{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:52:57Z","timestamp":1743144777971,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319333878"},{"type":"electronic","value":"9783319333892"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33389-2_32","type":"book-chapter","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T14:42:45Z","timestamp":1461163365000},"page":"337-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Proposal of the Soft Targets Security"],"prefix":"10.1007","author":[{"given":"Lucia","family":"Duricova Prochazkova","sequence":"first","affiliation":[]},{"given":"Martin","family":"Hromada","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,21]]},"reference":[{"key":"32_CR1","unstructured":"Dernoncourt, F.: Introduction to Fuzzy Logic. Massachusetts Institute of Technology (2013)"},{"key":"32_CR2","unstructured":"Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic. In: Theory and Application, p. 574. Prentice Hall, New Jersey (1995)"},{"key":"32_CR3","unstructured":"Prochazkova, L.D., Hromada, M.: The proposal system for the safety assessment of soft targets with focus on school facilities. In: Proceeding of 3rd CER Comparative, vol. 2, pp. 30\u201333. Sciemcee Publishing, London (2015)"},{"key":"32_CR4","volume-title":"Nice Solutions for Critical Facilities","author":"F Rosenberg","year":"2014","unstructured":"Rosenberg, F.: Nice Solutions for Critical Facilities. Nidam, NICE (2014)"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its application to modeling and control. IEEE Trans. Syst. Man Cybern. SMC-15(1), 116\u2013132. IEEE (1985)","DOI":"10.1109\/TSMC.1985.6313399"},{"key":"32_CR6","unstructured":"Valouch, J.: Aggregated coefficient for evaluation of effectiveness of alarm systems. Int. J. Circ. Syst. Signal Process. 9, 205\u20132010. Oregon (2015)"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy sets. Inf. Control 8, 338\u2013353 (1965)","journal-title":"Inf. Control"}],"container-title":["Advances in Intelligent Systems and Computing","Automation Control Theory Perspectives in Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33389-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T06:31:09Z","timestamp":1700202669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-33389-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319333878","9783319333892"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33389-2_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}