{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:55:27Z","timestamp":1742928927464,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319421100"},{"type":"electronic","value":"9783319421117"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42111-7_9","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T06:04:05Z","timestamp":1467353045000},"page":"98-106","source":"Crossref","is-referenced-by-count":1,"title":["Civil Security in Urban Spaces: Adaptation of the KDE-Method for Optimized Hotspot-Analysis for Emergency and Rescue Services"],"prefix":"10.1007","author":[{"given":"Julia","family":"Gonschorek","sequence":"first","affiliation":[]},{"given":"Caroline","family":"R\u00e4biger","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Bernhardt","sequence":"additional","affiliation":[]},{"given":"Hartmut","family":"Asche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"key":"9_CR1","volume-title":"Zahlenspiegel Rettungsdienst \u2013 Eine \u00dcbersicht \u00fcber die wichtigsten Kennzahlen im Rettungsdienst","author":"H Behrendt","year":"2008","unstructured":"Behrendt, H.: Zahlenspiegel Rettungsdienst \u2013 Eine \u00dcbersicht \u00fcber die wichtigsten Kennzahlen im Rettungsdienst. Mendel Verlag, Witten (2008)"},{"key":"9_CR2","unstructured":"BHKG: GESETZ ZUR NEUREGELUNG DES BRANDSCHUTZES, DER HILFELEISTUNG UND DES KATASTROPHESCHUTZES (GV. NRW. 2015\/Nr. 48\/pp. 886\u2013918) (2015). https:\/\/recht.nrw.de\/lmi\/owa\/br_vbl_detail_text?anw_nr=6&vd_id=15416&vd_back=N886&sg=0&menu=1 . Accessed 30 Jan 2016"},{"key":"9_CR3","unstructured":"BMBF, BUNDESMINISTERIUM F\u00dcR BILDUNG UND FORSCHUNG: Forschung f\u00fcr die zivile Sicherheit in Deutschland \u2013 Ergebnisse und Perspektiven (2014). https:\/\/www.bmbf.de\/pub\/erfolgsbroschuere_zivile_sicherheit_2014.pdf . Accessed 30 Jan 2016"},{"key":"9_CR4","unstructured":"BMBF, BUNDESMINISTERIUM F\u00dcR BILDUNG UND FORSCHUNG: Forschung f\u00fcr die zivile Sicherheit 2012\u20132017: Rahmenprogramm der Bundesregierung (2012). http:\/\/www.bmbf.de\/pub\/Rahmenprogramm_Sicherheitsforschung_2012.pdf . Accessed 30 Jan 2016"},{"key":"9_CR5","volume-title":"Crime Analysis and Crime Mapping","author":"R Boba","year":"2005","unstructured":"Boba, R.: Crime Analysis and Crime Mapping. Sage Publications Inc., Thousand Oaks (2005)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Gonschorek, J., Asche, H., Langer, A., Bernhardt, B., R\u00e4biger, C.: Big data in the field of civil security research: approaches for the visual preprocessing of fire brigade operations. In: Papajorgji, P., Pinet, F. (eds.) International Journal of Agricultural and Environmental Information Systems (IJAEIS), vol. 7. IGI Global (2016, in press)","DOI":"10.4018\/IJAEIS.2016010104"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1007\/978-3-319-21470-2_30","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2015","author":"J Gonschorek","year":"2015","unstructured":"Gonschorek, J., Asche, H., Schernthanner, H., Bernhardt, B., Langer, A., Humpert, M., R\u00e4biger, C.: Big data in civil security research: methods to visualize data for the geovisual analysis of fire brigade operations. In: Gervasi, O., Murgante, B., Misra, S., Gavrilova, M.L., Rocha, A.M.A.C., Torre, C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2015. LNCS, vol. 9157, pp. 415\u2013425. Springer, Heidelberg (2015)"},{"key":"9_CR8","unstructured":"Gonschorek, J., Asche, H., Schernthanner, H., Langer, A., R\u00e4biger, C., Bernhardt, B., Humpert, M.: Big Data in der zivilen Sicherheitsforschung \u2013 Methoden zur Datenvisualisierung f\u00fcr die explorative Analyse von Feuerwehreinsatz-daten. In: Strobel, J., Zagel, B., Griesebner, G., Blaschke, T. (eds.) Journal f\u00fcr Angewandte Geoinformatik, AGIT-Symposium, Salzburg, 8\u201310 Jun 2015, vol. 27. Wichmann Verlag, VDE Verlag GmbH, Berlin\/Offenbach (2015)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-31075-1_16","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"J Gonschorek","year":"2012","unstructured":"Gonschorek, J., Tyrallov\u00e1, L.: Geovisualization and geostatistics: a concept for the numerical and visual analysis of geographic mass data. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2012, Part II. LNCS, vol. 7334, pp. 208\u2013219. Springer, Heidelberg (2012)"},{"key":"9_CR10","unstructured":"Gonschorek, J., Asche, H.: Geovisuelle Analysen in Raum und Zeit: Methoden zur Unterst\u00fctzung pr\u00e4ventiver Ma\u00dfnahmen und Einsatzplanung der K\u00f6lner Feuerwehr. GIS.BUSINESS Das Magazin f\u00fcr Geoinformation, Heidelberg (4) (2011)"},{"key":"9_CR11","unstructured":"Hengl, T.: Finding the right pixel size (2005). http:\/\/www.researchgate.net\/profile\/Tomislav_Hengl\/publication\/222014409_Finding_the_right_pixel_size\/links\/53fb3ebf0cf20a4549705c55.pdf . Accessed 30 Jan 2016"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","first-page":"154","volume-title":"Information Visualization","author":"DA Keim","year":"2008","unstructured":"Keim, D.A., Andrienko, G., Fekete, J.-D., G\u00f6rg, C., Kohlhammer, J., Melan\u00e7on, G.: Visual analytics: definition, process, and challenges. In: Kerren, A., Stasko, J.T., Fekete, J.-D., North, C. (eds.) Information Visualization. LNCS, vol. 4950, pp. 154\u2013175. Springer, Heidelberg (2008)"},{"key":"9_CR13","unstructured":"Lang, S.: Skript zur Vorlesung Computerintensive Verfahren in der Statistik. Universit\u00e4t Innsbruck (2004). http:\/\/www.uibk.ac.at\/statistics\/personal\/lang\/publications\/compstat_aktuell.pdf . Accessed 31 Jan 2016"},{"key":"9_CR14","volume-title":"Space, Time and Crime","author":"KM Lersch","year":"2011","unstructured":"Lersch, K.M., Hart, T.C.: Space, Time and Crime, 3rd edn. Carolina Academic Press, Durham (2011)","edition":"3"},{"key":"9_CR15","unstructured":"McCullagh, M.J.: Detecting Hotspots in Time and Space. In: ISG 2006 (2006). http:\/\/www.spatial.cs.umn.edu\/Courses\/Fall07\/8715\/papers\/mccullagh.pdf . Accessed 30 Jan 2016"},{"key":"9_CR16","volume-title":"Geographic Visualization: Concepts","author":"JC Roberts","year":"2008","unstructured":"Roberts, J.C.: Coordinated multiple views for exploratory geovisualization. In: Dodge, M., McDerby, M., Turner, M. (eds.) Geographic Visualization: Concepts. Tools and Applications. Wiley, Chichester (2008)"},{"key":"9_CR17","unstructured":"Schmiedel, R., Behrendt, B., Beltzler, B.: Regelwerk zur Bedarfsplanung Rettungsdienst. Mendel Verlag, Witten (2012)"},{"key":"9_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-3324-9","volume-title":"Density Estimation for Statistics and Data Analysis","author":"BW Silverman","year":"1986","unstructured":"Silverman, B.W.: Density Estimation for Statistics and Data Analysis. Chapman & Hall, New York (1986)"},{"key":"9_CR19","unstructured":"Smith, S.C., Bruce, C.W.: CrimeStat III \u2013 User Workbook. National Institute of Justice, Washington, D.C. (2008). https:\/\/www.icpsr.umich.edu\/CrimeStat\/workbook\/CrimeStat_Workbook.pdf . Accessed 31 Jan 2016"},{"key":"9_CR20","volume-title":"Mapping and Analysing Crime Data","author":"D Williamson","year":"2001","unstructured":"Williamson, D., McLafferty, S., McGuire, P., Ross, T., Mollenkopf, J., Goldsmith, V., Quinn, S.: Tools in the spatial analysis of crime. In: Hirschfield, A., Bowers, S. (eds.) Mapping and Analysing Crime Data. Taylor & Francis, London\/New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications -- ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42111-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:36:08Z","timestamp":1498311368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42111-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319421100","9783319421117"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42111-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}