{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:01:10Z","timestamp":1726063270771},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030383633"},{"type":"electronic","value":"9783030383640"}],"license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38364-0_29","type":"book-chapter","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T09:07:51Z","timestamp":1576746471000},"page":"323-334","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Survey on Forecasting Models for Preventing Terrorism"],"prefix":"10.1007","author":[{"given":"Botambu","family":"Collins","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh Tuyen","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"HyoJeon","family":"Yoon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ngoc Thanh","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dosam","family":"Hwang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"key":"29_CR1","unstructured":"Bassil, Y.: The 2003 Iraq war: operations, causes, and consequences. OSR J. Human. Soc. Sci. (JHSS) (2012). ISSN 2279-0837"},{"key":"29_CR2","unstructured":"Bunn, M.G., Malin, M.B., Roth, N.J., Tobey, W.H.: Preventing Nuclear Terrorism: Continuous Improvement or Dangerous Decline? pp. 12\u201331. Havard University Press (2016)"},{"key":"29_CR3","unstructured":"Chuang, Y.l., D\u2019Orsogna, M.R.: Mathematical models of radicalization and terrorism. arXiv preprint arXiv:1903.08485 (2019)"},{"issue":"4","key":"29_CR4","doi-asserted-by":"publisher","first-page":"379","DOI":"10.2307\/421717","volume":"13","author":"Martha Crenshaw","year":"1981","unstructured":"Crenshaw, M.: The causes of terrorism. Comparative Politics 13, 379\u2013399 (1981)","journal-title":"Comparative Politics"},{"key":"29_CR5","unstructured":"Daly, S., Parachini, J., Rosenau, W.: Aum shinrikyo, al qaeda, and the kinshasa reactor: implications of three case studies for combating nuclear terrorism. Technical report, Rand Corp Santa Monica CA (2005)"},{"key":"29_CR6","unstructured":"Denning, D.E.: Cyberterrorism: Testimony before the special oversight panel on terrorism committee on armed services. Focus on Terrorism 9 (2000)"},{"key":"29_CR7","volume-title":"Convergence of Virus Writers and Hackers: Fact or Fantasy?","author":"S Gordon","year":"2003","unstructured":"Gordon, S., Ma, Q.: Convergence of Virus Writers and Hackers: Fact or Fantasy?. Symantec Security White paper, Cupertine (2003)"},{"key":"29_CR8","unstructured":"Gross, M.L., Canetti, D., Vashdi, D.R.: Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. J. Cybersecurity 3, 49\u201358 (2017)"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1093\/biomet\/58.1.83","volume":"58","author":"AG Hawkes","year":"1971","unstructured":"Hawkes, A.G.: Spectra of some self-exciting and mutually exciting point processes. Biometrika 58(1), 83\u201390 (1971)","journal-title":"Biometrika"},{"key":"29_CR10","unstructured":"Hoffman, B.: Inside Terrorism, pp. 266\u2013302. Columbia University Press, New York (2006)"},{"key":"29_CR11","unstructured":"Hudson, L.D., Ware, B.S., Laskey, K.B., Mahoney, S.M.: An application of Bayesian networks to antiterrorism risk management for military planners. Rapport technique (2005)"},{"key":"29_CR12","unstructured":"Humenberger, M.: Dynamics and root causes of recent major terrorist attacks in Europe. Seminar on Current Issues of European and Transatlantic Security (2017)"},{"issue":"4","key":"29_CR13","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1080\/07388940802397400","volume":"25","author":"Z Iqbal","year":"2008","unstructured":"Iqbal, Z., Starr, H.: Bad neighbors: failed states and their consequences. Conflict Manag. Peace Sci. 25(4), 315\u2013331 (2008)","journal-title":"Conflict Manag. Peace Sci."},{"issue":"1","key":"29_CR14","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1061\/(ASCE)1076-0342(2009)15:1(31)","volume":"15","author":"MK Jha","year":"2009","unstructured":"Jha, M.K.: Dynamic bayesian network for predicting the likelihood of a terrorist attack at critical transportation infrastructure facilities. J. Infrastructure Syst. 15(1), 31\u201339 (2009)","journal-title":"J. Infrastructure Syst."},{"issue":"4","key":"29_CR15","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5038\/1944-0472.8.4.1460","volume":"8","author":"JJ Klein","year":"2015","unstructured":"Klein, J.J.: Deterring and dissuading cyberterrorism. J. Strategic Secur. 8(4), 23\u201338 (2015)","journal-title":"J. Strategic Secur."},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Krieger, T., Meierrieks, D.: What causes terrorism? Public Choice 147, 3\u201327 (2011)","DOI":"10.1007\/s11127-010-9601-1"},{"key":"29_CR17","unstructured":"Le Gouriellec, S.: The strategic threat of weak states: when reality calls theory into question. Semantic scholar (2015)"},{"issue":"1","key":"29_CR18","first-page":"187","volume":"2","author":"EO Odhiambo","year":"2014","unstructured":"Odhiambo, E.O.: Religious fundamentalism and terrorism. J. Global Peace Conflict 2(1), 187\u2013205 (2014)","journal-title":"J. Global Peace Conflict"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Rotberg, I.: When States Fail: Causes and Consequences. Princeton University Press, Princeton (2010)","DOI":"10.2307\/j.ctt7scrg"},{"key":"29_CR20","first-page":"81","volume-title":"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba","author":"V. S. Subrahmanian","year":"2012","unstructured":"Subrahmanian, V., et al.: Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer, Heidelberg (2012)"},{"key":"29_CR21","unstructured":"Weimann, G.: Cyberterrorism: how real is the threat? [electronic version], vol. 119. Special Report (United States Institute of Peace) (2004)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Weinstein, C., et al.: Modeling and detection techniques for counter-terror social network analysis and intent recognition. IEEE (2009)","DOI":"10.1109\/AERO.2009.4839642"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38364-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T22:12:37Z","timestamp":1722204757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38364-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"ISBN":["9783030383633","9783030383640"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38364-0_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSAMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science, Applied Mathematics and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsama2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.lita.univ-lorraine.fr\/~iccsama2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}