{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:50Z","timestamp":1750309250453,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,14]]},"DOI":"10.1145\/3638529.3654035","type":"proceedings-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T16:33:04Z","timestamp":1720456384000},"page":"1309-1317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3862-3778","authenticated-orcid":false,"given":"Huy","family":"Ngo","sequence":"first","affiliation":[{"name":"The University of Adelaide, Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3478-9201","authenticated-orcid":false,"given":"Mingyu","family":"Guo","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1028-920X","authenticated-orcid":false,"given":"Hung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"The University of Adelaide, Adelaide, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,7,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_18"},{"key":"e_1_3_2_1_2_1","unstructured":"Evgeny Bogokovsky and Andrey Karpovsky. 2022. Detecting malicious key extractions by compromised identities for Azure Cosmos DB. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/23\/detecting-malicious-key-extractions-by-compromised-identities-for-azure-cosmos-db\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299904.3340307"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449639.3459364"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449639.3459363"},{"key":"e_1_3_2_1_6_1","unstructured":"Yoav Daniely. 2021. What's new: Microsoft Sentinel Deception Solution. https:\/\/techcommunity.microsoft.com\/t5\/microsoft-sentinel-blog\/whats-new-microsoft-sentinel-deception-solution\/ba-p\/2904945."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3561974"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629605"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583131.3590436"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512290.3528729"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i9.21167"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i18.30059"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i5.25701"},{"key":"e_1_3_2_1_14_1","unstructured":"Evald Markinzon. 2023. Ignite News: Augment your EDR with deception tactics to catch adversaries early. https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/ignite-news-augment-your-edr-with-deception-tactics-to-catch\/ba-p\/3982253."},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft. 2023. Microsoft Digital Defense Report. https:\/\/www.microsoft.com\/en\/security\/security-insider\/microsoft-digital-defense-report-2023\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621210"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Huy Quang Ngo Mingyu Guo and Hung Nguyen. 2024. Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys (Extended Version). https:\/\/arxiv.org\/abs\/2403.18162.","DOI":"10.1145\/3638529.3654035"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449639.3459384"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205651.3208266"},{"key":"e_1_3_2_1_20_1","unstructured":"Andy Robbins. 2023. \"Bloodhound: Six Degrees of domain admin. https:\/\/github.com\/BloodHoundAD\/BloodHound. Accessed: 2022-08-02."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830569"},{"key":"e_1_3_2_1_22_1","unstructured":"Rohan Vazarkar. [n. d.]. SharpHound - C# Rewrite of the BloodHound Ingestor. https:\/\/github.com\/BloodHoundAD\/SharpHound3. Accessed: 2022-08-02."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732939.2732945"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054103001728"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3590343"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2019.07.006"}],"event":{"name":"GECCO '24: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Melbourne VIC Australia","acronym":"GECCO '24"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638529.3654035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638529.3654035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:50Z","timestamp":1750291010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638529.3654035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,14]]},"references-count":26,"alternative-id":["10.1145\/3638529.3654035","10.1145\/3638529"],"URL":"https:\/\/doi.org\/10.1145\/3638529.3654035","relation":{},"subject":[],"published":{"date-parts":[[2024,7,14]]},"assertion":[{"value":"2024-07-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}