{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:11:09Z","timestamp":1730297469718,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/smartworld-uic-atc-scalcom-iop-sci.2019.00098","type":"proceedings-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T03:03:00Z","timestamp":1586487780000},"page":"317-322","source":"Crossref","is-referenced-by-count":0,"title":["AI and Information Warfare in 2025"],"prefix":"10.1109","author":[{"given":"David","family":"Wright","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-04602-6"},{"key":"ref11","article-title":"UK begins to formalise its legal approach to cyber war","author":"martin","year":"2018","journal-title":"SKY News"},{"key":"ref12","article-title":"‘Nearly All’ of the Pentagon’s New Weapons Systems Are Vulnerable to Hacking","volume":"10","year":"2018","journal-title":"The Daily Beast"},{"key":"ref13","article-title":"Britain 'rehearses cyber-strike to black out Moscow' in the event of Russia attacking the West as thousands of UK troops stage biggest war-games exercise in a decade","volume":"7","author":"ardehali","year":"2018","journal-title":"Daily Mail"},{"key":"ref14","article-title":"U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms","volume":"26","author":"nakashima","year":"2019","journal-title":"The Washington Post"},{"key":"ref4","article-title":"Hackers Have Already Started to Weaponize Artificial Intelligence","author":"dvorsky","year":"2017","journal-title":"Gizmodo"},{"key":"ref3","article-title":"The Machines That Will Fight the Social Media Wars of Tomorrow","author":"singer","year":"2018","journal-title":"Gizmodo"},{"key":"ref6","article-title":"Weaponizing Artificial Intelligence: The Scary Prospect Of AI-Enabled Terrorism","volume":"23","author":"marr","year":"2018","journal-title":"Forbes"},{"key":"ref5","article-title":"EU privacy law says companies need to explain the algorithms they use","author":"maccarthy","year":"2017","journal-title":"CIO"},{"key":"ref8","article-title":"Thousands of leading AI researchers sign pledge against killer robots","volume":"18","author":"sample","year":"2018","journal-title":"The Guardian"},{"key":"ref7","article-title":"Future Crimea","author":"goodman","year":"2015","journal-title":"Corgi Books"},{"key":"ref2","article-title":"Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information","volume":"9","author":"kilovaty","year":"2018","journal-title":"Harvard National Security Journal"},{"key":"ref1","article-title":"On Cyber-Enabled Information Warfare and Influence Operations","volume":"2019","author":"lin","year":"0","journal-title":"The Oxford Handbook of Cybersecurity"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2018.0089"}],"event":{"name":"2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2019,8,19]]},"location":"Leicester, United Kingdom","end":{"date-parts":[[2019,8,23]]}},"container-title":["2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9036713\/9060076\/09060412.pdf?arnumber=9060412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:51:24Z","timestamp":1658155884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9060412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/smartworld-uic-atc-scalcom-iop-sci.2019.00098","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}