{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:57Z","timestamp":1767581457857,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590856","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Revolutionizing Aerospace and Defense: The Impact of AI and Robotics on Modern Warfare"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5021-4029","authenticated-orcid":false,"given":"Dasharathraj K","family":"Shetty","sequence":"first","affiliation":[{"name":"Department of Humanities and Management, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5661-742X","authenticated-orcid":false,"given":"Gayathri","family":"Prerepa","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0356-7697","authenticated-orcid":false,"given":"Nithesh","family":"Naik","sequence":"additional","affiliation":[{"name":"Department of Mechanical and Industrial Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9228-7245","authenticated-orcid":false,"given":"Ritesh","family":"Bhat","sequence":"additional","affiliation":[{"name":"Department of Mechanical and Industrial Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0388-891X","authenticated-orcid":false,"given":"Jayant","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6709-1064","authenticated-orcid":false,"given":"Parva","family":"Mehrotra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-2165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2010.08.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.07.009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.12.011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2009.11.004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2006.02.015"},{"key":"e_1_3_2_1_7_1","first-page":"5","article-title":"Robust evolutionary algorithms for UAV\/UCAV aerodynamic and RCS design optimisation","volume":"37","author":"Lee D. S.","year":"2008","unstructured":"Lee, D. S.Gonzalez, L. F.Srinivas, K.and Periaux, J. 2008. Robust evolutionary algorithms for UAV\/UCAV aerodynamic and RCS design optimisation. Computers & Fluids. 37, 5 (Jun. 2008). 547\u2013564, doi: https:\/\/10.1016\/j.compfluid.2007.07.008.","journal-title":"Computers & Fluids."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2010.03.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2006.06.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2005.06.005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2017.7925285"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.35929"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/252371"},{"key":"e_1_3_2_1_14_1","volume-title":"Elsevier, 1970","author":"Rusch W. V. T.","year":"2013","unstructured":"Rusch, W. V. T. and Potter, P. D. 1970.Analysis of Reflector Antennas, (1970). Elsevier, 1970. doi: https:\/\/10.1016\/C2013-0-07555-X."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2014.6867699"},{"key":"e_1_3_2_1_16_1","article-title":"Gesture Controlled Robot for Military Purpose","volume":"1","author":"Sathiyanarayanan M.","year":"2014","unstructured":"Sathiyanarayanan, M.Azharuddin, S.Kumar, S.and Khan, G. 2014. Gesture Controlled Robot for Military Purpose. International Journal For Technological Research In Engineering. 1, 11 (2014). 2347\u20134718, [Online]. Available: www.ijtre.com","journal-title":"International Journal For Technological Research In Engineering."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Kumar S. and Awasthi P. 2009. Navigation Architecture for Autonomous Surveillance Rover. International Journal of Computer Theory and Engineering. (2009). 231\u2013235 doi: https:\/\/10.7763\/IJCTE.2009.V1.37.","DOI":"10.7763\/IJCTE.2009.V1.37"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27537-1_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80129-8_23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-012-4433-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-011-0133-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-012-0156-x"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAMECH.2011.6070470"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0146-3_68"},{"key":"e_1_3_2_1_25_1","volume-title":"CEUR Workshop Proceedings. 3013","author":"Vladov S.","year":"2021","unstructured":"Vladov, S.Shmelov, Y.and Petchenko, M. 2021. A Neuro-Fuzzy Expert System for the Control and Diagnostics of Helicopters Aircraft Engines Technical State. CEUR Workshop Proceedings. 3013 (2021). 40\u201352."},{"key":"e_1_3_2_1_26_1","volume-title":"PR Newswire, 2021","author":"Global Industry Analysts","year":"2021","unstructured":"Global Industry Analysts. 2021. Global Defense Robotics Market to Reach $22.4 Billion by 2026, PR Newswire, 2021. https:\/\/www.prnewswire.com\/news-releases\/global-defense-robotics-market-to-reach-22-4-billion-by-2026\u2013301349525.html (accessed Jan. 31, 2023)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Abaimov S. and Martellini M. 2020. Artificial Intelligence in Autonomous Weapon Systems. 21st Century Prometheus. (2020). 141\u2013177 doi: https:\/\/10.1007\/978-3-030-28285-1_8.","DOI":"10.1007\/978-3-030-28285-1_8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/14751798.2019.1600800"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2018.1518374"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Kott A. 2019. Autonomous Intelligent Cyber-defense Agent (AICA) reference architecture release 2.0. arXiv. (2019). 154.","DOI":"10.1177\/1548512919886163"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2021.10.006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/13439006.2018.1545488"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v12i3.882"},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11701 LNCS","volume-title":"The State of Artificial Intelligence Research in the Context of National Security: Bibliometric Analysis and Research Agenda","author":"Wamba S. F.","year":"2019","unstructured":"Wamba, S. F.Bawack, R. E.and Carillo, K. D. A. 2019. The State of Artificial Intelligence Research in the Context of National Security: Bibliometric Analysis and Research Agenda, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11701 LNCS (2019), 2019, 255\u2013266. doi: https:\/\/10.1007\/978-3-030-29374-1_21."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Garcia E. 2019. The Militarization of Artificial Intelligence: A Wake-Up Call for the Global South. SSRN Electronic Journal. (2019) doi: https:\/\/10.2139\/ssrn.3452323.","DOI":"10.2139\/ssrn.3452323"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601497"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/13523260.2019.1576464"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2017.2768120"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00051820"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18391-2_12"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/01495933.2019.1674081"},{"key":"e_1_3_2_1_42_1","unstructured":"Rosenberg S. 2017. How Google Book Search Got Lost. Wired. (2017) [Online]. Available: https:\/\/www.wired.com\/2017\/04\/how-google-book-search-got-lost\/"},{"key":"e_1_3_2_1_43_1","first-page":"5000","volume-title":"Elsevier","author":"Grossman J.","year":"2007","unstructured":"Grossman, J.Hansen, R.Petkov, P. D.Rager, A.and Fogie, S. 2007.Cross Site Scripting Attacks, (2007). Elsevier, 2007. doi: https:\/\/10.1016\/B978-1-59749-154-9.X5000-8."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221084882"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3150376.3150378"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(10)53003-2"},{"key":"e_1_3_2_1_47_1","unstructured":"Scharre P. 2016. Autonomous Weapons and Operational Risk . Ethical Autonomy Project. (2016). 1\u201355."},{"key":"e_1_3_2_1_48_1","volume-title":"Concrete Problems in AI Safety. ArXiv. (Jun","author":"Amodei D.","year":"2016","unstructured":"Amodei, D.Olah, C.Steinhardt, J.Christiano, P.Schulman, J.and Man\u00e9, D. 2016. Concrete Problems in AI Safety. ArXiv. (Jun. 2016). 104\u2013116, doi: https:\/\/10.48550\/ARXIV.1606.06565."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Soroka L. and Kurkova K. 2019. Artificial Intelligence and Space Technologies: Legal Ethical and Technological Issues. Advanced Space Law. 3 (May 2019). doi: https:\/\/10.29202\/asl\/2019\/3\/11.","DOI":"10.29202\/asl\/2019\/3\/11"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Wallach W. and Asaro P. 2020.Machine Ethics and Robot Ethics (Sep. 2020). Routledge doi: https:\/\/10.4324\/9781003074991.","DOI":"10.4324\/9781003074991"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95798-8_1"},{"key":"e_1_3_2_1_52_1","volume-title":"Learn CBSE","author":"Bhagya","year":"2019","unstructured":"Bhagya. 2019. NCERT Solutions for Class 12 Political Science US Hegemony in World Politics., Learn CBSE, 2019."},{"key":"e_1_3_2_1_53_1","volume-title":"Forbes, 2019","author":"Pandya J.","year":"2019","unstructured":"Pandya, J. 2019. The Dual-Use Dilemma Of Artificial Intelligence, Forbes, 2019. https:\/\/www.forbes.com\/sites\/cognitiveworld\/2019\/01\/07\/the-dual-use-dilemma-of-artificial-intelligence\/%0Ahttps:\/\/www.forbes.com\/sites\/cognitiveworld\/2019\/01\/07\/the-dual-use-dilemma-of-artificial-intelligence\/#346ae4cd6cf0 (accessed Dec. 20, 2020)."},{"key":"e_1_3_2_1_54_1","volume-title":"Deutsche Welle, 2021","author":"Walker R.","year":"2021","unstructured":"Walker, R. 2021. Germany warns: AI arms race already underway, Deutsche Welle, 2021. https:\/\/www.dw.com\/en\/artificial-intelligence-cyber-warfare-drones-future\/a-57769444 (accessed Jan. 05, 2021)."},{"key":"e_1_3_2_1_55_1","volume-title":"Eurasia Review, 2019","author":"Observer Research Foundation","year":"2019","unstructured":"Observer Research Foundation. 2019. Artificial Intelligence In Military Operations: Where Does India Stand? \u2013 Analysis., Eurasia Review, 2019. https:\/\/www.eurasiareview.com\/05082019-artificial-intelligence-in-military-operations-where-does-india-stand-analysis\/ (accessed Jan. 06, 2021)."},{"key":"e_1_3_2_1_56_1","volume-title":"Economic Times., (Jan.","author":"Rawat B.","year":"2019","unstructured":"Rawat, B. 2019. Will be too late if work doesn't begin on incorporating AI into armed forces' system, Economic Times., (Jan. 2019), New Delhi."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.55248\/gengpi.2022.31261"},{"key":"e_1_3_2_1_58_1","unstructured":"Kose U. and Sert S. 2017. Improving content marketing processes with the approaches by artificial intelligence. (Apr. 2017) [Online]. Available: http:\/\/arxiv.org\/abs\/1704.02114"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.57159\/gadl.jcmm.1.2.22013"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.57159\/gadl.jcmm.1.2.22021"},{"key":"e_1_3_2_1_61_1","first-page":"2","article-title":"Artificial Intelligence and Machine Learning Applications in Smart Production","volume":"12","author":"Cioffi R.","year":"2020","unstructured":"Cioffi, R.Travaglioni, M.Piscitelli, G.Petrillo, A.and De Felice, F. 2020. Artificial Intelligence and Machine Learning Applications in Smart Production: Progress, Trends, and Directions. Sustainability. 12, 2 (Jan. 2020). 492, doi: https:\/\/10.3390\/su12020492.","journal-title":"Progress, Trends, and Directions. Sustainability."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/2394964318809152"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.57159\/gadl.jcmm.1.2.22022"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/10556788.2016.1208749"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782159"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024568"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1039\/c0nj00275e"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1108\/01439911111097832"},{"key":"e_1_3_2_1_71_1","volume-title":"Embracing the Fog of War: Assessment and Metrics in Counterinsurgency","author":"Connable B.","year":"2012","unstructured":"Connable, B. 2012. Embracing the Fog of War: Assessment and Metrics in Counterinsurgency. RAND Corporation. (2012). 153\u2013171, [Online]. Available: http:\/\/www.jstor.org\/stable\/10.7249\/mg1086dod.15."},{"key":"e_1_3_2_1_72_1","volume-title":"Defense One, (2017","author":"Meyerriecks D.","year":"2017","unstructured":"Meyerriecks, D. 2017. What the CIA' s Tech Director Wants from AI, Defense One, (2017), 8\u20139, 2017. [Online]. Available: http:\/\/www.defenseone.com\/technology\/2017\/09\/cia-technology-director-artificial-intelligence\/140801\/print\/"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-78973-811-720201008"},{"key":"e_1_3_2_1_74_1","volume-title":"A Stable Nuclear Future? The Impact of Autonomous Systems and Artificial Intelligence. (Dec","author":"Horowitz M. C.","year":"2019","unstructured":"Horowitz, M. C.Scharre, P.and Velez-Green, A. 2019. A Stable Nuclear Future? The Impact of Autonomous Systems and Artificial Intelligence. (Dec. 2019), [Online]. Available: http:\/\/arxiv.org\/abs\/1912.05291"},{"key":"e_1_3_2_1_75_1","volume-title":"International Security. 38, 1","author":"Jr J. S. N.","year":"2013","unstructured":"Jr, J. S. N. 2013. Deterrence and Dissuasion in Cyberspace. International Security. 38, 1 (2013). 137\u2013159, [Online]. Available: http:\/\/search.ebscohost.com.ebscohostresearchdatabasestest0.han3.lib.uni.lodz.pl\/login.aspx?direct=true&db=a9h&AN=89040177&lang=pl&site=eds-live"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2020920642"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Fields C. and Haver R. 2008. Challenges to Military Operations in Support of US National Interests. Volume 1: Executive Summary (Defense Science Board 2007 Summer Study). (2008) [Online]. Available: http:\/\/oai.dtic.mil\/oai\/oai?verb=getRecord&metadataPrefix=html&identifier=ADA495353","DOI":"10.21236\/ADA495353"},{"key":"e_1_3_2_1_78_1","unstructured":"Hunter A. P.Sheppard L. R.Karl\u00e9n R.Hunter A. P.and Balieiro L. 2018. Artificial Intelligence and National Security. (2018) [Online]. Available: http:\/\/www.jstor.com\/stable\/resrep22492.5"},{"key":"e_1_3_2_1_79_1","volume-title":"IEEE Aerospace Conference Proceedings. (2011","author":"Cook K. L. B.","year":"2011","unstructured":"Cook, K. L. B.Wilczynski, P.Fong, C. J.Yen, N. L.and Chang, G. S. 2011. The constellation observing system for meteorology ionosphere and climate follow-on mission. IEEE Aerospace Conference Proceedings. (2011), doi: https:\/\/10.1109\/AERO.2011.5747291."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Altmann J. and Sauer F. 2017. Autonomous weapon systems and strategic stability. Survival. 59 5 (2017). 117\u2013142 doi: https:\/\/10.1080\/00396338.2017.1375263.","DOI":"10.1080\/00396338.2017.1375263"}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:47:52Z","timestamp":1767581272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":80,"alternative-id":["10.1145\/3590837.3590856","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590856","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}