.7506822"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939813"},{"key":"e_1_3_2_21_2","first-page":"407","article-title":"Blockchain assisted unauthorized target localization for C4I communication network using convolution neural network","author":"Akter Rubina","year":"2021","unstructured":"Rubina Akter, Mohtasin Golam, Jae-Min Lee, and Dong-Seong Kim. 2021. Blockchain assisted unauthorized target localization for C4I communication network using convolution neural network. In Korea Telecommunications Society Conference. 407\u2013408.","journal-title":"Korea Telecommunications Society Conference"},{"key":"e_1_3_2_22_2","unstructured":"Mohammed M. Alani. 2014. Guide to OSI and TCP\/IP models. Springer Cham Retrieved from https:\/\/bit.ly\/3TKbmrY."},{"key":"e_1_3_2_23_2","first-page":"75","volume-title":"International Conference on Computational Science and Computational Intelligence","volume":"2","author":"Alghamdi Abdullah S.","year":"2014","unstructured":"Abdullah S. Alghamdi, Iftikhar Ahmad, et\u00a0al. 2014. Cloud based C4I systems: Security requirements and concerns. In International Conference on Computational Science and Computational Intelligence, Vol. 2. IEEE, 75\u201380."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/UKSIM.2010.31"},{"issue":"29","key":"e_1_3_2_25_2","first-page":"6095","article-title":"Proposed methodology to enhance C4I systems security on architectural level","volume":"6","author":"Alghamdi Abdullah Sharaf","year":"2011","unstructured":"Abdullah Sharaf Alghamdi, Tazar Hussain, Gul Faraz Khan, Khalid Alnafjan, and Abdul Haseeb. 2011. Proposed methodology to enhance C4I systems security on architectural level. Sci. Res. Ess. 6, 29 (2011), 6095\u20136103.","journal-title":"Sci. Res. Ess."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-642-17610-4_28","volume-title":"Security Technology, Disaster Recovery and Business Continuity","author":"Alghamdi Abdullah S.","year":"2010","unstructured":"Abdullah S. Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, and Khalid Al-Nafjan. 2010. A generic approach to security assured net-centric communications network architecture for C4I systems. In Security Technology, Disaster Recovery and Business Continuity. Springer, 244\u2013249."},{"key":"e_1_3_2_27_2","first-page":"196","volume-title":"International Confereence on Computer Applications in Industry and Engineering","author":"Alghamdi Abdullah Sharaf","year":"2010","unstructured":"Abdullah Sharaf Alghamdi, Hanif Ullah, and Iftikhar Ahmad. 2010. Evaluating encryption techniques for C4I system. In International Confereence on Computer Applications in Industry and Engineering. 196\u2013201."},{"issue":"17","key":"e_1_3_2_28_2","first-page":"4255","article-title":"Satellite image encryption for C4I system","volume":"6","author":"Alghamdi Abdullah Sharaf","year":"2011","unstructured":"Abdullah Sharaf Alghamdi, Hanif Ullah, Muhammad Usama Khan, Iftikhar Ahmad, and Khalid Alnafajan. 2011. Satellite image encryption for C4I system. Int. J. Phys. Sci. 6, 17 (2011), 4255\u20134263.","journal-title":"Int. J. Phys. Sci."},{"key":"e_1_3_2_29_2","article-title":"TACTICS: Tactical service oriented architecture","author":"Aloisio Alessandro","year":"2015","unstructured":"Alessandro Aloisio, Marco Autili, Alfredo D\u2019Angelo, Antti Viidanoja, J\u00e9r\u00e9mie Leguay, Tobias Ginzler, Thorsten Lampe, Luca Spagnolo, Stephen Wolthusen, Adam Flizikowski, et\u00a0al. 2015. TACTICS: Tactical service oriented architecture. arXiv preprint arXiv:1504.07578 (2015).","journal-title":"arXiv preprint arXiv:1504.07578"},{"key":"e_1_3_2_30_2","first-page":"111","volume-title":"14th ACM Workshop on Artificial Intelligence and Security","author":"Andresini Giuseppina","year":"2021","unstructured":"Giuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, and Lorenzo Cavallaro. 2021. Insomnia: Towards concept-drift robustness in network intrusion detection. In 14th ACM Workshop on Artificial Intelligence and Security. 111\u2013122."},{"key":"e_1_3_2_31_2","unstructured":"Andrew Walters Russell Anderson Jonathan Boan Angela Consoli Mark Coombs Adam Iannos Drew Knight Mathew Pink Jayson Priest Tim Priest Andrew Smith Brad Tobin Sonya Williamson and Ben Laurenson. 2018. Conducting Information Superiority Research in an Unclassified Surrogate Defence Environment. Technical Report. Weapons and Combat Systems Division DST Group South Australia. Retrieved from https:\/\/bit.ly\/391camQ."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040629"},{"issue":"1","key":"e_1_3_2_33_2","article-title":"Technologies and operational applications of \u201ctactical\u201d satellite communication.","volume":"13","author":"Horvath Attila","year":"2018","unstructured":"Attila Horvath. 2018. Technologies and operational applications of \u201ctactical\u201d satellite communication. Milit. Eng.\/Hadm\u00e9rn\u00f6k 13, 1 (2018).","journal-title":"Milit. Eng.\/Hadm\u00e9rn\u00f6k"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/su132413827"},{"key":"e_1_3_2_35_2","first-page":"1","volume-title":"IEEE Military Communications Conference","author":"Balzano Quirino","year":"2007","unstructured":"Quirino Balzano, John Rzasa, Stuart Milner, and Christopher Davis. 2007. High capacity tactical networks with reconfigurable, steerable, narrow-beam agile point-to-point RF links. In IEEE Military Communications Conference. IEEE, 1\u20137."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.5555\/137076"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158707"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1518\/155534308X377829"},{"key":"e_1_3_2_39_2","first-page":"53","volume-title":"11th European Conference on Information Warfare and Security","author":"Bernier Melanie","year":"2012","unstructured":"Melanie Bernier, Sylvain Leblanc, Ben Morton, E. Filiol, and R. Erra. 2012. Metrics framework of cyber operations on command and control. In 11th European Conference on Information Warfare and Security. Academic Publishing International Ltd, 53\u201362."},{"key":"e_1_3_2_40_2","first-page":"227","volume-title":"ConferenCe on Cyber ConfliCt","author":"Bernier Melanie","year":"2010","unstructured":"Melanie Bernier and Joanne Treurniet. 2010. Understanding cyber operations in a canadian strategic context: More than C4ISR, more than CNO. In ConferenCe on Cyber ConfliCt. 227."},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/978-3-319-47605-6_9","volume-title":"International Workshop on Modelling and Simulation for Autonomous Systems","author":"Biagini Marco","year":"2016","unstructured":"Marco Biagini and Fabio Corona. 2016. Modelling & simulation architecture supporting NATO counter unmanned autonomous system concept development. In International Workshop on Modelling and Simulation for Autonomous Systems. Springer, 118\u2013127."},{"issue":"4","key":"e_1_3_2_42_2","first-page":"69","article-title":"C4ISR via dark webs: An alternative concept for protecting critical information in contested cyberspace environments","volume":"30","author":"Bingman Kyle L.","year":"2016","unstructured":"Kyle L. Bingman. 2016. C4ISR via dark webs: An alternative concept for protecting critical information in contested cyberspace environments. Air Space Power J. 30, 4 (2016), 69\u201378.","journal-title":"Air Space Power J."},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34167-6_22"},{"key":"e_1_3_2_44_2","article-title":"GPS spoofing","author":"Chapman Adam","year":"2017","unstructured":"Adam Chapman. 2017. GPS spoofing. ECE Senior Capst. Proj. (2017). Retrieved from https:\/\/bit.ly\/3Qswhge.","journal-title":"ECE Senior Capst. Proj."},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.23919\/ELINFOCOM.2019.8706369"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21952-9_3"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.184"},{"issue":"4","key":"e_1_3_2_49_2","first-page":"10","article-title":"A survey on malware propagation, analysis, and detection","volume":"2","author":"Damshenas Mohsen","year":"2013","unstructured":"Mohsen Damshenas, Ali Dehghantanha, and Ramlan Mahmoud. 2013. A survey on malware propagation, analysis, and detection. Int. J. Cyber-Secur. Digit. Forens. 2, 4 (2013), 10\u201330.","journal-title":"Int. J. Cyber-Secur. Digit. Forens."},{"key":"e_1_3_2_50_2","volume-title":"Categorization of Security Design Patterns","author":"Dangler Jeremiah Y.","year":"2013","unstructured":"Jeremiah Y. Dangler. 2013. Categorization of Security Design Patterns. Ph. D. Dissertation. East Tennessee State University."},{"key":"e_1_3_2_51_2","article-title":"Cyber-attack consequence prediction","author":"Datta Prerit","year":"2020","unstructured":"Prerit Datta, Natalie Lodinger, Akbar Siami Namin, and Keith S. Jones. 2020. Cyber-attack consequence prediction. arXiv preprint arXiv:2012.00648.","journal-title":"arXiv preprint arXiv:2012.00648"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-415815-3.00007-8"},{"issue":"3","key":"e_1_3_2_53_2","first-page":"75","article-title":"Brute-force attack \u201cseeking but distressing.\u201d","volume":"2","author":"Dave Konark Truptiben","year":"2013","unstructured":"Konark Truptiben Dave. 2013. Brute-force attack \u201cseeking but distressing.\u201d Int. J. Innov. Eng. Technol. Brute-force 2, 3 (2013), 75\u201378.","journal-title":"Int. J. Innov. Eng. Technol. Brute-force"},{"key":"e_1_3_2_54_2","unstructured":"Andrew Davies. 2021. Somebody might hear us: Emerging communications security technologies. Australian Strategic Policy Institute Retrieved from https:\/\/bit.ly\/3L39zuk."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357592"},{"key":"e_1_3_2_56_2","unstructured":"Slobodanka Djordjevi Ejub Kajan Kajan and Dejan Mitrovi. 1997. Towards active C3I systems. In Proceedings of 4th International TELSIKS\u201997 Conference . Retrieved from https:\/\/bit.ly\/3KXoPJ5."},{"key":"e_1_3_2_57_2","unstructured":"F. Doffman. 2019. Iran launches new military command and control unit to withstand U.S. cyberattack. Retrieved from https:\/\/bit.ly\/3o1yu42."},{"key":"e_1_3_2_58_2","volume-title":"Secure Design Patterns","author":"Dougherty Chad","year":"2009","unstructured":"Chad Dougherty, Kirk Sayre, Robert C. Seacord, David Svoboda, and Kazuya Togashi. 2009. Secure Design Patterns. Technical Report. Carnegie-Mellon University Software Engineering Institute, Pittsburgh, PA."},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/1516539.1516541"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844143"},{"key":"e_1_3_2_61_2","first-page":"1","article-title":"Brute-force exploitation of web application session IDs","author":"Endler David","year":"2001","unstructured":"David Endler. 2001. Brute-force exploitation of web application session IDs. iDEFENSE Inc., Available at, (Nov. 1, 2001) (2001), 1\u201340. iDEFENSE Inc. Retrieved from https:\/\/bit.ly\/3BpBxgI.","journal-title":"iDEFENSE Inc., Available at, (Nov. 1, 2001)"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2015.320"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.5555\/861998"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2402709.2402695"},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1117\/12.488129","volume-title":"Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II","author":"Forcier Bob","year":"2003","unstructured":"Bob Forcier. 2003. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, Vol. 5071. SPIE, 289\u2013296."},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2010.171"},{"key":"e_1_3_2_67_2","first-page":"233","volume-title":"IEEE 3rd World Forum on Internet of Things (WF-IoT)","author":"Furtak Janusz","year":"2016","unstructured":"Janusz Furtak, Zbigniew Zieli\u0144ski, and Jan Chudzikiewicz. 2016. Security techniques for the WSN link layer within military IoT. In IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 233\u2013238."},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2019.8842766"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958508"},{"key":"e_1_3_2_70_2","volume-title":"Information Assurance: Trends in Vulnerabilities, Threats, and Technologies","author":"Gansler Jacques S.","year":"2004","unstructured":"Jacques S. Gansler and Hans Binnendijk. 2004. Information Assurance: Trends in Vulnerabilities, Threats, and Technologies. National Defense University (NDU)."},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.06.004"},{"key":"e_1_3_2_72_2","first-page":"149","volume-title":"International Conference on Innovative Network Systems and Applications","author":"Gkioulos Vasileios","year":"2015","unstructured":"Vasileios Gkioulos and Stephen D. Wolthusen. 2015. Constraint analysis for security policy partitioning over tactical service oriented architectures. In International Conference on Innovative Network Systems and Applications. Springer, 149\u2013166."},{"key":"e_1_3_2_73_2","volume-title":"Norwegian Information Security Conference","author":"Gkioulos Vasileios","year":"2015","unstructured":"Vasileios Gkioulos and Stephen D. Wolthusen. 2015. Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In Norwegian Information Security Conference."},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2016.7571813"},{"key":"e_1_3_2_75_2","first-page":"37","volume-title":"International Workshop on the Security of Industrial Control Systems and Cyber-physical Systems","author":"Gkioulos Vasileios","year":"2016","unstructured":"Vasileios Gkioulos and Stephen D. Wolthusen. 2016. A security policy infrastructure for tactical service oriented architectures. In International Workshop on the Security of Industrial Control Systems and Cyber-physical Systems. Springer, 37\u201351."},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65127-9_10"},{"issue":"5","key":"e_1_3_2_77_2","first-page":"1185","article-title":"Attacks finding and prevention techniques in MANET: A survey","volume":"10","author":"Goyal Monika","year":"2017","unstructured":"Monika Goyal, Sandeep Kumar Poonia, and Deepak Goyal. 2017. Attacks finding and prevention techniques in MANET: A survey. Adv. Wirel. Mob. Commun. 10, 5 (2017), 1185\u20131195.","journal-title":"Adv. Wirel. Mob. Commun."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2017.8319360"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605994"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.895139"},{"key":"e_1_3_2_81_2","unstructured":"Rick Hayes-Roth and David Reading. 2008. Maritime information exchange model (MIEM) September 29 2008. Naval Postgraduate School. Retrieved from https:\/\/bit.ly\/3RmK9dk."},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1177\/1751143720982191"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58923-3_11"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158686"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2004.1469049"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2017.8028974"},{"key":"e_1_3_2_87_2","first-page":"289","volume-title":"Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns","author":"Jormakka Jorma","year":"2009","unstructured":"Jorma Jormakka and Jan Lucenius. 2009. Intruder detection system architecture for an SOA-based C4I2SR system. In Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns. IEEE, 289\u2013297."},{"key":"e_1_3_2_88_2","first-page":"1","volume-title":"SecureComm and Workshops","author":"Jovanovic Nenad","year":"2006","unstructured":"Nenad Jovanovic, Engin Kirda, and Christopher Kruegel. 2006. Preventing cross site request forgery attacks. In SecureComm and Workshops. IEEE, 1\u201310."},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/1279711.1279718"},{"key":"e_1_3_2_90_2","unstructured":"Baron Kevin. 2020. Attacks on DOD Networks Soar as Telework Inflicts \u2018Unprecedented\u2019 Loads. Retrieved from https:\/\/bit.ly\/2NukkMl."},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918213"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553214"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2019.8668963"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10031035"},{"key":"e_1_3_2_95_2","article-title":"Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0","author":"Kott Alexander","year":"2018","unstructured":"Alexander Kott, Paul Th\u00e9ron, Martin Dra\u0161ar, Edlira Dushku, Beno\u00eet LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, et\u00a0al. 2018. Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0. arXiv preprint arXiv:1803.10664.","journal-title":"arXiv preprint arXiv:1803.10664"},{"key":"e_1_3_2_96_2","unstructured":"Sanatan Kulshrestha. 2018. Military applications of blockchain technology. Age Blockchain: Collect. Art. 21 (2018). https:\/\/bit.ly\/3KXRJZB."},{"key":"e_1_3_2_97_2","first-page":"81","volume-title":"10th ACM Workshop on Artificial Intelligence and Security","author":"Kumar Ram Shankar Siva","year":"2017","unstructured":"Ram Shankar Siva Kumar, Andrew Wicker, and Matt Swann. 2017. Practical machine learning for cloud intrusion detection: Challenges and the way forward. In 10th ACM Workshop on Artificial Intelligence and Security. 81\u201390."},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.004"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.5120\/20082-2148"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC46691.2019.8939896"},{"key":"e_1_3_2_101_2","article-title":"The heartbleed bug, explained","author":"Lee Timothy B.","year":"2015","unstructured":"Timothy B. Lee. 2015. The heartbleed bug, explained. Vox (May2015). Retrieved from https:\/\/bit.ly\/3qLjxIs.","journal-title":"Vox"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECENG.2011.6057308"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"e_1_3_2_105_2","first-page":"27","volume-title":"Open Architecture\/Open Business Model Net-Centric Systems and Defense Transformation 2017","author":"Littlejohn Kenneth","year":"2017","unstructured":"Kenneth Littlejohn, Vahid Rajabian-Schwart, Nicholas Kovach, and Charles P. Satterthwaite. 2017. Mission systems open architecture science and technology (MOAST) program. In Open Architecture\/Open Business Model Net-Centric Systems and Defense Transformation 2017, Vol. 10205. SPIE, 27\u201334."},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS52405.2021.9486421"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357665"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.173"},{"key":"e_1_3_2_109_2","unstructured":"Andrew Lycett. 2011. Breaking Germany\u2019s enigma code. British Broadcasting Corporation (BBC). Retrieved from https:\/\/bbc.in\/3TPj4kL."},{"key":"e_1_3_2_110_2","first-page":"71","volume-title":"Joint Workshop on CPS&IoT Security and Privacy","author":"Madani Pooria","year":"2020","unstructured":"Pooria Madani, Natalija Vlajic, and Shadi Sadeghpour. 2020. Mac-layer spoofing detection and prevention in IoT systems: Randomized moving target approach. In Joint Workshop on CPS&IoT Security and Privacy. 71\u201380."},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101664"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-851-4.ch012"},{"key":"e_1_3_2_113_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1117\/12.500850","volume-title":"Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II","author":"Manes Gavin W.","year":"2003","unstructured":"Gavin W. Manes, J. Dawkins, Sujeet Shenoi, and John C. Hale. 2003. Identifying and tracking attacks on networks: C3I displays and related technologies. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, Vol. 5071. SPIE, 105\u2013113."},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3108"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-021-04377-y"},{"key":"e_1_3_2_116_2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1102219.1102238","volume-title":"3rd ACM Workshop on Security of Ad Hoc and Sensor Networks","author":"Manzo Michael","year":"2005","unstructured":"Michael Manzo, Tanya Roosta, and Shankar Sastry. 2005. Time synchronization attacks in sensor networks. In 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. 107\u2013116."},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031501"},{"key":"e_1_3_2_118_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1117\/12.487391","volume-title":"Battlespace Digitization and Network-Centric Systems III","author":"Maschino Mike","year":"2003","unstructured":"Mike Maschino. 2003. Access control within military C4ISR systems. In Battlespace Digitization and Network-Centric Systems III, Vol. 5101. SPIE, 57\u201365."},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698966"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1494890"},{"key":"e_1_3_2_121_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1201\/9780429445491-4","volume-title":"Military Applications of Data Analytics","author":"Matthews Suzanne J.","year":"2018","unstructured":"Suzanne J. Matthews. 2018. Harnessing single board computers for military data analytics. In Military Applications of Data Analytics. Auerbach Publications, 63\u201377."},{"key":"e_1_3_2_122_2","first-page":"3409","volume-title":"IEEE International Conference on Systems, Man and Cybernetics","author":"Maule R. William","year":"2005","unstructured":"R. William Maule. 2005. Enterprise knowledge security architecture for military experimentation. In IEEE International Conference on Systems, Man and Cybernetics. IEEE, 3409\u20133414."},{"key":"e_1_3_2_123_2","doi-asserted-by":"crossref","unstructured":"Ashley McAbee Murali Tummala and John McEachen. 2019. Military intelligence applications for blockchain technology. In Proceedings of the 52nd Hawaii International Conference on System Sciences . 6031\u20136040. Retrieved from https:\/\/bit.ly\/3ql2KKV.","DOI":"10.24251\/HICSS.2019.726"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465171"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA422115"},{"key":"e_1_3_2_126_2","unstructured":"Ben Morton Sylvain Leblanc and Melanie Bernier. 2012. Simulation approach for military cyber operations. In 11th European Conference on Information Warfare and Security . 180\u2013187. Retrieved from https:\/\/bit.ly\/3D5HdgU."},{"key":"e_1_3_2_127_2","unstructured":"A. Mursia L. Ganga A. Leonardi G. Morabito C. Rametta and L. Wihl. 2011. A simulation study of C4I communications network under cyber-attacks. Defense and Homeland Security Simulation Workshop (DHSS). Retrieved from https:\/\/bit.ly\/3QqaZ2U."},{"issue":"9","key":"e_1_3_2_128_2","first-page":"24","article-title":"On micro-services architecture","volume":"2","author":"Namiot Dmitry","year":"2014","unstructured":"Dmitry Namiot and Manfred Sneps-Sneppe. 2014. On micro-services architecture. Int. J. Open Inf. Technol. 2, 9 (2014), 24\u201327.","journal-title":"Int. J. Open Inf. Technol."},{"issue":"2","key":"e_1_3_2_129_2","first-page":"179","article-title":"Review of cognitive metrics for C2","volume":"31","author":"Natter Mandy","year":"2010","unstructured":"Mandy Natter, Jennifer Ockerman, and Leigh Baumgart. 2010. Review of cognitive metrics for C2. ITEA J. Test Eval. 31, 2 (2010), 179.","journal-title":"ITEA J. Test Eval."},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4120"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1883\/1\/012152"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.9728\/dcs.2021.22.3.537"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.26"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1080\/14702436.2016.1187568"},{"key":"e_1_3_2_135_2","unstructured":"Kent O\u2019Sullivan and Benjamin Turnbull. 2015. The cyber simulation terrain: Towards an open source cyber effects simulation ontology. In 16th Australian Information Warfare Conference . 14\u201323. Retrieved from https:\/\/bit.ly\/3qm7OyC."},{"key":"e_1_3_2_136_2","first-page":"1209","volume-title":"INCOSE International Symposium","author":"Ozturk Ali","year":"2019","unstructured":"Ali Ozturk, Suna Durmus, and Serdar Uzumcu. 2019. The challenges in implementing future interoperable joint C4ISR systems. In INCOSE International Symposium, Vol. 29. Wiley Online Library, 1209\u20131217."},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5825"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSurv.2012.6218456"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378948"},{"key":"e_1_3_2_140_2","volume-title":"International Symposium on Secure Software Engineering","author":"Pu Calton","year":"2006","unstructured":"Calton Pu and Jinpeng Wei. 2006. A methodical defense against TOCTTOU attacks: The EDGI approach. In International Symposium on Secure Software Engineering."},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2018.8355435"},{"key":"e_1_3_2_142_2","volume-title":"Workshops at the 32nd AAAI Conference on Artificial Intelligence","author":"Raff Edward","year":"2018","unstructured":"Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, and Charles K. Nicholas. 2018. Malware detection by eating a whole exe. In Workshops at the 32nd AAAI Conference on Artificial Intelligence."},{"issue":"1","key":"e_1_3_2_143_2","article-title":"Secure blockchain-based data-sharing model and adoption among intelligence communities.","volume":"48","author":"Razali Noor Afiza, Mat","year":"2021","unstructured":"Noor Afiza, Mat Razali, Wan Nurhidayat, Wan Muhamad, Khairul Khalil Ishak, Nurjannatul Jannah, Aqilah M. Saad, Muslihah Wook, and Suzaimah Ramli. 2021. Secure blockchain-based data-sharing model and adoption among intelligence communities. IAENG Int. J. Comput. Sci. 48, 1 (2021).","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.12.012"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2610-3"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.52"},{"issue":"6","key":"e_1_3_2_147_2","first-page":"2895","article-title":"Intelligent intrusion detection and prevention system using smart multi-instance multi-label learning protocol for tactical mobile ad hoc networks","volume":"12","author":"Roopa M.","year":"2018","unstructured":"M. Roopa and S. Selvakumar Raja. 2018. Intelligent intrusion detection and prevention system using smart multi-instance multi-label learning protocol for tactical mobile ad hoc networks. KSII Trans. Internet Inf. Syst. 12, 6 (2018), 2895\u20132921.","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599853"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442181"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1145\/1362550.1362559"},{"key":"e_1_3_2_151_2","first-page":"18","volume-title":"23rd International Command and Control Research & Technology Symposium","author":"Schubert Johan","year":"2018","unstructured":"Johan Schubert, Joel Brynielsson, Mattias Nilsson, and Peter Svenmarck. 2018. Artificial intelligence for decision support in command and control systems. In 23rd International Command and Control Research & Technology Symposium. 18\u201333."},{"key":"e_1_3_2_152_2","first-page":"844","volume-title":"IEEE Military Communications Conference","author":"Segura R.","year":"2003","unstructured":"R. Segura and J. Farkas. 2003. Secure virtual private networking overInmarsat packet-based services. In IEEE Military Communications Conference. IEEE, 844\u2013849."},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455073"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.37.5929"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.16"},{"key":"e_1_3_2_156_2","unstructured":"Esther Spanjer. 2008. Security Features for Solid State Drives in Defense Applications. SMART High Reliability Solution (SHRS). Retrieved from https:\/\/bit.ly\/3AWi5Xe."},{"key":"e_1_3_2_157_2","article-title":"Certified defenses for data poisoning attacks","volume":"30","author":"Steinhardt Jacob","year":"2017","unstructured":"Jacob Steinhardt, Pang Wei W. Koh, and Percy S. Liang. 2017. Certified defenses for data poisoning attacks. Adv. Neural Inf. Process. Syst. 30 (2017).","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2885561"},{"issue":"2","key":"e_1_3_2_159_2","first-page":"88","article-title":"Network monitoring approaches: An overview","volume":"5","author":"Svoboda Jakub","year":"2015","unstructured":"Jakub Svoboda, Ibrahim Ghafir, Vaclav Prenosil, et\u00a0al. 2015. Network monitoring approaches: An overview. Int. J. Adv. Comput. Netw. Secur. 5, 2 (2015), 88\u201393.","journal-title":"Int. J. Adv. Comput. Netw. Secur."},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0214-9_12"},{"key":"e_1_3_2_161_2","unstructured":"Synopsys. 2020. Heartbleed Bug. Retrieved from https:\/\/bit.ly\/3CnZ6nd."},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051810"},{"issue":"6","key":"e_1_3_2_163_2","first-page":"2280","article-title":"A survey of attacks on MANET routing protocols","volume":"2","author":"Tayal Supriya","year":"2013","unstructured":"Supriya Tayal and Vinti Gupta. 2013. A survey of attacks on MANET routing protocols. Int. J. Innov. Res. Sci., Eng. Technol. 2, 6 (2013), 2280\u20132285.","journal-title":"Int. J. Innov. Res. Sci., Eng. Technol."},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9021038"},{"key":"e_1_3_2_165_2","unstructured":"Tom McLean. 2020. Critical vulnerabilities in JSON Web Token libraries. Retrieved from https:\/\/bit.ly\/3kMtpOe."},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1145\/1940976.1940989"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-1-4"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.016"},{"key":"e_1_3_2_170_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727054"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.114"},{"key":"e_1_3_2_173_2","volume-title":"Network and Distributed System Security Symposium","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross site scripting prevention with dynamic data tainting and static analysis. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_174_2","volume-title":"Artificial Intelligence for Command and Control of Air Power","author":"Voke Matthew R.","year":"2019","unstructured":"Matthew R. Voke. 2019. Artificial Intelligence for Command and Control of Air Power. Technical Report. Air University Press."},{"key":"e_1_3_2_175_2","article-title":"OWASP top-10 2013","author":"Wichers Dave","year":"2013","unstructured":"Dave Wichers. 2013. OWASP top-10 2013. OWASP Foundation. Open Web Application Security Project (OWASP). Retrieved from https:\/\/bit.ly\/3QszGvH.","journal-title":"OWASP Foundation"},{"key":"e_1_3_2_176_2","article-title":"Efficient and resilient edge intelligence for the internet of battlefield things","author":"Wigness Maggie","year":"2021","unstructured":"Maggie Wigness, Tien Pham, Stephen Russell, and Tarek Abdelzaher. 2021. Efficient and resilient edge intelligence for the internet of battlefield things. NATO S&T J. (2021). https:\/\/bit.ly\/3x5XDSR.","journal-title":"NATO S&T J."},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2021.1906001"},{"key":"e_1_3_2_178_2","first-page":"246","volume-title":"International Conference on Multimedia Technology","author":"Xiao Long","year":"2011","unstructured":"Long Xiao, Shaoqing Meng, and Kaining Lu. 2011. Based on RSAODV the solution to routing table overflow problem. In International Conference on Multimedia Technology. IEEE, 246\u2013248."},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.1145\/3073559"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1145\/1414558.1414575"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290168"},{"key":"e_1_3_2_182_2","first-page":"1","volume-title":"4th Annual Caneus Fly by Wireless Workshop","author":"Zahmati Amir Sepasi","year":"2011","unstructured":"Amir Sepasi Zahmati, Xavier Fernando, and Hassan Kojori. 2011. Transmission delay in wireless sensing, command and control applications for aircraft. In 4th Annual Caneus Fly by Wireless Workshop. IEEE, 1\u20134."},{"key":"e_1_3_2_183_2","article-title":"A state-space modeling framework for engineering blockchain-enabled economic systems","author":"Zargham Michael","year":"2018","unstructured":"Michael Zargham, Zixuan Zhang, and Victor Preciado. 2018. A state-space modeling framework for engineering blockchain-enabled economic systems. arXiv preprint arXiv:1807.00955.","journal-title":"arXiv preprint arXiv:1807.00955"},{"key":"e_1_3_2_184_2","volume-title":"Association of Old Crows AOC International Symposium and Exhibition Adelaide, Australia, Information Security Group Electronic Warfare Associates-Australia","author":"Zehetner Albert R.","year":"2004","unstructured":"Albert R. Zehetner et\u00a0al. 2004. Information operations: The impacts on C4I systems. In Association of Old Crows AOC International Symposium and Exhibition Adelaide, Australia, Information Security Group Electronic Warfare Associates-Australia. Citeseer."},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:32Z","timestamp":1750182572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":185,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3558001"],"URL":"https:\/\/doi.org\/10.1145\/3558001","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2022-02-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}