{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:45:21Z","timestamp":1763459121526,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC52-06NA25396"],"award-info":[{"award-number":["DE-AC52-06NA25396"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,7,11]]},"DOI":"10.1145\/2739482.2768429","type":"proceedings-article","created":{"date-parts":[[2015,7,10]],"date-time":"2015-07-10T10:10:55Z","timestamp":1436523055000},"page":"859-866","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES)"],"prefix":"10.1145","author":[{"given":"George","family":"Rush","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO, USA"}]},{"given":"Daniel R.","family":"Tauritz","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology, Rolla, MO, USA"}]},{"given":"Alexander D.","family":"Kent","sequence":"additional","affiliation":[{"name":"Los Alamos National Laboratory, Los Alamos, NM, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Santa Fe Institute Complex Systems Summer School","author":"Arnold H.","year":"2013","unstructured":"H. Arnold, D. Masad, G. A. Pagani, J. Schmidt, and E. Stepanova. NetAttack: Co-Evolution of Network and Attacker. In Proceedings of the Santa Fe Institute Complex Systems Summer School 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.30"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645300.648375"},{"key":"e_1_3_2_1_4_1","first-page":"66","volume-title":"Leveraging Sociological Models for Prediction I: Inferring Adversarial Relationships. In 2012 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Colbaugh R.","year":"2012","unstructured":"R. Colbaugh and K. Glass. Leveraging Sociological Models for Prediction I: Inferring Adversarial Relationships. In 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 66--71. IEEE, 2012."},{"key":"e_1_3_2_1_5_1","first-page":"2721","volume-title":"Predictability-Oriented Defense Against Adaptive Adversaries. In 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","author":"Colbaugh R.","year":"2012","unstructured":"R. Colbaugh and K. Glass. Predictability-Oriented Defense Against Adaptive Adversaries. In 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pages 2721--2727, 2012."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Grana D. Wolpert J. Neil D. Xie T. Bhattacharya and R. Bent. HMMs for Optimal Detection of Cybernet Attacks. Technical Report SFI-2014-06-022 Santa Fe Institute June 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546802"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Now Hear This--The Asymmetric Nature of Cyber Warfare","volume":"138","author":"Phillips A. T.","year":"2012","unstructured":"A. T. Phillips. Now Hear This--The Asymmetric Nature of Cyber Warfare. In US Naval Institute, volume 138\/10\/1,316, Oct. 2012.","journal-title":"US Naval Institute"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AUTEST.2010.5613581"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"441","volume":"5","author":"Service T.","year":"2009","unstructured":"T. Service and D. Tauritz. Increasing Infrastructure Resilience Through Competitive Coevolution. New Mathematics and Natural Computation, 5(2):441--457, July 2009.","journal-title":"Increasing Infrastructure Resilience Through Competitive Coevolution. New Mathematics and Natural Computation"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382255"}],"event":{"name":"GECCO '15: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Madrid Spain","acronym":"GECCO '15"},"container-title":["Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739482.2768429","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2739482.2768429","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2739482.2768429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:39:29Z","timestamp":1763458769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2739482.2768429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,11]]},"references-count":12,"alternative-id":["10.1145\/2739482.2768429","10.1145\/2739482"],"URL":"https:\/\/doi.org\/10.1145\/2739482.2768429","relation":{},"subject":[],"published":{"date-parts":[[2015,7,11]]},"assertion":[{"value":"2015-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}