{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:48:56Z","timestamp":1747975736917,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031083327"},{"type":"electronic","value":"9783031083334"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_39","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"483-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Knowledge Engineering and Ontology for Crime Investigation"],"prefix":"10.1007","author":[{"given":"Wilmuth","family":"M\u00fcller","sequence":"first","affiliation":[]},{"given":"Dirk","family":"M\u00fchlenberg","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Pallmer","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Zeltmann","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Ellmauer","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Demestichas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"39_CR1","unstructured":"Europol. Serious and Organised Crime Threat Assessment (SOCTA) (2017)"},{"key":"39_CR2","unstructured":"Europol. Internet Organised Crime Threat Assessment (IOCTA) (2017)"},{"key":"39_CR3","unstructured":"Demestichas, K., et al.: Prediction and visual intelligence platform for detection of irregularities and abnormal behaviour. In: Detection Machine Learning for Trend and Weak Signal Detection in Social Networks and Social Media, vol. 2606, no. paper 4, pp. 25\u201330. CEUR (2020)"},{"key":"39_CR4","unstructured":"ANITA project. https:\/\/www.anita-project.eu\/"},{"key":"39_CR5","unstructured":"COPKIT project. https:\/\/copkit.eu\/"},{"key":"39_CR6","unstructured":"AIDA project. https:\/\/www.project-aida.eu"},{"key":"39_CR7","unstructured":"ASGARD project. https:\/\/www.asgard-project.eu"},{"key":"39_CR8","unstructured":"INSPECTr project. https:\/\/inspectr-project.eu"},{"key":"39_CR9","unstructured":"TENSOR project. https:\/\/tensor-project.eu"},{"key":"39_CR10","unstructured":"Mannes, A., Golbeck, J.: Building a terrorism ontology. In: ISWC Workshop on Ontology Patterns for the Semantic Web, vol. 36 (2005)"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Mannes, A., Golbeck, J.: Ontology building: a terrorism specialist\u2019s perspective. In: Aerospace Conference, 2007 IEEE, pp. 1\u20135. IEEE (2007)","DOI":"10.1109\/AERO.2007.352794"},{"key":"39_CR12","doi-asserted-by":"publisher","unstructured":"Dragos, V.: Developing a core ontology to improve military intelligence analysis. Int. J. Knowl.-Based Intell. Eng. Syst. 17, 29\u201336 (2013). https:\/\/doi.org\/10.3233\/KES-130253","DOI":"10.3233\/KES-130253"},{"key":"39_CR13","doi-asserted-by":"publisher","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: AAAI Workshop on Artificial Intelligence for Cyber Security 2016. AAAI Press (2016). https:\/\/doi.org\/10.13016\/M2862BG1V","DOI":"10.13016\/M2862BG1V"},{"key":"39_CR14","unstructured":"Europol. Universal Message Format: faster, cheaper, better. Publications Office of the European Union. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/3b2cc49f-72bb-419f-8742-eb21cd15e35c"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Richardson, M., Domingos, P.: Markov logic networks. Mach. Learn. 62(1\u20132), 107\u2013136 (2006). https:\/\/homes.cs.washington.edu\/~pedrod\/mln.pdf","DOI":"10.1007\/s10994-006-5833-1"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Niepert, M., Meilicke, C., Stuckenschmidt, H.: A probabilistic-logical framework for ontology matching. In: AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7508"},{"issue":"2","key":"39_CR17","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TKDE.2016.2625251","volume":"29","author":"H Chen","year":"2017","unstructured":"Chen, H., et al.: Scaling up Markov logic probabilistic inference for social graphs. IEEE Trans. Knowl. Data Eng. 29(2), 433\u2013445 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"39_CR18","doi-asserted-by":"publisher","first-page":"45672","DOI":"10.1038\/srep45672","volume":"7","author":"P Wittek","year":"2017","unstructured":"Wittek, P., Gogolin, C.: Quantum enhanced inference in Markov logic networks. Sci. Rep. 7, 45672 (2017)","journal-title":"Sci. Rep."},{"issue":"6","key":"39_CR19","doi-asserted-by":"publisher","first-page":"373","DOI":"10.14778\/1978665.1978669","volume":"4","author":"Niu","year":"2011","unstructured":"Niu, et al.: Tuffy: scaling up statistical inference in Markov logic networks using an RDBMS. Proc. VLDB Endow. 4(6), 373\u2013384 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"39_CR20","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-90509-9_7","volume-title":"Multisensor Fusion and Integration in the Wake of Big Data, Deep Learning and Cyber Physical System","author":"A Kuwertz","year":"2018","unstructured":"Kuwertz, A., M\u00fchlenberg, D., Sander, J., M\u00fcller, W.: Applying knowledge-based reasoning for information fusion in intelligence, surveillance, and reconnaissance. In: Lee, S., Ko, H., Oh, S. (eds.) MFI 2017. LNEE, vol. 501, pp. 119\u2013139. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90509-9_7"},{"key":"39_CR21","unstructured":"MAGNETO homepage. http:\/\/www.magneto-h2020.eu\/. Accessed 09 Feb 2022"},{"key":"39_CR22","doi-asserted-by":"publisher","unstructured":"M\u00fcller, W., et al.: Reasoning with small data samples for organised crime. In: Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II, (S. 21) (2020). https:\/\/doi.org\/10.1117\/12.2557543","DOI":"10.1117\/12.2557543"},{"key":"39_CR23","unstructured":"RDFLib software package. https:\/\/rdflib.readthedocs.io\/. Accessed 11 Feb 2022"},{"key":"39_CR24","unstructured":"NetworkX software package. https:\/\/networkx.org\/. Accessed 11 Feb 2022"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:21:00Z","timestamp":1675873260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_39","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}