{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:29:41Z","timestamp":1760027381511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T00:00:00Z","timestamp":1720915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,14]]},"DOI":"10.1145\/3638530.3654170","type":"proceedings-article","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T14:54:43Z","timestamp":1722524083000},"page":"207-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Secure Simulation-optimisation Framework for Fleet Mix Problem: A Defence-based Real-world Application"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0577-4625","authenticated-orcid":false,"given":"Sara","family":"Salim","sequence":"first","affiliation":[{"name":"School of Systems and Computing, University of New South Wales, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5925-1988","authenticated-orcid":false,"given":"Ismail","family":"Ali","sequence":"additional","affiliation":[{"name":"Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3485-9548","authenticated-orcid":false,"given":"Sondoss","family":"Elsawah","sequence":"additional","affiliation":[{"name":"Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2018.8477916"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118964"},{"key":"e_1_3_2_1_3_1","first-page":"5","article-title":"Smart grid: Overview, issues and opportunities. advances and challenges in sensing, modeling, simulation, optimization and control","volume":"17","author":"Amin S Massoud","year":"2011","unstructured":"S Massoud Amin. 2011. Smart grid: Overview, issues and opportunities. advances and challenges in sensing, modeling, simulation, optimization and control. European Journal of Control 17, 5--6 (2011), 547--567.","journal-title":"European Journal of Control"},{"volume-title":"Machine Learning for Practical Decision Making: A Multidisciplinary Perspective with Applications from Healthcare, Engineering and Business Analytics","author":"Morr Christo El","key":"e_1_3_2_1_4_1","unstructured":"Christo El Morr, Manar Jammal, Hossam Ali-Hassan, and Walid El-Hallak. 2022. Data Preprocessing. In Machine Learning for Practical Decision Making: A Multidisciplinary Perspective with Applications from Healthcare, Engineering and Business Analytics. Springer, 117--163."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS52264.2021.9470718"},{"volume-title":"Design principles and methodologies","author":"Freddi Alessandro","key":"e_1_3_2_1_6_1","unstructured":"Alessandro Freddi and Mario Salmon. 2019. Introduction to the Taguchi method. In Design principles and methodologies. Springer, 159--180."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-021-00737-3"},{"key":"e_1_3_2_1_8_1","unstructured":"Marcus Hellyer. 2020. The Cost of Defence 2020--2021. Part 2: ASPI Defence Budget Brief | Australian Strategic Policy Institute | ASPI. https:\/\/www.aspi.org.au\/report\/cost-defence-2020-2021-part-2-aspi-defence-budget-brief. (Accessed on 11\/05\/2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Rohit Ravindra Nikam and Rekha Shahapurkar. 2021. Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data.","DOI":"10.3233\/APC210221"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Xiao Song Yulin Wu Yaofei Ma Yong Cui Guanghong Gong et al. 2015. Military simulation big data: background state of the art and challenges. Mathematical Problems in Engineering 2015 (2015).","DOI":"10.1155\/2015\/298356"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2021.04.010"}],"event":{"name":"GECCO '24 Companion: Genetic and Evolutionary Computation Conference Companion","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Melbourne VIC Australia","acronym":"GECCO '24 Companion"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638530.3654170","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3638530.3654170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:55Z","timestamp":1750291015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3638530.3654170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,14]]},"references-count":11,"alternative-id":["10.1145\/3638530.3654170","10.1145\/3638530"],"URL":"https:\/\/doi.org\/10.1145\/3638530.3654170","relation":{},"subject":[],"published":{"date-parts":[[2024,7,14]]},"assertion":[{"value":"2024-08-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}