{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:37:03Z","timestamp":1770971823995,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cec.2013.6557976","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T18:57:12Z","timestamp":1374778632000},"page":"3315-3322","source":"Crossref","is-referenced-by-count":1,"title":["Welfare State Optimization"],"prefix":"10.1109","author":[{"given":"Hamid","family":"Ali","sequence":"first","affiliation":[]},{"given":"Farrukh Aslam","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1332\/030557311X603592"},{"key":"17","first-page":"111","author":"paul edwards","year":"1999","journal-title":"The Global Economy National States and the Regulation of Labour"},{"key":"18","author":"gosta","year":"1990","journal-title":"The Three Worlds of Welfare Capitalism"},{"key":"15","first-page":"204","article-title":"Darrell Whitley: Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks","author":"dewri","year":"2007","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"16","year":"0","journal-title":"Welfare State (2012 August) Britannica Online Encyclopedia"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4018\/IJSIR.2011100103"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-983-1_14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-008045157-2\/50081-X"},{"key":"21","doi-asserted-by":"crossref","first-page":"22","DOI":"10.2307\/3088901","article-title":"Determinants of relative poverty in advanced capitalist democracies","volume":"68","author":"bradley","year":"2003","journal-title":"American Sociological Review"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/77.3.1119"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/4235.985692"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SIS.2003.1202264"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2010.2090460"},{"key":"25","first-page":"156","article-title":"An improved particle swarm optimization for nonconvex economic dispatch problems","volume":"25","author":"park","year":"2010","journal-title":"IEEE Transcations on Evolutionary Computation"},{"key":"26","first-page":"12","article-title":"Extending the computer defens e immune system: Network intrusion detection with multiobjective evolutionary programming approach","author":"anchor","year":"2002","journal-title":"ICARIS 1st International Conference on Artificial Immune Systems Conference Proceedings"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-012-0890-9"},{"key":"28","first-page":"61","volume":"9","author":"poolsappasit","year":"2012","journal-title":"Indrajit ray Dynamic security risk management using bayesian attack graphs"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1963.1105511"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1137\/0704010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.7249\/R366","author":"dantzig","year":"1963","journal-title":"Linear Programming and Extensions Princeton"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1995.3.1.1"},{"key":"6","author":"goldberg","year":"1989","journal-title":"Genetic Algorithms in Search Optimization and Machine Learning"},{"key":"5","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(77)81007-2"},{"key":"9","author":"rechenberg","year":"1965","journal-title":"Cybernetic solution path of an experimental problem"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45224-9_42"}],"event":{"name":"2013 IEEE Congress on Evolutionary Computation (CEC)","location":"Cancun, Mexico","start":{"date-parts":[[2013,6,20]]},"end":{"date-parts":[[2013,6,23]]}},"container-title":["2013 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6552460\/6557545\/06557976.pdf?arnumber=6557976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,31]],"date-time":"2020-07-31T18:49:11Z","timestamp":1596221351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6557976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cec.2013.6557976","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}