{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:35Z","timestamp":1759091555515,"version":"3.30.1"},"reference-count":9,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2000,4,1]],"date-time":"2000-04-01T00:00:00Z","timestamp":954547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[2000,4]]},"DOI":"10.1016\/s0377-2217(99)00047-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:15:26Z","timestamp":1027610126000},"page":"123-132","source":"Crossref","is-referenced-by-count":10,"title":["A sampling procedure to estimate risk probabilities in access-control security systems"],"prefix":"10.1016","volume":"122","author":[{"given":"Sheldon H.","family":"Jacobson","sequence":"first","affiliation":[]},{"given":"John E.","family":"Kobza","sequence":"additional","affiliation":[]},{"given":"Marvin K.","family":"Nakayama","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0377-2217(99)00047-8_BIB1","doi-asserted-by":"crossref","unstructured":"R.G. Bradley, Performance estimates for personnel access control systems, in: 1981 IEEE Carnahan Conference on Crime Counter Measures, Lexington, KY, 1981, pp. 23\u201327","DOI":"10.2172\/5075814"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1287\/inte.9.4.117","article-title":"An application of queueing theory to airport passenger security screening","volume":"9","author":"Gilliam","year":"1979","journal-title":"Interfaces"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB3","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1111\/j.1539-6924.1996.tb00831.x","article-title":"Addressing the dependency problem in access security system architecture design","volume":"16","author":"Kobza","year":"1996","journal-title":"Risk Analysis"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB4","first-page":"225","article-title":"Probability models for access security system architectures","volume":"22","author":"Kobza","year":"1994","journal-title":"Journal of the Operational Research Society"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1520\/JTE11818J","article-title":"Introduction to the Sixth International Civil Aviation Security Conference","volume":"22","author":"Malotky","year":"1994","journal-title":"Journal of Testing and Evaluation"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB6","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1520\/JTE11828J","article-title":"International aviation security research and development","volume":"22","author":"Polski","year":"1994","journal-title":"Journal of Testing and Evaluation"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB7","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1057\/jors.1994.124","article-title":"Modelling the quality of automatic quality checks","volume":"45","author":"Christer","year":"1994","journal-title":"Journal of the Operational Research Society"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB8","doi-asserted-by":"crossref","unstructured":"R. Serfling, Approximation Theorems of Mathematical Statistics, Wiley, New York, 1980","DOI":"10.1002\/9780470316481"},{"key":"10.1016\/S0377-2217(99)00047-8_BIB9","unstructured":"A.J. Duncan, Quality Control and Industrial Statistics, Fifth ed., R.D. Irwin, Homewood, IL, 1986."}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221799000478?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221799000478?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T06:38:45Z","timestamp":1733294325000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221799000478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,4]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,4]]}},"alternative-id":["S0377221799000478"],"URL":"https:\/\/doi.org\/10.1016\/s0377-2217(99)00047-8","relation":{},"ISSN":["0377-2217"],"issn-type":[{"type":"print","value":"0377-2217"}],"subject":[],"published":{"date-parts":[[2000,4]]}}}