{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:54Z","timestamp":1750221234992,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T00:00:00Z","timestamp":1530835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,6]]},"DOI":"10.1145\/3205651.3208270","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1640-1647","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Evolution of network enumeration strategies in emulated computer networks"],"prefix":"10.1145","author":[{"given":"Sean","family":"Harris","sequence":"first","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Eric","family":"Michalak","sequence":"additional","affiliation":[{"name":"Los Alamos National Laboratory"}]},{"given":"Kevin","family":"Schoonover","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Adam","family":"Gausmann","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Hannah","family":"Reinbolt","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Joshua","family":"Herman","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Daniel","family":"Tauritz","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]},{"given":"Chris","family":"Rawlings","sequence":"additional","affiliation":[{"name":"Los Alamos National Laboratory"}]},{"given":"Aaron Scott","family":"Pope","sequence":"additional","affiliation":[{"name":"Missouri University of Science and Technology"}]}],"member":"320","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.910462"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.819263"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754649"},{"key":"e_1_3_2_1_5_1","unstructured":"Jonathan Crussell Jeremy Erickson David Fritz and John Floren minimega v. 3.0 version 00. https:\/\/www.osti.gov\/\/servlets\/purl\/1312788\/ 2015.  Jonathan Crussell Jeremy Erickson David Fritz and John Floren minimega v. 3.0 version 00. https:\/\/www.osti.gov\/\/servlets\/purl\/1312788\/ 2015."},{"key":"e_1_3_2_1_6_1","unstructured":"Michael DeHaan. Ansible. https:\/\/www.ansible.com\/ 2012.  Michael DeHaan. Ansible. https:\/\/www.ansible.com\/ 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-012-0965-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3067695.3076081"},{"key":"e_1_3_2_1_9_1","unstructured":"Dor Green. Pyshark. http:\/\/kiminewt.github.io\/pyshark\/ 12 2013.  Dor Green. Pyshark. http:\/\/kiminewt.github.io\/pyshark\/ 12 2013."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.915993"},{"key":"e_1_3_2_1_11_1","first-page":"768","volume-title":"Proceedings of the Eleventh International Joint Conference on Artificial Intelligence IJCAI-89","volume":"1","author":"Koza John R.","year":"1989"},{"key":"e_1_3_2_1_12_1","unstructured":"Gordon Lyon. Nmap. https:\/\/nmap.org\/ 1997.  Gordon Lyon. Nmap. https:\/\/nmap.org\/ 1997."},{"key":"e_1_3_2_1_13_1","unstructured":"MarketsandMarkets. Penetration testing market worth 1 724.3 million usd by 2021. https:\/\/www.marketsandmarkets.com\/PressReleases\/penetration-testing.asp 2016.  MarketsandMarkets. Penetration testing market worth 1 724.3 million usd by 2021. https:\/\/www.marketsandmarkets.com\/PressReleases\/penetration-testing.asp 2016."},{"key":"e_1_3_2_1_14_1","first-page":"121","volume-title":"Genetic Programming","author":"Julian","year":"2000"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1995.3.2.199"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2016.0090"},{"key":"e_1_3_2_1_17_1","unstructured":"Savon Noir. Libnmap. https:\/\/libnmap.readthedocs.io\/ 5 2013.  Savon Noir. Libnmap. https:\/\/libnmap.readthedocs.io\/ 5 2013."},{"key":"e_1_3_2_1_18_1","unstructured":"Red Hat Inc. Libvirt virtualization api. https:\/\/libvirt.org\/ 2005.  Red Hat Inc. Libvirt virtualization api. https:\/\/libvirt.org\/ 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"George Rush. Cyber security research frameworks for coevolutionary network defense. Master's thesis Missouri University of Science and Technology Missouri S&T Rolla MO 65409 Fall 2015.  George Rush. Cyber security research frameworks for coevolutionary network defense. Master's thesis Missouri University of Science and Technology Missouri S&T Rolla MO 65409 Fall 2015.","DOI":"10.2172\/1228072"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768429"},{"key":"e_1_3_2_1_21_1","unstructured":"Xiaokui Shu Ke Tian Andrew Ciambrone and Danfeng Yao. Breaking the Target: An Analysis of Target Data Breach and Lessons Learned. CoRR abs\/1701.04940 2017.  Xiaokui Shu Ke Tian Andrew Ciambrone and Danfeng Yao. Breaking the Target: An Analysis of Target Data Breach and Lessons Learned. CoRR abs\/1701.04940 2017."},{"key":"e_1_3_2_1_22_1","unstructured":"United States Computer Emergency Readiness Team. Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-074A\/ March 2018.  United States Computer Emergency Readiness Team. Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-074A\/ March 2018."}],"event":{"name":"GECCO '18: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Kyoto Japan","acronym":"GECCO '18"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3208270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205651.3208270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:14Z","timestamp":1750212434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3208270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,6]]},"references-count":22,"alternative-id":["10.1145\/3205651.3208270","10.1145\/3205651"],"URL":"https:\/\/doi.org\/10.1145\/3205651.3208270","relation":{},"subject":[],"published":{"date-parts":[[2018,7,6]]},"assertion":[{"value":"2018-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}