{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:38:49Z","timestamp":1648510729333},"reference-count":25,"publisher":"Informa UK Limited","issue":"4","funder":[{"name":"Tampere Doctoral Program in Information Science and Engineering (TISE)"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2015,4,21]]},"DOI":"10.1080\/08839514.2015.1016774","type":"journal-article","created":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T18:16:32Z","timestamp":1429380992000},"page":"382-401","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Homicide and Its Social Context: Analysis Using the Self-Organizing Map"],"prefix":"10.1080","volume":"29","author":[{"given":"Xingan","family":"Li","sequence":"first","affiliation":[]},{"given":"Henry","family":"Joutsijoki","sequence":"additional","affiliation":[]},{"given":"Jorma","family":"Laurikkala","sequence":"additional","affiliation":[]},{"given":"Markku","family":"Siermala","sequence":"additional","affiliation":[]},{"given":"Martti","family":"Juhola","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25952-7_32"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1350\/ijps.5.4.265.24933"},{"key":"CIT0003","volume-title":"Understanding intrusion detection through visualization","author":"Axelsson S.","year":"2005"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2307\/253535"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2006.06.046"},{"key":"CIT0008","first-page":"1","volume-title":"Proceedings of the IFIP Working Group 11.9 on Digital Forensics (2005)","author":"Fei B.","year":"2005"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.01.017"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/11504894_85"},{"key":"CIT0011","volume-title":"User profiling and classification for fraud detection in mobile communications networks","author":"Hollm\u00e9n J.","year":"2000"},{"key":"CIT0012","first-page":"946","volume":"470","author":"Hollm\u00e9n J.","year":"1999","journal-title":"Artificial Neural Networks"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23199-5_30"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9281-3"},{"issue":"2","key":"CIT0016","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3233\/ICA-2011-0385","volume":"19","author":"Juhola M.","year":"2012","journal-title":"Integrated Computer-Aided Engineering"},{"key":"CIT0018","volume-title":"Artificial neural network system for classification of offenders in murder and rape cases","author":"Kangas L. J.","year":"2001"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1117\/12.342880"},{"key":"CIT0020","volume-title":"Self-organizing maps","author":"Kohonen T.","year":"1979"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1007\/11011620_2"},{"key":"CIT0022","volume-title":"Detecting ssh identity theft in hpc cluster environments using self-organizing maps (Master\u2019s thesis, Link\u00f6ping University, Sweden)","author":"Leufven C.","year":"2006"},{"key":"CIT0023","first-page":"346","volume-title":"Proceedings of international joint conference on neural networks","author":"Memon Q. A.","year":"2006"},{"key":"CIT0024","volume-title":"History of criminology","author":"Rock R.","year":"1994"},{"key":"CIT0026"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.11610\/isij.1803"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2015.1016774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T19:39:29Z","timestamp":1566589169000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2015.1016774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":25,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,4,18]]},"published-print":{"date-parts":[[2015,4,21]]}},"alternative-id":["10.1080\/08839514.2015.1016774"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2015.1016774","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}