{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:31:33Z","timestamp":1759825893373,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ccst.2018.8585428","type":"proceedings-article","created":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T23:55:13Z","timestamp":1545695713000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Examining Threat Image Projection Artifacts and Related Issues: A Rating Study"],"prefix":"10.1109","author":[{"given":"Robin","family":"Riz a Porta","sequence":"first","affiliation":[]},{"given":"Yanik","family":"Sterchi","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Schwaninger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Off J Eur Union","article-title":"Commission implementing regulation (EU) 2015\/1998 of 5 November 2015 laying down detailed measures for the implementation of the common basic standards on aviation security","year":"2015","key":"ref4"},{"key":"ref3","first-page":"36","article-title":"Threat image projection: Enhancing performance?","author":"schwaninger","year":"2006","journal-title":"Aviation Security International"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/978-0-387-84858-7_7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2004.1405402"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-307"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1272582.1272606"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.86.2.420"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1038\/s41562-017-0058","article-title":"Five factors that guide attention in visual search","volume":"1","author":"wolfe","year":"2017","journal-title":"Nat Hum Behav"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1167\/13.3.33"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.6.4.284"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/435439a"}],"event":{"name":"2018 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2018,10,22]]},"location":"Montreal, QC","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 International Carnahan Conference on Security Technology (ICCST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8573569\/8585426\/08585428.pdf?arnumber=8585428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:49:52Z","timestamp":1643255392000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8585428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ccst.2018.8585428","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}