{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:36:06Z","timestamp":1775068566318,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,19]]},"DOI":"10.1109\/acit62333.2024.10712467","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:15Z","timestamp":1729101075000},"page":"144-149","source":"Crossref","is-referenced-by-count":1,"title":["Association Rules Mining in Crime Data Analysis"],"prefix":"10.1109","author":[{"given":"Olha","family":"Kovalchuk","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Theory of Law and Constitutionalism Department,Ternopil,Ukraine"}]},{"given":"Serhiy","family":"Banakh","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Criminal Law and Process Department,Ternopil,Ukraine"}]},{"given":"Mariia","family":"Masonkova","sequence":"additional","affiliation":[{"name":"Kherson State Maritime Academy,Department of Informational Support of Educational Process,Kherson,Ukraine"}]},{"given":"Andrii","family":"Kolesnikov","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Security and Law Enforcement,Ternopil,Ukraine"}]},{"given":"Pavlo","family":"Chopyk","sequence":"additional","affiliation":[{"name":"Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of Physics and Mathematics,Ternopil,Ukraine"}]},{"given":"Pavlo","family":"Basistyi","sequence":"additional","affiliation":[{"name":"Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of Physics and Mathematics,Ternopil,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/info15020084"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9060339"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9060386"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9040229"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24425\/ijet.2023.144365"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2019.101403"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12060209"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi11100529"},{"key":"ref9","first-page":"376","article-title":"Associative Rule Mining for the Assessment of the Risk of Recidivism","volume-title":"The CEUR Workshop Proceedings","volume":"3373","author":"Kovalchuk"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/acit58437.2023.10275450"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-021-00149-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02858-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2021-0396"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph191710616"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2478\/foli-2022-0001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT54803.2022.9913182"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info14030161"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11233986"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app12073675"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2021.103403"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/su14159322"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17576\/geo-2021-1704-15"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/socsci11100443"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/engproc2022018039"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04998-1"},{"key":"ref26","article-title":"An Overview of Association Rule Mining & its Applications","author":"Rai","year":"2022","journal-title":"upGrad"},{"key":"ref27","volume-title":"Association Rule Mining: Importance and Steps","author":"Mathur","year":"2022"},{"key":"ref28","volume-title":"RapidMiner Documentation","year":"2023"},{"key":"ref29","volume-title":"Unified register of pre-trial investigations."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12100437"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-3816-0_37"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2022.101865"}],"event":{"name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Ceske Budejovice, Czech Republic","start":{"date-parts":[[2024,9,19]]},"end":{"date-parts":[[2024,9,21]]}},"container-title":["2024 14th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10712446\/10712447\/10712467.pdf?arnumber=10712467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T07:55:15Z","timestamp":1729151715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10712467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,19]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/acit62333.2024.10712467","relation":{},"subject":[],"published":{"date-parts":[[2024,9,19]]}}}