{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:01:49Z","timestamp":1760709709666,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T00:00:00Z","timestamp":1537228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TIN2014-56494-C4-1-P","TIN2017-85727-C4-1-P"],"award-info":[{"award-number":["TIN2014-56494-C4-1-P","TIN2017-85727-C4-1-P"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11047-018-9710-1","type":"journal-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T10:09:26Z","timestamp":1537265366000},"page":"249-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New perspectives on the optimal placement of detectors for suicide bombers using metaheuristics"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8478-7549","authenticated-orcid":false,"given":"Carlos","family":"Cotta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0646-2535","authenticated-orcid":false,"given":"Jos\u00e9 E.","family":"Gallardo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,18]]},"reference":[{"key":"9710_CR1","volume-title":"Local search in combinatorial optimization","author":"EHL Aarts","year":"1997","unstructured":"Aarts EHL, Lenstra JK (1997) Local search in combinatorial optimization. Wiley, Hoboken"},{"issue":"4","key":"9710_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1162\/isec.2008.32.4.78","volume":"32","author":"M Abrahms","year":"2008","unstructured":"Abrahms M (2008) What terrorists really want: terrorist motives and counterterrorism strategy. Int Secur 32(4):78\u2013105","journal-title":"Int Secur"},{"key":"9710_CR3","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195099713.001.0001","volume-title":"Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms","author":"T B\u00e4ck","year":"1996","unstructured":"B\u00e4ck T (1996) Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms. Oxford University Press, New York"},{"issue":"1","key":"9710_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/07388940490433882","volume":"21","author":"SB Blomberg","year":"2004","unstructured":"Blomberg SB, Hess GD, Weerapana A (2004) An economic model of terrorism. Confl Manag Peace Sci 21(1):17\u201328","journal-title":"Confl Manag Peace Sci"},{"unstructured":"Central Intelligence Agency (2003) National strategy for combating terrorism. https:\/\/www.cia.gov\/news-information\/cia-the-war-on-terrorism\/Counter_Terrorism_Strategy.pdf . Accessed 31 Jan 2018","key":"9710_CR5"},{"unstructured":"Chicago Project on Security and Terrorism (CPOST) (2016) Suicide attack database (April 19, 2016 release) [Data File]. Retrieved from http:\/\/cpostdata.uchicago.edu\/","key":"9710_CR6"},{"issue":"3","key":"9710_CR7","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s10732-017-9335-z","volume":"24","author":"C Cotta","year":"2018","unstructured":"Cotta C, Gallardo JE (2018) Metaheuristic approaches to the placement of suicide bomber detectors. J Heuristics 24(3):483\u2013513","journal-title":"J Heuristics"},{"key":"9710_CR8","first-page":"338","volume-title":"Proceedings of the 7th international conference on genetic algorithms","author":"KA Jong De","year":"1997","unstructured":"De Jong KA, Potter MA, Spears WM (1997) Using problem generators to explore the effects of epistasis. In: B\u00e4ck T (ed) Proceedings of the 7th international conference on genetic algorithms. Morgan Kaufmann, Burlington, pp 338\u2013345"},{"issue":"3","key":"9710_CR9","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.injury.2015.12.021","volume":"47","author":"D Edwards","year":"2016","unstructured":"Edwards D, McMenemy L, Stapley S, Patel H, Clasper J (2016) 40 years of terrorist bombings\u2014a meta-analysis of the casualty and injury profile. Injury 47(3):646\u2013652","journal-title":"Injury"},{"key":"9710_CR10","first-page":"11","volume-title":"To protect and to serve. Policing in an age of terrorism","author":"B Ganor","year":"2011","unstructured":"Ganor B (2011) Trends in modern international terrorism. In: Weisburd D, Feucht T, Hakimi I, Mock L, Perry S (eds) To protect and to serve. Policing in an age of terrorism. Springer, New York, pp 11\u201342"},{"issue":"1","key":"9710_CR11","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1002\/jrs.4868","volume":"47","author":"KL Gares","year":"2016","unstructured":"Gares KL, Hufziger KT, Bykov SV, Asher SA (2016) Review of explosive detection methodologies and the emergence of standoff deep UV resonance Raman. J Raman Spectrosc 47(1):124\u2013141","journal-title":"J Raman Spectrosc"},{"key":"9710_CR12","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1287\/ijoc.1.3.190","volume":"1","author":"F Glover","year":"1989","unstructured":"Glover F (1989) Tabu search-part I. ORSA J Comput 1:190\u2013206","journal-title":"ORSA J Comput"},{"key":"9710_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1287\/ijoc.2.1.4","volume":"2","author":"F Glover","year":"1990","unstructured":"Glover F (1990) Tabu search-part II. ORSA J Comput 2:4\u201332","journal-title":"ORSA J Comput"},{"unstructured":"Hoffman B (2003) The logic of suicide terrorism. The Atlantic. http:\/\/www.theatlantic.com\/magazine\/archive\/2003\/06\/the-logic-of-suicide-terrorism\/302739\/ . Accessed 2 July 2016","key":"9710_CR14"},{"key":"9710_CR15","volume-title":"Stochastic local search. Foundations and applications","author":"H Hoos","year":"2005","unstructured":"Hoos H, St\u00fctzle T (2005) Stochastic local search. Foundations and applications. Morgan Kaufmann, Burlington"},{"issue":"29","key":"9710_CR16","doi-asserted-by":"publisher","first-page":"10399","DOI":"10.1073\/pnas.0500567102","volume":"102","author":"EH Kaplan","year":"2005","unstructured":"Kaplan EH, Kress M (2005) Operational effectiveness of suicide\u2013bomber\u2013detector schemes: a best-case analysis. Proc Natl Acad Sci USA 102(29):10399\u201310404","journal-title":"Proc Natl Acad Sci USA"},{"issue":"1","key":"9710_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s12198-016-0168-z","volume":"9","author":"M Kim","year":"2016","unstructured":"Kim M, Batta R, He Q (2016) Optimal routing of infiltration operations. J Transp Secur 9(1):87\u2013104","journal-title":"J Transp Secur"},{"key":"9710_CR18","doi-asserted-by":"publisher","first-page":"10892","DOI":"10.1109\/ACCESS.2017.2706018","volume":"5","author":"R Lara-Cabrera","year":"2017","unstructured":"Lara-Cabrera R, Gonz\u00e1lez-Pardo A, Benouaret K, Faci N, Benslimane D, Camacho D (2017) Measuring the radicalisation risk in social networks. IEEE Access 5:10892\u201310900","journal-title":"IEEE Access"},{"issue":"6","key":"9710_CR19","doi-asserted-by":"publisher","first-page":"1588","DOI":"10.1111\/1556-4029.13170","volume":"61","author":"SJ Leistedt","year":"2016","unstructured":"Leistedt SJ (2016) On the radicalization process. J Forensic Sci 61(6):1588\u20131591","journal-title":"J Forensic Sci"},{"key":"9710_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-02830-8","volume-title":"Genetic algorithms + data structures = evolution programs","author":"Z Michalewicz","year":"1992","unstructured":"Michalewicz Z (1992) Genetic algorithms + data structures = evolution programs. Springer, Berlin"},{"volume-title":"Handbook of memetic algorithms, studies in computational intelligence","year":"2012","unstructured":"Neri F, Cotta C, Moscato P (eds) (2012) Handbook of memetic algorithms, studies in computational intelligence, vol 379. Springer, Berlin","key":"9710_CR21"},{"issue":"2","key":"9710_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.5711\/morj.12.2.65","volume":"12","author":"X Nie","year":"2007","unstructured":"Nie X, Batta R, Drury CG, Lin L (2007) Optimal placement of suicide bomber detectors. Mil Oper Res 12(2):65\u201378","journal-title":"Mil Oper Res"},{"unstructured":"Patterson MR, Patterson SJ (2010) Unmanned systems: an emerging threat to waterside security: bad robots are coming. In: 2010 international waterside security conference. IEEE Press, pp 1\u20137","key":"9710_CR23"},{"unstructured":"Rand Corporation (2009) RAND database of worldwide terrorism incidents [Data File]. http:\/\/smapp.rand.org\/rwtid\/search_form.php","key":"9710_CR24"},{"key":"9710_CR25","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.eswa.2017.02.029","volume":"78","author":"S Tutun","year":"2017","unstructured":"Tutun S, Khasawneh MT, Zhuang J (2017) New framework that uses patterns and relations to understand terrorist behaviors. Expert Syst Appl 78:358\u2013375","journal-title":"Expert Syst Appl"},{"key":"9710_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.tre.2016.05.003","volume":"93","author":"X Yan","year":"2016","unstructured":"Yan X, Nie X (2016) Optimal placement of multiple types of detectors under a small vessel attack threat to port security. Transp Res Part E Logist Transp Rev 93:71\u201394","journal-title":"Transp Res Part E Logist Transp Rev"}],"container-title":["Natural Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11047-018-9710-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11047-018-9710-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11047-018-9710-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T20:17:24Z","timestamp":1662063444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11047-018-9710-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,18]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9710"],"URL":"https:\/\/doi.org\/10.1007\/s11047-018-9710-1","relation":{},"ISSN":["1567-7818","1572-9796"],"issn-type":[{"type":"print","value":"1567-7818"},{"type":"electronic","value":"1572-9796"}],"subject":[],"published":{"date-parts":[[2018,9,18]]},"assertion":[{"value":"18 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}