{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:22:00Z","timestamp":1771953720600,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3224603","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T21:37:58Z","timestamp":1669325878000},"page":"126466-126478","source":"Crossref","is-referenced-by-count":7,"title":["A New Model for Predicting and Dismantling a Complex Terrorist Network"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2786-2036","authenticated-orcid":false,"given":"Botambu","family":"Collins","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Yeungnam University, Gyeongsan, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2834-9488","authenticated-orcid":false,"given":"Dinh Tuyen","family":"Hoang","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Information Technology, Quang Binh University, &#x0189;&#x00F4;ng H&#x00F3;i, Quang Binh, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3247-2948","authenticated-orcid":false,"given":"Ngoc Thanh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Nguyen Tat Thanh University, Ho Chi Minh City, Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dosam","family":"Hwang","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Yeungnam University, Gyeongsan, South Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55789-8_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1501742"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2019.8844947"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v6i10.722729"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.0020088"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/s12918-018-0598-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1130\/0016-7606(1945)56[275:EDOSAT]2.0.CO;2"},{"key":"ref34","article-title":"Invariance and attraction properties of Galton&#x2013;Watson trees","author":"kovchegov","year":"2019","journal-title":"arXiv 1911 08095"},{"key":"ref10","first-page":"10","author":"alison","year":"2017","journal-title":"CS224W final project report Uncovering the global terrorism network"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-23984-9_12"},{"key":"ref12","first-page":"361","article-title":"Self-exciting point process to study the evolution of the attack terrorism","volume":"6","author":"khraibani","year":"2016","journal-title":"Int J Statist Appl"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492626"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2915938"},{"key":"ref16","first-page":"1233","article-title":"The 9\/11 commission report","volume":"70","author":"moris","year":"2002","journal-title":"Amer J Nursing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/10576100600564042"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1556812"},{"key":"ref19","article-title":"Hawkes processes","author":"laub","year":"2015","journal-title":"arXiv 1507 02822"},{"key":"ref28","first-page":"35","article-title":"Countering terrorism on social","volume":"8","author":"alzahrani","year":"2018","journal-title":"Comput Sci Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2004.1341780"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1515\/peps-2018-0040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929798"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJNVO.2011.037158"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2318-7_18"},{"key":"ref5","article-title":"The transformation and demise of terrorist organizations: Causes and categories","author":"mehta","year":"2016","journal-title":"Undergraduate Honors Theses"},{"key":"ref8","first-page":"1","article-title":"Destabilizing terrorist networks","author":"carley","year":"2003","journal-title":"Proc NAACSOS Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v7i4.941"},{"key":"ref2","first-page":"1","article-title":"Regional integration and regional security. Challenges in the ECCAS","author":"collins","year":"2018","journal-title":"Int J Sci Eng Res"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/237809"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2010.02.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2019.1565117"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859714"},{"key":"ref21","first-page":"200","article-title":"Revising the Newman&#x2013;Girvan algorithm","volume":"1649","author":"hurajov\u00e1","year":"2016","journal-title":"Proc CEUR Workshop"},{"key":"ref24","volume":"9","author":"mckendrick","year":"2019","journal-title":"Artificial intelligence prediction and counterterrorism"},{"key":"ref23","first-page":"222","article-title":"Multilanguage semantic behavioural algorithms to discover terrorist related online contents","author":"mencarini","year":"2017","journal-title":"Proc 1st Italian Conf Cybersecurity (ITASEC)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.A1768.109119"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0179057"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09963538.pdf?arnumber=9963538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:36:25Z","timestamp":1672083385000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9963538\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3224603","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}