{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:15Z","timestamp":1725902955202},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_65","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"657-665","source":"Crossref","is-referenced-by-count":0,"title":["Terrorists Spatio-Temporal Analysis Based on Social Network Tools"],"prefix":"10.1007","author":[{"given":"Xuan","family":"Guo","sequence":"first","affiliation":[]},{"given":"Zhi-ting","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Pin-shan","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"3","key":"65_CR1","first-page":"43","volume":"24","author":"VE Krebs","year":"2001","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections 24(3), 43\u201352 (2001)","journal-title":"Connections"},{"key":"65_CR2","unstructured":"Memon, N., Hicks, D.L.: Detecting key players in 11-M terrorist network: a case study. In: International Conference on Availability, Reliability and Security, pp. 1254\u20131259 (2000)"},{"issue":"1","key":"65_CR3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10588-006-7083-y","volume":"12","author":"KM Carley","year":"2006","unstructured":"Carley, K.M.: Destabilization of covert networks. Comput. Math. Organ. Theory 12(1), 51\u201366 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"key":"65_CR4","unstructured":"Carley, K.M., Dombroski, M., Tsvetovat, M., et al.: Destabilizing dynamic covert networks. In: Proceedings of International Command and Control Research and Technology Symposium (2003)"},{"key":"65_CR5","doi-asserted-by":"crossref","unstructured":"Carley, K.M., Columbus, D., Landwehr, P.: Automap User\u2019s Guide 2013. http:\/\/www.casos.cs.cmu.edu\/index.php","DOI":"10.21236\/ADA586976"},{"key":"65_CR6","unstructured":"Carley, K.M.: ORA-NetScenes Quick Start Guide. http:\/\/www.casos.cs.cmu.edu\/index.php"},{"issue":"03","key":"65_CR7","first-page":"161","volume":"9","author":"Y Heping","year":"2009","unstructured":"Heping, Y., Weifeng, H., Yingming, W.: Ways of controlling the risks terrorist attack through social network analysis. J. Safety Environ. 9(03), 161\u2013165 (2009)","journal-title":"J. Safety Environ."},{"issue":"03","key":"65_CR8","first-page":"259","volume":"11","author":"Z Hai","year":"2011","unstructured":"Hai, Z., Duoyong, S.: Study on the terrorist convert networks from the perspective of social network analysis. J. Safety Environ. 11(03), 259\u2013264 (2011)","journal-title":"J. Safety Environ."},{"key":"65_CR9","first-page":"109","volume":"02","author":"Z Miao","year":"2016","unstructured":"Miao, Z.: Social network analysis of violent terrorist activities in Xinjiang. Soc. Sci. Xinjiang 02, 109\u2013114 (2016)","journal-title":"Soc. Sci. Xinjiang"},{"issue":"2\u20133","key":"65_CR10","first-page":"116","volume":"7","author":"X Xiaoke","year":"2010","unstructured":"Xiaoke, X., Jinqing, F.: Applications of complex network theory in war on terrorism. Complex Syst. Complex. Sci. 7(2\u20133), 116\u2013119 (2010)","journal-title":"Complex Syst. Complex. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T06:59:30Z","timestamp":1569653970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_65","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}