{"id":"https://openalex.org/W4401215466","doi":"https://doi.org/10.1145/3638530.3654170","title":"A Secure Simulation-optimisation Framework for Fleet Mix Problem: A Defence-based Real-world Application","display_name":"A Secure Simulation-optimisation Framework for Fleet Mix Problem: A Defence-based Real-world Application","publication_year":2024,"publication_date":"2024-07-14","ids":{"openalex":"https://openalex.org/W4401215466","doi":"https://doi.org/10.1145/3638530.3654170"},"language":"en","primary_location":{"id":"doi:10.1145/3638530.3654170","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638530.3654170","pdf_url":null,"source":{"id":"https://openalex.org/S4363608771","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078834608","display_name":"Sara Salim","orcid":"https://orcid.org/0000-0002-0577-4625"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sara Salim","raw_affiliation_strings":["School of Systems and Computing, University of New South Wales, Canberra, Australia"],"raw_orcid":"https://orcid.org/0000-0002-0577-4625","affiliations":[{"raw_affiliation_string":"School of Systems and Computing, University of New South Wales, Canberra, Australia","institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091228487","display_name":"Ismail Ali","orcid":"https://orcid.org/0000-0001-5925-1988"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ismail Ali","raw_affiliation_strings":["Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia"],"raw_orcid":"https://orcid.org/0000-0001-5925-1988","affiliations":[{"raw_affiliation_string":"Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073334916","display_name":"Sondoss Elsawah","orcid":"https://orcid.org/0000-0002-3485-9548"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sondoss Elsawah","raw_affiliation_strings":["Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3485-9548","affiliations":[{"raw_affiliation_string":"Capability Systems Centre, School of Systems and Computing, University of New South Wales, Canberra, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078834608"],"corresponding_institution_ids":["https://openalex.org/I188329596","https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":1.7113,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86238532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"207","last_page":"210"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11814","display_name":"Advanced Manufacturing and Logistics Optimization","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11814","display_name":"Advanced Manufacturing and Logistics Optimization","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14082","display_name":"Modeling, Simulation, and Optimization","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2607","display_name":"Discrete Mathematics and Combinatorics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6900345087051392},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3691200613975525},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.32543283700942993},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1662096381187439}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6900345087051392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3691200613975525},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.32543283700942993},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1662096381187439}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3638530.3654170","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3638530.3654170","pdf_url":null,"source":{"id":"https://openalex.org/S4363608771","display_name":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1975806532","https://openalex.org/W2179740345","https://openalex.org/W2897554731","https://openalex.org/W3154068015","https://openalex.org/W3181883774","https://openalex.org/W3187314034","https://openalex.org/W4200368395","https://openalex.org/W4256349370","https://openalex.org/W4303520942"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,27,50,104],"secure":[4,53,76],"simulation-optimisation":[5],"framework":[6,39],"tailored":[7],"for":[8,24,31,52],"defence":[9,68],"scenarios,":[10],"balancing":[11],"robust":[12,41],"decision-making":[13,42],"with":[14,87],"data":[15,35,44,60],"confidentiality.":[16],"It":[17],"integrates":[18],"an":[19,57],"enhanced":[20],"genetic":[21],"algorithm":[22],"(GA)":[23],"solution":[25],"generation,":[26],"comprehensive":[28],"simulation":[29],"model":[30],"evaluation,":[32],"and":[33,43,48,72,93,98,102,113],"advanced":[34],"security":[36],"techniques.":[37],"The":[38],"prioritises":[40],"security,":[45],"fostering":[46],"collaboration":[47],"setting":[49],"standard":[51],"information":[54,77],"sharing.":[55,78],"With":[56],"emphasis":[58],"on":[59,75],"confidentiality,":[61],"it":[62],"outlines":[63],"key":[64],"components,":[65],"applications":[66],"to":[67],"fleet":[69],"mix":[70],"problems,":[71],"potential":[73],"impacts":[74],"Experimental":[79],"results":[80],"show":[81],"superior":[82],"performance":[83],"over":[84],"alternative":[85],"algorithms,":[86],"average":[88],"success":[89],"rates":[90],"of":[91,107],"3.19%":[92],"6.34%":[94],"in":[95],"total":[96],"cost":[97],"computational":[99],"time,":[100],"respectively,":[101],"achieving":[103],"100%":[105],"transformation":[106],"defence-sensitive":[108],"data,":[109],"highlighting":[110],"its":[111],"efficacy":[112],"security.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
