{"id":"https://openalex.org/W4400412471","doi":"https://doi.org/10.1145/3638529.3654035","title":"Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys","display_name":"Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400412471","doi":"https://doi.org/10.1145/3638529.3654035"},"language":"en","primary_location":{"id":"doi:10.1145/3638529.3654035","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638529.3654035","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041852125","display_name":"Huy Q. Ngo","orcid":"https://orcid.org/0000-0002-3862-3778"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Huy Ngo","raw_affiliation_strings":["The University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019911052","display_name":"Mingyu Guo","orcid":"https://orcid.org/0000-0002-3478-9201"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mingyu Guo","raw_affiliation_strings":["The University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056718700","display_name":"Hung Nguyen","orcid":"https://orcid.org/0000-0003-1028-920X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hung Nguyen","raw_affiliation_strings":["The University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"The University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041852125"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":1.67,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.86144578,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1309","last_page":"1317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7659280896186829},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.5445038676261902},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33993247151374817},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11372128129005432}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7659280896186829},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.5445038676261902},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33993247151374817},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11372128129005432}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3638529.3654035","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638529.3654035","pdf_url":null,"source":{"id":"https://openalex.org/S4363608932","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1984196269","https://openalex.org/W2105899518","https://openalex.org/W2158934842","https://openalex.org/W2244843312","https://openalex.org/W2820704872","https://openalex.org/W2948946638","https://openalex.org/W2968468046","https://openalex.org/W3094271017","https://openalex.org/W3157300370","https://openalex.org/W3158742555","https://openalex.org/W3166879119","https://openalex.org/W3171223926","https://openalex.org/W4223411023","https://openalex.org/W4225631948","https://openalex.org/W4294876381","https://openalex.org/W4296918257","https://openalex.org/W4382239480","https://openalex.org/W4383221437","https://openalex.org/W4384024269","https://openalex.org/W4393161089","https://openalex.org/W4400412471","https://openalex.org/W4401508381"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W3115906952","https://openalex.org/W3134811395","https://openalex.org/W3155196058","https://openalex.org/W4252960523","https://openalex.org/W1529821365","https://openalex.org/W2135486207","https://openalex.org/W1499611046","https://openalex.org/W3024420453"],"abstract_inverted_index":{"Microsoft":[0],"Active":[1],"Directory":[2],"(AD)":[3],"is":[4,97,118],"the":[5,16,30,47,56,85,100,103,107,114,121,126,132,136,158,162,166,185,192,202],"default":[6],"security":[7],"management":[8],"system":[9],"for":[10,157,173,210],"Window":[11],"domain":[12],"network.":[13],"We":[14,28,75,130],"study":[15],"problem":[17,31],"of":[18,52,87,135,154,165,188],"placing":[19],"decoys":[20,53],"in":[21,91,191],"AD":[22,43,189],"network":[23],"to":[24,54,61,66,83,110,119,125,142,204],"detect":[25,55],"potential":[26],"attacks.":[27],"model":[29],"as":[32,99],"a":[33,40,50,77],"Stackelberg":[34],"game":[35],"between":[36],"an":[37,181],"attacker":[38,57],"and":[39],"defender":[41,48],"on":[42,58],"attack":[44,73,93,128],"graphs":[45],"where":[46],"employs":[49],"set":[51],"their":[59],"way":[60],"Domain":[62],"Admin":[63],"(DA).":[64],"Contrary":[65],"previous":[67],"works,":[68],"we":[69,179,196],"consider":[70],"time-varying":[71],"(temporal)":[72],"graphs.":[74,94,175,212],"proposed":[76,180],"novel":[78],"metric":[79],"called":[80],"response":[81,123],"time,":[82],"measure":[84],"effectiveness":[86],"our":[88],"decoy":[89,109],"placement":[90],"temporal":[92,193],"Response":[95],"time":[96,124],"defined":[98],"duration":[101],"from":[102],"moment":[104],"attackers":[105],"trigger":[106],"first":[108],"when":[111],"they":[112],"compromise":[113],"DA.":[115],"Our":[116],"goal":[117],"maximize":[120],"defender's":[122,137],"worst-case":[127],"paths.":[129],"establish":[131],"NP-hard":[133],"nature":[134,164,187],"optimization":[138,159],"problem,":[139],"leading":[140],"us":[141],"develop":[143],"Evolutionary":[144],"Diversity":[145],"Optimization":[146],"(EDO)":[147],"algorithms.":[148],"EDO":[149],"algorithms":[150],"identify":[151],"diverse":[152],"sets":[153],"high-quality":[155],"solutions":[156],"problem.":[160],"Despite":[161],"polynomial":[163],"fitness":[167],"function,":[168],"it":[169],"proves":[170],"experimentally":[171],"slow":[172],"larger":[174,211],"To":[176],"enhance":[177],"scalability,":[178],"algorithm":[182],"that":[183],"exploits":[184],"static":[186],"infrastructure":[190],"setting.":[194],"Then,":[195],"introduce":[197],"problem-tailored":[198],"repair":[199],"operations,":[200],"ensuring":[201],"convergence":[203],"better":[205],"results":[206],"while":[207],"maintaining":[208],"scalability":[209]},"counts_by_year":[{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
