{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:13:40Z","timestamp":1770750820921,"version":"3.50.0"},"reference-count":19,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2010,4,16]]},"DOI":"10.1080\/08839511003715154","type":"journal-article","created":{"date-parts":[[2010,4,13]],"date-time":"2010-04-13T09:04:10Z","timestamp":1271149450000},"page":"253-276","source":"Crossref","is-referenced-by-count":28,"title":["EVIDENCE DIRECTED GENERATION OF PLAUSIBLE CRIME SCENARIOS WITH IDENTITY RESOLUTION"],"prefix":"10.1080","volume":"24","author":[{"given":"Xin","family":"Fu","sequence":"first","affiliation":[]},{"given":"Tossapon","family":"Boongoen","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Badia , A. , and M. M. Kantardzic . 2005 . Link analysis tools for intelligence and counterterrorism . In Proceedings of IEEE International Conference on Intelligence and Security Informatics , 49 \u2013 59 . Atlanta , Georgia : Springer Berlin .","DOI":"10.1007\/11427995_5"},{"key":"CIT0002","unstructured":"Boongoen , T. , and Q. Shen . 2008 . Detecting false identity through behavioural patterns . In Proceedings of International Crime Science Conference , London , UK : Willan Publishing ."},{"key":"CIT0003","author":"Boongoen T.","journal-title":"AI and Law"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Branting , K. 2003 . A comparative evaluation of name matching algorithms . In Proceedings of International Conference on AI and Law , 224 \u2013 232 . Edinburgh , Scotland : ACM .","DOI":"10.1145\/1047788.1047837"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2005.01.005"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Fu , X., andQ. Shen.2009.A novel framework of fuzzy complex numbers and its application to compositional modelling. InProceedings of the 2009 IEEE International Conference on Fuzzy Systems,536\u2013541. ICC , Jeju Island, Korea : IEEE.","DOI":"10.1109\/FUZZY.2009.5277051"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Fu , X. , Q. Shen , and R. Zhao . 2007 . Towards fuzzy compositional modelling . InProceedings of the 16th International Conference on Fuzzy Systems, 1233 \u2013 1238 . London , UK : IEEE .","DOI":"10.1109\/FUZZY.2007.4295543"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-008-0304-1"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Halliwell , J. , J. Keppens , and Q. Shen . 2003 . Linguistic bayesian networks for reasoning with subjective probabilities in forensic statistics . InProceedings of International Conference on Artificial Intelligence and Law, 42 \u2013 50 . Edinburgh , Scotland : ACM .","DOI":"10.1145\/1047788.1047795"},{"key":"CIT0010","unstructured":"Hsiung , P. , A. Moore , D. Neill , and J. Schneider . 2005 . Alias detection in link data sets . InProceedings of International Conference on Intelligence Analysis, McLean , VA : International Conference on Intelligence Analysis ."},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Jeh , G. , and J. Widom . 2002 . Simrank: A measure of structural-context similarity . In Proceedings of International Conference on Knowledge Discovery and Data Mining , 538 \u2013 543 . Edmonton , Alberta : ACM .","DOI":"10.1145\/775107.775126"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888901000091"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Keppens , J. , Q. Shen , and B. Schafer . 2005 . Probabilistic abductive computation of evidence collection strategies in crime investigation . InProceedings of International Conference on Artificial Intelligence and Law, 215 \u2013 224 . Bologna , Italy : ACM .","DOI":"10.1145\/1165485.1165520"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Klink , S. , P. Reuther , A. Weber , B. Walter , and M. Ley . 2006 . Analysing social networks within bibliographical data . InProceedings of the 17th International Conference on Database and Expert Systems Applications, 234 \u2013 243 . Krakow , Poland : Springer Verlag .","DOI":"10.1007\/11827405_23"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"CIT0016","unstructured":"Pantel , P. 2006 . Alias detection in malicious environments . InProceedings of AAAI Fall Symposium on Capturing and Using Patterns for Evidence Detection, Washington , DC , 14 \u2013 20 ."},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgl014"},{"key":"CIT0018","unstructured":"Wang , G. A. , H. Atabakhsh , T. Petersen , and H. Chen . 2005 . Discovering identity problems: A case study . In Proceedings of IEEE International Conference on Intelligence and Security Informatics , Atlanta , 368 \u2013 373 ."},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871799"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839511003715154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T06:21:42Z","timestamp":1559024502000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08839511003715154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,16]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,4,16]]}},"alternative-id":["10.1080\/08839511003715154"],"URL":"https:\/\/doi.org\/10.1080\/08839511003715154","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,16]]}}}