{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:55:09Z","timestamp":1769849709556,"version":"3.49.0"},"reference-count":27,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2004,12,1]],"date-time":"2004-12-01T00:00:00Z","timestamp":1101859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Decision Support Systems"],"published-print":{"date-parts":[[2004,12]]},"DOI":"10.1016\/s0167-9236(03)00117-9","type":"journal-article","created":{"date-parts":[[2003,10,11]],"date-time":"2003-10-11T23:04:32Z","timestamp":1065913472000},"page":"473-487","source":"Crossref","is-referenced-by-count":98,"title":["Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks"],"prefix":"10.1016","volume":"38","author":[{"given":"Jennifer J.","family":"Xu","sequence":"first","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/S0167-9236(03)00117-9_BIB1","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/72.286889","article-title":"Neural networks for shortest path computation and routing in computer networks","volume":"4","author":"Ali","year":"1993","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"17","key":"10.1016\/S0167-9236(03)00117-9_BIB2","first-page":"17","article-title":"Security works","volume":"38","author":"Anderson","year":"1994","journal-title":"Security Management"},{"issue":"5","key":"10.1016\/S0167-9236(03)00117-9_BIB3","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1109\/72.950136","article-title":"A neural network for shortest path computation","volume":"12","author":"Araujo","year":"2001","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB4","series-title":"Proceedings of the Eighteenth Annual Symposium on Computational Geometry (Barcelona, Spain)","first-page":"170","article-title":"Pseudo approximation algorithms, with applications to optimal motion planning","author":"Asano","year":"2002"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB5","series-title":"Proceedings of the National Conference on Digital Government Research (Los Angeles, CA)","first-page":"271","article-title":"Extracting meaningful entities from police narrative reports","author":"Chau","year":"2002"},{"issue":"5","key":"10.1016\/S0167-9236(03)00117-9_BIB6","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/21.179830","article-title":"Automatic construction of networks of concepts characterizing document databases","volume":"22","author":"Chen","year":"1992","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB7","article-title":"Overview of MUC-7\/MET-2","author":"Chinchor","year":"1998"},{"issue":"9","key":"10.1016\/S0167-9236(03)00117-9_BIB8","first-page":"22","article-title":"Automated link analysis: artificial intelligence-based tool for investigators","volume":"52","author":"Coady","year":"1985","journal-title":"Police Chief"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB9","series-title":"Introduction to Algorithms","author":"Cormen","year":"1991"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB10","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1287\/mnsc.6.2.187","article-title":"On the shortest route through a network","volume":"6","author":"Dantzig","year":"1960","journal-title":"Management Science"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB11","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","article-title":"A note on two problems in connection with graphs","volume":"1","author":"Dijkstra","year":"1959","journal-title":"Numerische Mathematik"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB12","series-title":"Optimization Algorithms for Networks and Graphs","author":"Evans","year":"1992"},{"issue":"6","key":"10.1016\/S0167-9236(03)00117-9_BIB13","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/367766.368168","article-title":"Algorithm 97: shortest path","volume":"5","author":"Floyd","year":"1962","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB14","series-title":"Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis","article-title":"Restructuring databases for knowledge discovery by consolidation and link formation","author":"Goldberg","year":"1998"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB15","series-title":"Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis","article-title":"Restructuring transactional data for link analysis in the FinCen AI System","author":"Goldberg","year":"1998"},{"issue":"2","key":"10.1016\/S0167-9236(03)00117-9_BIB16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1177\/001872087501700206","article-title":"The application of link analysis to police intelligence","volume":"17","author":"Harper","year":"1975","journal-title":"Human Factors"},{"issue":"3","key":"10.1016\/S0167-9236(03)00117-9_BIB17","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","article-title":"Using coplink to analyze criminal-justice data","volume":"35","author":"Hauck","year":"2002","journal-title":"IEEE Computer"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB18","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/BF01299142","article-title":"The one-to-one shortest-path problem: an empirical analysis with the two-tree dijkstra algorithm","volume":"1","author":"Helgason","year":"1993","journal-title":"Computational Optimization and Applications"},{"issue":"3","key":"10.1016\/S0167-9236(03)00117-9_BIB19","first-page":"53","article-title":"The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in The Netherlands","volume":"24","author":"Klerks","year":"2001","journal-title":"Connections"},{"issue":"3","key":"10.1016\/S0167-9236(03)00117-9_BIB20","first-page":"43","article-title":"Mapping networks of terrorist cells","volume":"24","author":"Krebs","year":"2001","journal-title":"Connections"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB21","series-title":"Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis","article-title":"Automatic information extraction from documents: a tool for intelligence and law enforcement analysts","author":"Lee","year":"1998"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB22","article-title":"The structural analysis of criminal networks","volume":"vol. III","author":"McAndrew","year":"1999"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB23","series-title":"Proceedings of SIGCOMM Symposium on Communications Architectures and Protocols, London, UK","first-page":"212","article-title":"Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers","author":"Perkins","year":"1994"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB24","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","article-title":"The application of network analysis to criminal intelligence: an assessment of the prospects","volume":"13","author":"Sparrow","year":"1991","journal-title":"Social Networks"},{"issue":"4","key":"10.1016\/S0167-9236(03)00117-9_BIB25","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1002\/(SICI)1097-4571(2000)51:4<352::AID-ASI5>3.0.CO;2-8","article-title":"Comparing noun phrasing techniques for use with Medical Digital Library tools","volume":"51","author":"Tolle","year":"2000","journal-title":"Journal of the American Society for Information Science"},{"issue":"2","key":"10.1016\/S0167-9236(03)00117-9_BIB26","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/141800.141805","article-title":"Analysis of shortest-path routing algorithms in a dynamic network environment","volume":"22","author":"Wang","year":"1992","journal-title":"ACM Computer Communication Review"},{"key":"10.1016\/S0167-9236(03)00117-9_BIB27","series-title":"Social Network Analysis: Methods and Applications","author":"Wasserman","year":"1994"}],"container-title":["Decision Support Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923603001179?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167923603001179?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T05:55:47Z","timestamp":1550642147000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167923603001179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,12]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,12]]}},"alternative-id":["S0167923603001179"],"URL":"https:\/\/doi.org\/10.1016\/s0167-9236(03)00117-9","relation":{},"ISSN":["0167-9236"],"issn-type":[{"value":"0167-9236","type":"print"}],"subject":[],"published":{"date-parts":[[2004,12]]}}}