{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:43:23Z","timestamp":1725500603048},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775027"},{"type":"electronic","value":"9783540775034"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77503-4_10","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T05:36:55Z","timestamp":1199338615000},"page":"122-131","source":"Crossref","is-referenced-by-count":0,"title":["Using Active Modeling in Counterterrorism"],"prefix":"10.1007","author":[{"given":"Yi-Jen","family":"Su","sequence":"first","affiliation":[]},{"given":"Hewijin C.","family":"Jiau","sequence":"additional","affiliation":[]},{"given":"Shang-Rong","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Carley, K.: Dynamic Network Analysis. Committee on Human Factors, National Research Council, 133\u2013145 (2003)"},{"issue":"3","key":"10_CR2","first-page":"43","volume":"24","author":"V. Krebs","year":"2002","unstructured":"Krebs, V.: Mapping Networks of Terrorist Cells. Connections\u00a024(3), 43\u201352 (2002)","journal-title":"Connections"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/3-540-48054-4","volume-title":"Conceptual Modeling","author":"P.P. Chen","year":"1999","unstructured":"Chen, P.P., Thalheim, B., Wong, L.Y.: Future Directions of Conceptual Modeling. In: Chen, P.P., Akoka, J., Kangassalu, H., Thalheim, B. (eds.) Conceptual Modeling. LNCS, vol.\u00a01565, pp. 294\u2013308. Springer, Heidelberg (1999)"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/320434.320440","volume":"1","author":"P.P. Chen","year":"1976","unstructured":"Chen, P.P.: The entity-relationship model: toward a unified view of data. ACM TODS\u00a01(1), 1\u201336 (1976)","journal-title":"ACM TODS"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/971617.971643","volume":"47","author":"T. Coffman","year":"2004","unstructured":"Coffman, T., Greenblatt, S., Marcus, S.: Graph-Based Technologies for Intelligence Analysis. CACM\u00a047(3), 45\u201347 (2004)","journal-title":"CACM"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cai, D., Shao, Z., He, X., Yan, X., Han, J.: Mining hidden community in heterogeneous social networks. In: Proceeding of Link KDD 2005 (2005)","DOI":"10.1145\/1134271.1134280"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Hollywood, J., Snyder, D., McKay, K., Boon, J.: Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior. Rand Corporation (2004)","DOI":"10.1037\/e658632010-001"},{"key":"10_CR8","unstructured":"Mukherjee, M., Holder, L.B.: Graph-based data mining on social networks. In: Link KDD 2004. Workshop on Link Analysis and Group Detection (2004)"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/5254.850825","volume":"15","author":"D.J. Cook","year":"2000","unstructured":"Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intelligent Systems\u00a015(2), 32\u201341 (2000)","journal-title":"IEEE Intelligent Systems"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Debole, F., Sebastiani, F.: Supervised term weighting for automated text categorization. In: 18th ACM Symposium on Applied Computing (2003)","DOI":"10.1145\/952532.952688"},{"key":"10_CR11","unstructured":"Foggia, P., Genna, R., nad Vento, M.: Introducing Generalized Attributed Relational Graphs (GARG\u2019s) as prototypes of ARG\u2019s. In: GbR 1999. 2nd IAPR Workshop on Graph-based Representations (1999)"},{"key":"10_CR12","unstructured":"Chen, P.P., Wong, L.Y.: A Proposed Preliminary Framework for Conceptual Modeling of Learning from Surprises. In: Arabnia, H.R., Joshua, R. (eds.) ICAI 2005. Proceedings of the 2005 International Conference on Artificial Intelligence (2005)"}],"container-title":["Lecture Notes in Computer Science","Active Conceptual Modeling of Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77503-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T09:47:08Z","timestamp":1557136028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77503-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775027","9783540775034"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77503-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}