{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:41Z","timestamp":1740169061936,"version":"3.37.3"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2746838","type":"journal-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T14:07:32Z","timestamp":1505743652000},"page":"18238-18249","source":"Crossref","is-referenced-by-count":4,"title":["APRICOIN: An Adaptive Approach for Prioritizing High-Risk Containers Inspections"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6572-8313","authenticated-orcid":false,"given":"Mohamed Yassine","family":"Samiri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mehdi","family":"Najib","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelaziz","family":"Elfazziki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed Nezar","family":"Abourraja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dalila","family":"Boudebous","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelhadi","family":"Bouain","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Association analysis: Basic concepts and algorithms","author":"tan","year":"2005","journal-title":"Introduction to Data Mining"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CEIT.2015.7233078"},{"key":"ref33","first-page":"662","article-title":"Intelligent networked containers for enhancing global supply chain security and enabling new commercial value","author":"kim","year":"2008","journal-title":"Proc 3rd Int Conf Commun Syst Softw Middleware (Comsware)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.04.006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.01.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvrad.2009.09.002"},{"journal-title":"Container Security Programs Have Matured but Uncertainty Persists Over the Future of 100 Percent Scanning","year":"2012","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2009.03.004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJSPM.2012.049154"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2015.12.006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2007.09.008"},{"key":"ref27","first-page":"183","article-title":"Modeling & simulation applied to security systems","author":"longo","year":"2011","journal-title":"Proc Summer Comput Simulation Conf"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2087747"},{"journal-title":"Container Port Traffic (TEU 20 Foot Equivalent Units)|Data|Table","year":"2017","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-2615(93)90009-Y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2003.10.010"},{"journal-title":"Importer Security Filing and Additional Carrier Requirements","year":"2009","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2004.04.006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2010.01.026"},{"journal-title":"Summary of Challenges Faced in Targeting Oceangoing Cargo Containers for Inspection","year":"2007","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3141\/1822-01"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.7813\/2075-4124.2014\/6-1\/A.31"},{"key":"ref50","first-page":"3389","article-title":"SPMF: A java open-source pattern mining library","volume":"15","author":"fournier-viger","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2013.818190"},{"journal-title":"Jess in Action Rule-based systems in Java","year":"2003","author":"friedman-hill","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJOR.2016.073252"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2008.12.005"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/IJOPM-11-2012-0530"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2014.12.013"},{"journal-title":"Introduction to Management Science","year":"1996","author":"taylor","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-92828-7","volume":"103","author":"zopounidis","year":"2010","journal-title":"Handbook of Multicriteria Analysis"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICICICT.2014.6781357"},{"key":"ref17","first-page":"487","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf Very Large Data Bases (VLDB)"},{"journal-title":"MTSA and ISPS Final rules issued","year":"2004","author":"log","key":"ref18"},{"journal-title":"Jitters as ISPS\/MTSA deadline nears","year":"2004","author":"log","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00817.x"},{"journal-title":"Review of Maritime Transport","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2012.08.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2009.02.014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21236\/ADA434718"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8373.2007.00351.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3997\/2214-4609.20142376"},{"journal-title":"Le Passage Portuaire Approches Interdisciplinaires des Flux de Marchandises Transitant par les Ports","year":"2013","key":"ref9"},{"journal-title":"Artificial Intelligence A Guide to Intelligent Systems","year":"2005","author":"negnevitsky","key":"ref46"},{"key":"ref45","first-page":"63","article-title":"Fuzzy logic-based risk assessment","volume":"1","author":"pokoradi","year":"2002","journal-title":"Academic and Applied Research in Military Science"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.004"},{"key":"ref47","article-title":"Fuzzy systems handbook","author":"earl","year":"1994","journal-title":"A practitioners guide to building using and maintaining fuzzy systems"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62701-4_18"},{"journal-title":"Neural and Fuzzy Logic Control of Drives and Power Systems","year":"2002","author":"cirstea","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(90)90014-W"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08039285.pdf?arnumber=8039285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:30:11Z","timestamp":1641987011000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8039285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2746838","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}