{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:12:41Z","timestamp":1725909161873},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319655208"},{"type":"electronic","value":"9783319655215"}],"license":[{"start":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T00:00:00Z","timestamp":1503532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65521-5_33","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T22:33:50Z","timestamp":1503441230000},"page":"385-394","source":"Crossref","is-referenced-by-count":0,"title":["Computational Public Safety: The Evolution to Public Safety Research"],"prefix":"10.1007","author":[{"given":"Nhan","family":"Tran","sequence":"first","affiliation":[]},{"given":"Muthana","family":"Zouri","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Ferworn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,24]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"1836","DOI":"10.1056\/NEJMra1109877","volume":"369","author":"J Leaning","year":"2013","unstructured":"Leaning, J., Guha-Sapir, D.: Natural disasters, armed conflict, and public health. N. Engl. J. Med. 369(19), 1836\u20131842 (2013). doi: 10.1056\/NEJMra1109877 . Last accessed 27 Apr 2017","journal-title":"N. Engl. J. Med."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Banholzer, S., Kossin, J., Donner, S.: The impact of climate change on natural disasters. In: Reducing Disaster: Early Warning Systems For Climate Change, pp. 21\u201349. Springer (2014)","DOI":"10.1007\/978-94-017-8598-3_2"},{"key":"33_CR3","unstructured":"van der Meulen, R.: Gartner Says 8.4 Billion Connected \u201cThings\u201d Will Be in Use in 2017, Up 31 Percent From 2016, Gartner, 7 February 2017. http:\/\/www.gartner.com\/newsroom\/id\/3598917 . Last accessed 15 May 2017"},{"key":"33_CR4","unstructured":"IDC Inc., The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things, April 2014. https:\/\/www.emc.com\/leadership\/digital-universe\/2014iview\/executive-summary.htm . Last accessed 22 Apr 2017"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Ferworn, A., et al.: Urban search and rescue with canine augmentation technology. In: IEEE International Conference on System of Systems Engineering, Los Angeles, CA, USA (2006)","DOI":"10.1109\/SYSOSE.2006.1652317"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Ferworn, A., Tran, N., Tran, J., Zarnett, G., Sharifi, F.: WiFi repeater deployment for improved communication in confined-space urban disaster search. In: IEEE International Conference of Systems of Systems (SoSE 2007), San Antonio, TX, USA (2007)","DOI":"10.1109\/SYSOSE.2007.4304257"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Ribeiro, C., Ferworn, A., Tran, J.: An assessment of a wireless mesh network performance for uban search and rescue task. In: IEEE Toronto International Conference \u2013 Science and Technology for Humanity (TIC-STH 2009), Toronto, ON, Canada (2009)","DOI":"10.1109\/TIC-STH.2009.5444474"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Tran, J., Ferworn, A., Ribeiro, C., Denko, M.: Enhancing canine disaster search. In: IEEE International Conference of Systems of Systems (SoSE 2008), Monterey, CA, USA (2008)","DOI":"10.1109\/SYSOSE.2008.4724181"},{"issue":"2","key":"33_CR9","first-page":"38","volume":"5","author":"A Ferworn","year":"2008","unstructured":"Ferworn, A., et al.: Wireless mesh network performance for urban search and rescue missions\u2019. J. Homel. Secur. Emerg. Manag. 5(2), 38\u201357 (2008)","journal-title":"J. Homel. Secur. Emerg. Manag."},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Tran, J., Ferworn, A.: Bark indication detection and release algorithm for the automatic delivery of packages by dogs. In: 6th International Wireless Communications and Mobile Computing Conference (IWCMC 2010), Cane, France (2010)","DOI":"10.1145\/1815396.1815577"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Ferworn, A., Tran, J., Ufkes, A., D\u2019Souza, A.: Initial experiments on 3D modeling of complex disaster environment using unmanned arial vehicle. In: IEEE International Workshop on Safety, Security & Rescue Robotics (SSRR 2011), Kyoto, Japan (2011)","DOI":"10.1109\/SSRR.2011.6106781"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Tran, J., Ufkes, A., Fiala, M., Ferworn, A.: Low-cost 3D scene reconstruction for response robots in real-time. In: IEEE International Workshop on Safety, Security & Rescue Robotics (SSRR 2011), Kyoto, Japan (2011)","DOI":"10.1109\/SSRR.2011.6106780"},{"key":"33_CR13","unstructured":"Ferworn, A., Herman, S., Tran, J., Ufkes, A., McDonald, R.: Disaster scene reconstruction: modeling and simulating urban building collapse rubble within a game engine. In: Summer Computer Simulation Conference, SCSC 2013 and Work in Progress, WIP 2013, Part of the 2013 Summer Simulation Multiconference, SummerSim, Toronto, On, Canada (2013)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Ferworn, A., Herman, S., Kong, C., Ufkes, A., Tran, J.: Interacting with a virtual destroyed environment constructed from real disaster data. In: IEEE International Workshop on Safety, Security & Rescue Robotics (SSRR 2014), Toyako-Cho, Hokkaido, Japan (2014)","DOI":"10.1109\/SSRR.2014.7017654"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Kong, C., Ferworn, A., Tran, J., Herman, S., Coleshill, E., Derpanis, K.: Toward the automatic detection of access holes in disaster rubble. In: IEEE International Workshop on Safety, Security & Rescue Robotics (SSRR 2013), Link\u00f6ping, Sweden (2013)","DOI":"10.1109\/SSRR.2013.6719364"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Kong, C., Ferworn, A., Tran, J., Coleshill, E., Derpanis, K.G.: What is a Hole? Discovering Access Holes in Disaster Rubble with Functional and Photometric Attributes. J. Field Robot. 825\u2013836 (2015)","DOI":"10.1002\/rob.21590"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Waismark, B., Ferworn, A., Tran, J.: Enhancing autonomous access hole detection. In: IEEE Canada International \u2013 International Humanitarian Technology Conference-(IHTC). IEEE (2017)","DOI":"10.1109\/IHTC.2017.8058198"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Chan, C., Ferworn, A.: Serious gaming for improvised explosive device neutralization training. In: The 3rd International Conference on Industrial Engineering and Applications (ICIEA 2016). MATEC Web of Conferences, vol. 68, Hong Kong. EDP Sciences (2016)","DOI":"10.1051\/matecconf\/20166802006"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Chan, C.C.K., Ferworn, A., Chin, L.: Towards determining relative densities for common unknown explosives in improvised explosive devices. In: IEEE Canada International \u2013 International Humanitarian Technology Conference-(IHTC). IEEE (2017)","DOI":"10.1109\/IHTC.2017.8058199"},{"issue":"1","key":"33_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1140\/epjst\/e2012-01703-3","volume":"12","author":"M Batty","year":"2017","unstructured":"Batty, M., et al.: Smart cities of the future. Eur. Phys. J. Spec. Top. 12(1), 481\u2013518 (2017). doi: 10.1140\/epjst\/e2012-01703-3 . Last accessed 5 May 2017","journal-title":"Eur. Phys. J. Spec. Top."},{"issue":"1","key":"33_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10630732.2014.942092","volume":"22","author":"V Albino","year":"2015","unstructured":"Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1), 3\u201321 (2015). doi: 10.1080\/10630732.2014.942092 . Last accessed 1 May 2017","journal-title":"J. Urban Technol."},{"key":"33_CR22","unstructured":"Manville, C., et al.: Mapping Smart Cities in the EU (2014). http:\/\/www.europarl.europa.eu\/RegData\/etudes\/etudes\/join\/2014\/507480\/IPOL-ITRE_ET(2014)507480_EN.pdf . Last accessed 8 May 2017"},{"issue":"8","key":"33_CR23","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.tej.2014.08.008","volume":"27","author":"C Hawk","year":"2014","unstructured":"Hawk, C., Kaushiva, A.: Cybersecurity and the Smarter Grid. Electr. J. 27(8), 84\u201395 (2014)","journal-title":"Electr. J."},{"key":"33_CR24","unstructured":"Clemente, J.: The Security Vulnerabilities of Smart Grid. J. Secur. Envery, 18 June 2009. http:\/\/www.ensec.org\/index.php?option=com_content&view=article&id=198:the-security-vulnerabilities-of-smart-grid&catid=96:content&Itemid=345 . Last accessed 13 May 2017"},{"key":"33_CR25","unstructured":"Bartels, G.: Combating Smart Grid Vulnerabilities. J. Energy Secur., March 2011. http:\/\/www.ensec.org\/index.php?option=com_content&view=article&id=284:combating-smart-Grid-vulnerabilities&catid=114:content0211&Itemid=374 . Last accessed 19 Apr 2017"},{"key":"33_CR26","unstructured":"Zetter, K.: Inside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid. Wired.com, 3 March 2016. https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/ . Last accessed 28 Apr 2017"},{"key":"33_CR27","unstructured":"Boston Transportation Department. The Benefits of Retiming\/Rephasing Traffic Signals in the BackBay, March 2010. http:\/\/www.cityofboston.gov\/images_documents\/The%20Benefits%20of%20Traffic%20Signal%20Retiming%20Report_tcm3-18554.pdf . Last accessed 8 May 2017"},{"key":"33_CR28","unstructured":"Ghena, B., et al.: Green lights forever: analyzing the security of traffic infrastructure. In: Proceedings of the 8th USENIX Workshop on Offensive Technologies, August 2014. https:\/\/jhalderm.com\/pub\/papers\/traffic-woot14.pdf . Last accessed 11 May 2017"},{"key":"33_CR29","unstructured":"Legezo, D.: Smart Megalopolises. How Safe and Reliable Is Your Data? In: RSA Conference, San Francisco, 29 February 2016. https:\/\/securelist.com\/blog\/research\/74454\/how-to-trick-traffic-sensors\/ . Last accessed 9 May 2017"},{"key":"33_CR30","unstructured":"Tracy, P.: How industrial IoT is transforming public safety, 1 September 2016. http:\/\/www.rcrwireless.com\/20160901\/big-data-analytics\/iiot-public-safety-tag31-tag99 . Last accessed 19 May 2017"},{"issue":"1","key":"33_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., et al.: Internet of Things for Smart Cities. IEEE Internet Things J. 1(1), 22\u201332 (2014). doi: 10.1109\/JIOT.2014.2306328 . Last accessed 7 May 2017","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"33_CR32","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MITP.2006.84","volume":"8","author":"C McCue","year":"2006","unstructured":"McCue, C.: Data mining and predictive analytics in public safety and security. IT Prof. 8(4), 12\u201318 (2006)","journal-title":"IT Prof."},{"issue":"3","key":"33_CR33","first-page":"261","volume":"16","author":"A Graves","year":"2011","unstructured":"Graves, A.: A case study for integrating public safety data using semantic technology. Inf. Policy 16(3), 261\u2013275 (2011)","journal-title":"Inf. Policy"},{"issue":"3","key":"33_CR34","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10111-011-0172-9","volume":"13","author":"N Bharosa","year":"2011","unstructured":"Bharosa, N., Janssen, M., Tan, Y.-H.H.: A research agenda for information quality assurance in public safety networks: information orchestration as the middle ground between hierarchical and netcentric approaches. Cogn. Technol. Work 13(3), 203\u2013216 (2011)","journal-title":"Cogn. Technol. Work"},{"issue":"4","key":"33_CR35","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/JSTARS.2010.2056674","volume":"3","author":"SS Durbha","year":"2010","unstructured":"Durbha, S.S., King, R.L., Amanchi, S.K., Bheemireddy, S., Younan, N.H.: Standards-based middleware and tools for coastal sensor web applications. IEEE J. Sel. Top. Appl. Earth Observations Remote Sens. 3(4), 451\u2013466 (2010)","journal-title":"IEEE J. Sel. Top. Appl. Earth Observations Remote Sens."},{"issue":"39","key":"33_CR36","doi-asserted-by":"crossref","first-page":"5791","DOI":"10.1016\/j.vaccine.2012.04.005","volume":"30","author":"NA Halsey","year":"2012","unstructured":"Halsey, N.A., Edwards, K.M., Dekker, C.L., Klein, N.P., Baxter, R., Larussa, P., Marchant, C., Slade, B., Vellozzi, C., Causality Working Group of the Clinical Immunization Safety Assessment network: Algorithm to assess causality after individual adverse events following immunizations. Vaccine 30(39), 5791\u20135798 (2012)","journal-title":"Vaccine"},{"issue":"4","key":"33_CR37","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1007\/s10586-016-0672-8","volume":"19","author":"H Jung","year":"2016","unstructured":"Jung, H., Yoo, H., Chung, K.: Associative context mining for ontology-driven hidden knowledge discovery. Cluster Comput. 19(4), 2261\u20132271 (2016)","journal-title":"Cluster Comput."},{"issue":"4","key":"33_CR38","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.giq.2012.06.002","volume":"29","author":"AL Kavanaugh","year":"2012","unstructured":"Kavanaugh, A.L., Fox, E.A., Sheetz, S.D., Yang, S., Li, L.T., Shoemaker, D.J., Natsev, A., Xie, L.: Social media use by government: from the routine to the critical. Gov. Inf. Q. 29(4), 480\u2013491 (2012)","journal-title":"Gov. Inf. Q."},{"issue":"4","key":"33_CR39","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1016\/j.dss.2007.12.007","volume":"45","author":"S Kaza","year":"2008","unstructured":"Kaza, S., Chen, H.: Evaluating ontology mapping techniques: an experiment in public safety information sharing. Decis. Support Syst. 45(4), 714\u2013728 (2008)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"33_CR40","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1587\/transinf.E97.D.981","volume":"E97-D","author":"G Li","year":"2014","unstructured":"Li, G.: A framework to integrate public information into runtime safety analysis for critical systems. IEICE Trans. Inf. Syst. E97-D(4), 981\u2013983 (2014)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"3","key":"33_CR41","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1002\/jip.1451","volume":"13","author":"VH Mas\u00edas","year":"2016","unstructured":"Mas\u00edas, V.H., Valle, M.A., Amar, J.J., Cervantes, M., Brunal, G., Crespo, F.A.: Characterising the personality of the public safety oender and non-oender using decision trees: the case of Colombia. J. Invest. Psychol. Oender Proling 13(3), 198\u2013219 (2016)","journal-title":"J. Invest. Psychol. Oender Proling"},{"issue":"3","key":"33_CR42","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1111\/j.1863-2378.2011.01431.x","volume":"59","author":"EM Parker","year":"2012","unstructured":"Parker, E.M., Jenson, I., Jordan, D., Ward, M.P.: Development of an algorithm for assessing the risk to food safety posed by a new animal disease. Zoonoses Publ. Health 59(3), 184\u2013192 (2012)","journal-title":"Zoonoses Publ. Health"},{"key":"33_CR43","unstructured":"Woods, A.: Quebec winter storm \u2018shambles\u2019 prompts government investigation, Toronto Star, 16 March 2017. https:\/\/www.thestar.com\/news\/canada\/2017\/03\/16\/handling-of-quebec-winter-storm-prompts-government-investigation.html . Last accessed 13 May 2017"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65521-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T13:49:02Z","timestamp":1570024142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65521-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,24]]},"ISBN":["9783319655208","9783319655215"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65521-5_33","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,8,24]]}}}