{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:43:35Z","timestamp":1761597815539,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T00:00:00Z","timestamp":1494806400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2014-56494-C4-1-P"],"award-info":[{"award-number":["TIN2014-56494-C4-1-P"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Heuristics"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10732-017-9335-z","type":"journal-article","created":{"date-parts":[[2017,5,14]],"date-time":"2017-05-14T23:04:58Z","timestamp":1494803098000},"page":"483-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Metaheuristic approaches to the placement of suicide bomber detectors"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8478-7549","authenticated-orcid":false,"given":"Carlos","family":"Cotta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0646-2535","authenticated-orcid":false,"given":"Jos\u00e9 E.","family":"Gallardo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"key":"9335_CR1","volume-title":"Local Search in Combinatorial Optimization","author":"EHL Aarts","year":"1997","unstructured":"Aarts, E.H.L., Lenstra, J.K.: Local Search in Combinatorial Optimization. Wiley, New York (1997)"},{"key":"9335_CR2","unstructured":"AFP: Death toll from Baghdad blast rises to 292: minister. France 24. http:\/\/www.france24.com\/en\/20160707-death-toll-baghdad-blast-rises-292-minister (2016) . Accessed 15 July 2016"},{"issue":"1","key":"9335_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TRO.2008.915449","volume":"24","author":"G Arechavaleta","year":"2008","unstructured":"Arechavaleta, G., Laumond, J.P., Hicheur, H., Berthoz, A.: An optimality principle governing human walking. IEEE Trans. Robot. 24(1), 5\u201314 (2008)","journal-title":"IEEE Trans. Robot."},{"issue":"1","key":"9335_CR4","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1111\/1745-9133.12274","volume":"16","author":"JV Carson","year":"2017","unstructured":"Carson, J.V.: Assessing the effectiveness of high-profile targeted killings in the \u201cwar on terror\u201d. Criminol. Public Policy 16(1), 191\u2013220 (2017)","journal-title":"Criminol. Public Policy"},{"key":"9335_CR5","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.talanta.2011.11.043","volume":"88","author":"JS Caygill","year":"2012","unstructured":"Caygill, J.S., Davis, F., Higson, S.P.: Current trends in explosive detection techniques. Talanta 88, 14\u201329 (2012)","journal-title":"Talanta"},{"key":"9335_CR6","unstructured":"Chicago Project on Security and Terrorism (CPOST): suicide attack database (April 19, 2016 release). http:\/\/cpostdata.uchicago.edu\/ (2016)"},{"key":"9335_CR7","doi-asserted-by":"crossref","unstructured":"Cotta, C., Fern\u00e1ndez, A.J.: A hybrid GRASP - evolutionary algorithm approach to golomb ruler search. In: Yao, X., et al. (eds.) Parallel Problem Solving from Nature \u2014PPSN VIII. Lecture Notes in Computer Science, vol. 3242, pp. 481\u2013490. Springer (2004)","DOI":"10.1007\/978-3-540-30217-9_49"},{"key":"9335_CR8","unstructured":"De Jong K.A., Potter, M.A., Spears, W.M.: Using problem generators to explore the effects of epistasis. In: B\u00e4ck, T. (ed.) Proceedings of the 7th International Conference on Genetic Algorithms. Morgan Kaufmann, pp. 338\u2013345 (1997)"},{"issue":"3","key":"9335_CR9","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.injury.2015.12.021","volume":"47","author":"D Edwards","year":"2016","unstructured":"Edwards, D., McMenemy, L., Stapley, S., Patel, H., Clasper, J.: 40 years of terrorist bombings\u2013a meta-analysis of the casualty and injury profile. Injury 47(3), 646\u2013652 (2016)","journal-title":"Injury"},{"key":"9335_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to Evolutionary Computing","author":"AE Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Berlin (2003)"},{"issue":"1","key":"9335_CR11","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.cie.2011.08.020","volume":"62","author":"RZ Farahani","year":"2012","unstructured":"Farahani, R.Z., Asgari, N., Heidari, N., Hosseininia, M., Goh, M.: Covering problems in facility location: a review. Comput. Ind. Eng. 62(1), 368\u2013407 (2012)","journal-title":"Comput. Ind. Eng."},{"issue":"2","key":"9335_CR12","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/BF01096763","volume":"6","author":"TA Feo","year":"1995","unstructured":"Feo, T.A., Resende, M.G.C.: Greedy randomized adaptive search procedures. J. Glob. Optim. 6(2), 109\u2013133 (1995)","journal-title":"J. Glob. Optim."},{"issue":"1","key":"9335_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1475-3995.2009.00663.x","volume":"16","author":"P Festa","year":"2009","unstructured":"Festa, P., Resende, M.G.C.: An annotated bibliography of GRASP\u2014Part I: algorithms. Int. Trans. Oper. Res. 16(1), 1\u201324 (2009a)","journal-title":"Int. Trans. Oper. Res."},{"issue":"2","key":"9335_CR14","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1111\/j.1475-3995.2009.00664.x","volume":"16","author":"P Festa","year":"2009","unstructured":"Festa, P., Resende, M.G.C.: An annotated bibliography of GRASP\u2014Part II: applications. Int. Trans. Oper. Res. 16(2), 131\u2013172 (2009b)","journal-title":"Int. Trans. Oper. Res."},{"issue":"200","key":"9335_CR15","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman, M.: The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 32(200), 675\u2013701 (1937)","journal-title":"J. Am. Stat. Assoc."},{"issue":"1","key":"9335_CR16","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1214\/aoms\/1177731944","volume":"11","author":"M Friedman","year":"1940","unstructured":"Friedman, M.: A comparison of alternative tests of significance for the problem of $$m$$ m rankings. Ann. Math. Stat. 11(1), 86\u201392 (1940)","journal-title":"Ann. Math. Stat."},{"key":"9335_CR17","first-page":"2677","volume":"9","author":"S Garc\u00eda","year":"2008","unstructured":"Garc\u00eda, S., Herrera, F.: An extension on \u201cstatistical comparisons of classifiers over multiple data sets\u201d for all pairwise comparisons. J. Mach. Learn. Res. 9, 2677\u20132694 (2008)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"9335_CR18","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1002\/jrs.4868","volume":"47","author":"KL Gares","year":"2016","unstructured":"Gares, K.L., Hufziger, K.T., Bykov, S.V., Asher, S.A.: Review of explosive detection methodologies and the emergence of standoff deep UV resonance raman. J. Raman Spectrosc. 47(1), 124\u2013141 (2016)","journal-title":"J. Raman Spectrosc."},{"key":"9335_CR19","unstructured":"Hoffman, B.: The logic of suicide terrorism. The Atlantic. http:\/\/www.theatlantic.com\/magazine\/archive\/2003\/06\/the-logic-of-suicide-terrorism\/302739\/ (2003). Accessed 2 July 2016"},{"key":"9335_CR20","volume-title":"Stochastic Local Search. Foundations and Applications","author":"H Hoos","year":"2005","unstructured":"Hoos, H., St\u00fctzle, T.: Stochastic Local Search. Foundations and Applications. Morgan Kaufmann, Burlington (2005)"},{"issue":"29","key":"9335_CR21","doi-asserted-by":"crossref","first-page":"10,399","DOI":"10.1073\/pnas.0500567102","volume":"102","author":"EH Kaplan","year":"2005","unstructured":"Kaplan, E.H., Kress, M.: Operational effectiveness of suicide-bomber-detector schemes: a best-case analysis. Proc. Natl. Acad. Sci. USA 102(29), 10,399\u201310,404 (2005)","journal-title":"Proc. Natl. Acad. Sci. USA"},{"issue":"1","key":"9335_CR22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s12198-016-0168-z","volume":"9","author":"M Kim","year":"2016","unstructured":"Kim, M., Batta, R., He, Q.: Optimal routing of infiltration operations. J. Transp. Secur. 9(1), 87\u2013104 (2016)","journal-title":"J. Transp. Secur."},{"issue":"2","key":"9335_CR23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/0163660X.2012.665339","volume":"35","author":"M Kroenig","year":"2012","unstructured":"Kroenig, M., Pavel, B.: How to deter terrorism. Wash. Q. 35(2), 21\u201336 (2012)","journal-title":"Wash. Q."},{"key":"9335_CR24","unstructured":"Kuruk\u0131z, H.\u015e.: Istanbul airport terror attack death toll rises to 44. Anadolou Agency. http:\/\/aa.com.tr\/en\/todays-headlines\/istanbul-airport-terror-attack-death-toll-rises-to-44\/599383 (2016) . Accessed 2 July 2016"},{"key":"9335_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1539-5","volume-title":"Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation","author":"P Larra\u00f1aga","year":"2002","unstructured":"Larra\u00f1aga, P., Lozano, J.A.: Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation, vol. 2. Springer, New York (2002)"},{"key":"9335_CR26","doi-asserted-by":"crossref","unstructured":"M\u00fchlenbein, H., Paa\u00df, G.: From recombination of genes to the estimation of distributions I. Binary parameters. In: Voigt, H., Ebeling, W., Rechenberg, I., Schwefel, H. (eds.) Parallel Problem Solving from Nature\u2014PPSN IV. Lecture Notes in Computer Science, vol. 1141, pp. 178\u2013187. Springer, Berlin Heidelberg (1996)","DOI":"10.1007\/3-540-61723-X_982"},{"volume-title":"Handbook of Memetic Algorithms, Studies in Computational Intelligence","year":"2012","key":"9335_CR27","unstructured":"Neri, F., Cotta, C., Moscato, P. (eds.): Handbook of Memetic Algorithms, Studies in Computational Intelligence, vol. 379. Springer, Berlin Heidelberg (2012)"},{"issue":"2","key":"9335_CR28","doi-asserted-by":"crossref","first-page":"65","DOI":"10.5711\/morj.12.2.65","volume":"12","author":"X Nie","year":"2007","unstructured":"Nie, X., Batta, R., Drury, C.G., Lin, L.: Optimal placement of suicide bomber detectors. Mil. Oper. Res. 12(2), 65\u201378 (2007)","journal-title":"Mil. Oper. Res."},{"key":"9335_CR29","unstructured":"NRC: Existing and potential standoff explosives detection techniques. National Research Council of the National Academies, Natl. Acad. Press, Washington (2004)"},{"key":"9335_CR30","unstructured":"Rand Corporation: RAND database of worldwide terrorism incidents. http:\/\/smapp.rand.org\/rwtid\/search_form.php (2009)"},{"issue":"395","key":"9335_CR31","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1080\/01621459.1986.10478341","volume":"81","author":"JP Shaffer","year":"1986","unstructured":"Shaffer, J.P.: Modified sequentially rejective multiple test procedures. J. Am. Stat. Assoc. 81(395), 826\u2013831 (1986)","journal-title":"J. Am. Stat. Assoc."},{"issue":"1\u20132","key":"9335_CR32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.jhazmat.2007.02.018","volume":"144","author":"S Singh","year":"2007","unstructured":"Singh, S.: Sensors\u2014an effective approach for the detection of explosives. J. Hazard. Mater. 144(1\u20132), 15\u201328 (2007)","journal-title":"J. Hazard. Mater."},{"key":"9335_CR33","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.tre.2016.05.003","volume":"93","author":"X Yan","year":"2016","unstructured":"Yan, X., Nie, X.: Optimal placement of multiple types of detectors under a small vessel attack threat to port security. Transp. Res. Part E Logist. Transp. Rev. 93, 71\u201394 (2016)","journal-title":"Transp. Res. Part E Logist. Transp. Rev."},{"key":"9335_CR34","volume-title":"Counterterrorist Detection Techniques of Explosives","author":"J Yinon","year":"2007","unstructured":"Yinon, J.: Counterterrorist Detection Techniques of Explosives. Elsevier, Amsterdam (2007)"}],"container-title":["Journal of Heuristics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10732-017-9335-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-017-9335-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-017-9335-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:49:16Z","timestamp":1569329356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10732-017-9335-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9335"],"URL":"https:\/\/doi.org\/10.1007\/s10732-017-9335-z","relation":{},"ISSN":["1381-1231","1572-9397"],"issn-type":[{"type":"print","value":"1381-1231"},{"type":"electronic","value":"1572-9397"}],"subject":[],"published":{"date-parts":[[2017,5,15]]}}}