{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:35:09Z","timestamp":1740202509026,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642136009"},{"type":"electronic","value":"9783642136016"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13601-6_3","type":"book-chapter","created":{"date-parts":[[2010,6,3]],"date-time":"2010-06-03T08:59:16Z","timestamp":1275555556000},"page":"22-27","source":"Crossref","is-referenced-by-count":2,"title":["Design and Deployment of a National Detecting Stolen Vehicles Network System"],"prefix":"10.1007","author":[{"given":"Weiping","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chingwei","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Al-Hmouz, R., Challa, S.: Intelligent Stolen Vehicle Detection using Video Sensing. Information, Decision and Control. In: IDC \u201907, pp. 302\u2013307 (2007)","DOI":"10.1109\/IDC.2007.374567"},{"key":"3_CR2","unstructured":"Arizona Criminal Justice Commission: Arizona Auto Theft Study. Arizona Criminal Justice Commission (2004)"},{"key":"3_CR3","unstructured":"Chang, W., Su, C.: Benefit Analysis of Stolen Vehicle Detecting System. In: Proceedings of 9th Information Management Research and Police Application Conference, pp. 215\u2013222 (2005)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1093\/bjc\/azi059","volume":"46","author":"M. Cherbonneau","year":"2006","unstructured":"Cherbonneau, M., Copes, H.: \u2019Drive It Like You Stole It\u2019: Auto Theft and the Illusion of Normalcy. The British Journal of Criminology\u00a046(2), 193\u2013211 (2006)","journal-title":"The British Journal of Criminology"},{"key":"3_CR5","unstructured":"Global Design News: Centralized network slows auto theft. Global Design News (2001)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Kursun, O., Reynolds, K., Eaglin, R., Chen, B., Georgiopoulos, M.: Development of an artificial intelligence system for detection and visualization of auto theft recovery patterns. In: Proceedings of the 2005 IEEE International Conference on Digital Object Identifier, pp. 25\u201329 (2005)","DOI":"10.1109\/CIHSPS.2005.1500605"},{"key":"3_CR7","unstructured":"Michigan Automobile Theft Prevention Authority: 2002 ATPA Annual Report. Michigan Automobile Theft Prevention Authority (2002)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Mustafa, M., Behnam, M., El-Tarhuni, M.: A Wireless Embedded System for the Tracking of Stolen Vehicles. In: IEEE\/ACS International Conference on Computer Systems and Applications, pp. 818\u2013825 (2006)","DOI":"10.1109\/AICCSA.2006.205184"},{"key":"3_CR9","unstructured":"National Police Administration: Criminal Cases Statistics. National Police Administration (2009)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Nagaraja, B., Rayappa, R., Mahesh, M., Patil, C., Manjunath, T.: Design & Development of a GSM Based Vehicle Theft Control System. In: 2009 International Conference on Digital Object Identifier, pp. 148\u2013152 (2009)","DOI":"10.1109\/ICACC.2009.154"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Wang, J.: Study of a conformal hidden wire antenna used for the detection of stolen cars. In: Electromagnetic Compatibility, Proceedings of the 2008 IEEE International Symposium on Digital Object Identifier, pp. 1\u20136 (2008)","DOI":"10.1109\/ISEMC.2008.4652008"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13601-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:08:49Z","timestamp":1740154129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13601-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136009","9783642136016"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13601-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}