{"id":"https://openalex.org/W2992542352","doi":"https://doi.org/10.1109/milcom47813.2019.9021038","title":"When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense","display_name":"When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W2992542352","doi":"https://doi.org/10.1109/milcom47813.2019.9021038","mag":"2992542352"},"language":"en","primary_location":{"id":"doi:10.1109/milcom47813.2019.9021038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9021038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1912.01959","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083793785","display_name":"Paul Th\u00e9ron","orcid":"https://orcid.org/0000-0003-1103-5615"},"institutions":[{"id":"https://openalex.org/I1280737905","display_name":"\u00c9cole de l'air et de l'espace","ror":"https://ror.org/01gtsrs29","country_code":"FR","type":"education","lineage":["https://openalex.org/I1280737905"]},{"id":"https://openalex.org/I1283236314","display_name":"Thales (Portugal)","ror":"https://ror.org/051w1mx35","country_code":"PT","type":"company","lineage":["https://openalex.org/I1283236314","https://openalex.org/I4210140930"]},{"id":"https://openalex.org/I4210140930","display_name":"Thales (France)","ror":"https://ror.org/04emwm605","country_code":"FR","type":"company","lineage":["https://openalex.org/I4210140930"]}],"countries":["FR","PT"],"is_corresponding":true,"raw_author_name":"Paul Theron","raw_affiliation_strings":["Thales, Aerospace Cyber Resilience, (Cyb'Air) Research Chair, Salon de Provence, France","Thales Group#TAB#"],"affiliations":[{"raw_affiliation_string":"Thales, Aerospace Cyber Resilience, (Cyb'Air) Research Chair, Salon de Provence, France","institution_ids":["https://openalex.org/I1280737905","https://openalex.org/I4210140930"]},{"raw_affiliation_string":"Thales Group#TAB#","institution_ids":["https://openalex.org/I1283236314"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012477590","display_name":"Alexander Kott","orcid":"https://orcid.org/0000-0003-1147-9726"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alxander Kott","raw_affiliation_strings":["U.S. Army Combat Capabilities Development, Army Research Laboratory, Adelphi, MD, USA","U.S. Army Combat Capabilities Development, Army Research Laboratory,Adelphi,MD,USA"],"affiliations":[{"raw_affiliation_string":"U.S. Army Combat Capabilities Development, Army Research Laboratory, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]},{"raw_affiliation_string":"U.S. Army Combat Capabilities Development, Army Research Laboratory,Adelphi,MD,USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083793785"],"corresponding_institution_ids":["https://openalex.org/I1280737905","https://openalex.org/I1283236314","https://openalex.org/I4210140930"],"apc_list":null,"apc_paid":null,"fwci":0.3523,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71522071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7181863188743591},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.647244930267334},{"id":"https://openalex.org/keywords/anticipation","display_name":"Anticipation (artificial intelligence)","score":0.608785092830658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.571604311466217},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.5482276082038879},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5339131951332092},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.480352520942688},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.456418514251709},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.422279417514801},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1993020474910736},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13298282027244568}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7181863188743591},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.647244930267334},{"id":"https://openalex.org/C176777502","wikidata":"https://www.wikidata.org/wiki/Q4774623","display_name":"Anticipation (artificial intelligence)","level":2,"score":0.608785092830658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.571604311466217},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.5482276082038879},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5339131951332092},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.480352520942688},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.456418514251709},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.422279417514801},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1993020474910736},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13298282027244568},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/milcom47813.2019.9021038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9021038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1912.01959","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.01959","pdf_url":"https://arxiv.org/pdf/1912.01959","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2992542352","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/1912.01959.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1912.01959","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1912.01959","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1912.01959","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.01959","pdf_url":"https://arxiv.org/pdf/1912.01959","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2992542352.pdf","grobid_xml":"https://content.openalex.org/works/W2992542352.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W132732249","https://openalex.org/W385791021","https://openalex.org/W1511784627","https://openalex.org/W1530439477","https://openalex.org/W1644473242","https://openalex.org/W2045045799","https://openalex.org/W2096130600","https://openalex.org/W2122410182","https://openalex.org/W2151893596","https://openalex.org/W2551683225","https://openalex.org/W2963398124","https://openalex.org/W2973902696","https://openalex.org/W3000706966","https://openalex.org/W3039092920","https://openalex.org/W6605418633","https://openalex.org/W6613271780","https://openalex.org/W6631498858","https://openalex.org/W6729507676","https://openalex.org/W6768091506"],"related_works":["https://openalex.org/W3011158691","https://openalex.org/W2798350025","https://openalex.org/W874857290","https://openalex.org/W1248392509","https://openalex.org/W2769450352","https://openalex.org/W3168733972","https://openalex.org/W2188211285","https://openalex.org/W2759942926","https://openalex.org/W3173866893","https://openalex.org/W2218014804","https://openalex.org/W2112491692","https://openalex.org/W2274765593","https://openalex.org/W2075894124","https://openalex.org/W219939853","https://openalex.org/W3038682671","https://openalex.org/W2488774107","https://openalex.org/W350155893","https://openalex.org/W2905358853","https://openalex.org/W3003733781","https://openalex.org/W2886342430"],"abstract_inverted_index":{"In":[0],"the":[1,4,30,86,105,111,156,199,201,205,217,220,231,242,249,259],"coming":[2,260],"years,":[3,261],"future":[5,165],"of":[6,85,110,150,161,177,198,204,219],"military":[7,166],"combat":[8],"will":[9,49,72,82,172,184],"include,":[10],"on":[11,29,241],"one":[12],"hand,":[13,32],"artificial":[14],"intelligence-optimized":[15],"complex":[16,60],"command,":[17],"control,":[18],"communications,":[19],"computers,":[20],"intelligence,":[21],"surveillance":[22],"and":[23,26,58,62,66,77,121,127,129,137,152,169,190,210,223,264],"reconnaissance":[24],"(C4ISR)":[25],"networks":[27,120,189],"and,":[28],"other":[31],"autonomous":[33,37,56,78,178],"intelligent":[34,38,79,179],"Things":[35,39,57],"fighting":[36],"at":[40],"a":[41,147],"fast":[42,101],"pace.":[43],"Under":[44],"this":[45,195,208],"perspective,":[46],"enemy":[47],"forces":[48],"seek":[50],"to":[51,99,104,164],"disable":[52],"or":[53,97,108,114],"disturb":[54],"our":[55,59,69,119,188],"infrastructures":[61],"systems.":[63,191],"Autonomy,":[64],"scale":[65,107],"complexity":[67,109],"in":[68,159,207,258],"defense":[70,144,157],"systems":[71,113,168],"trigger":[73],"new":[74,148],"cyber-attack":[75],"strategies,":[76],"malware":[80],"(AIM)":[81],"be":[83,124,132,173,256],"part":[84],"picture.":[87],"Should":[88],"these":[89],"cyber-attacks":[90],"succeed":[91],"while":[92],"human":[93],"operators":[94],"remain":[95],"unaware":[96],"unable":[98],"react":[100],"enough":[102],"due":[103],"speed,":[106],"mission,":[112],"attacks,":[115],"missions":[116],"would":[117,123,131],"fail,":[118],"C4ISR":[122],"heavily":[125],"disrupted,":[126],"command":[128],"control":[130],"disabled.":[133],"New":[134],"cyber-defense":[135,180,196],"doctrines":[136],"technologies":[138],"are":[139],"therefore":[140],"required.":[141],"Autonomous":[142],"cyber":[143],"(ACyD)":[145],"is":[146],"field":[149,209],"research":[151,233],"technology":[153,197],"driven":[154],"by":[155],"sector":[158],"anticipation":[160],"such":[162],"threats":[163],"infrastructures,":[167],"operations.":[170],"It":[171],"implemented":[174],"via":[175],"swarms":[176],"agents":[181],"(AICAs)":[182],"that":[183,254],"fight":[185],"AIM":[186],"within":[187],"This":[192],"paper":[193],"presents":[194],"future,":[200],"current":[202,232],"state":[203],"art":[206],"its":[211,224],"main":[212,251],"challenges.":[213],"First,":[214],"we":[215,229],"review":[216],"rationale":[218],"ACyD":[221],"concept":[222],"associated":[225],"AICA":[226,243],"technology.":[227],"Then,":[228],"present":[230],"results":[234],"from":[235],"NATO's":[236],"IST-152":[237],"Research":[238],"Task":[239],"Group":[240],"Reference":[244],"Architecture.":[245],"We":[246],"then":[247],"develop":[248],"12":[250],"technological":[252],"challenges":[253],"must":[255],"resolved":[257],"besides":[262],"ethical":[263],"political":[265],"issues.":[266]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
