{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:35:26Z","timestamp":1761896126283,"version":"3.37.3"},"reference-count":25,"publisher":"Informa UK Limited","issue":"5","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51475347"],"award-info":[{"award-number":["51475347"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Research Grant","award":["No. : JCYJ2010417105742712"],"award-info":[{"award-number":["No. : JCYJ2010417105742712"]}]},{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["CityU 149412"],"award-info":[{"award-number":["CityU 149412"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2017,5,28]]},"DOI":"10.1080\/17517575.2015.1075593","type":"journal-article","created":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T13:06:34Z","timestamp":1439816794000},"page":"652-671","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Intelligent agents for adaptive security market surveillance"],"prefix":"10.1080","volume":"11","author":[{"given":"Kun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Baoxun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Huaiqing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,8,17]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1093\/rfs\/5.3.503"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1111\/jofi.2004.59.issue-3"},{"key":"CIT0003","first-page":"69","volume-title":"Financial Surveillance, edited by M. Fris\u00e9n","author":"Bock D.","year":"2008"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s10693-006-5923-z"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1093\/aler\/ahn009"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.2307\/2601102"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.03.001"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"issue":"1902","key":"CIT0014","first-page":"69","volume":"38","author":"Jaccard P","year":"1902","journal-title":"Bulletin De La Soci\u00e9t\u00e9 Vaudoise Des Sciences Naturelles"},{"issue":"1","key":"CIT0017","first-page":"55","volume":"20","author":"Kirkland J. D.","year":"1999","journal-title":"AI Magazine"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0021(05)02024-1"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/163298.163301"},{"key":"CIT0021","first-page":"20","author":"Luo Y.","year":"2002","journal-title":"IEEE Network"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/14697680600760753"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1980.tb03476.x"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/5326.983933"},{"issue":"1","key":"CIT0030","first-page":"37","volume":"2","author":"Powers D. M. W","year":"2007","journal-title":"Journal of Machine Learning Technologies"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1108\/13590791311287355"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1108\/00220410410560582"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/1462198"},{"issue":"4","key":"CIT0039","first-page":"35","volume":"24","author":"Singhal A","year":"2001","journal-title":"Bulletin of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.660503"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.2008.01362.x"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1145\/504729.504733"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2015.1075593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,2,6]],"date-time":"2017-02-06T07:03:19Z","timestamp":1486364599000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2015.1075593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,17]]},"references-count":25,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2015,8,17]]},"published-print":{"date-parts":[[2017,5,28]]}},"alternative-id":["10.1080\/17517575.2015.1075593"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2015.1075593","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"type":"print","value":"1751-7575"},{"type":"electronic","value":"1751-7583"}],"subject":[],"published":{"date-parts":[[2015,8,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}