{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:19:22Z","timestamp":1758269962266},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisda.2012.6291542","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:58:22Z","timestamp":1347047902000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["An online shadowed clustering algorithm applied to risk visualization in Territorial Security"],"prefix":"10.1109","author":[{"given":"Rafael","family":"Falcon","sequence":"first","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Rami","family":"Abielmona","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HSIC 2006 The State of Play in Homeland Security Critical Infrastructure - The next Frontier","year":"2006","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/KAMW.2008.4810531"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-010-9002-1"},{"key":"16","article-title":"Support Tool Development for Real-Time Risk Prediction in Interdependent Critical Infrastructures","author":"schaberreiter","year":"0","journal-title":"IEEE Int'l Symposium on Sofware Reliability Engineering 2009"},{"key":"13","first-page":"179","article-title":"Shadowed Sets: Bridging Fuzzy and Rough Sets","author":"pedrycz","year":"1999","journal-title":"Rough Fuzzy Hybridization A New Trend in Decision-Making"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/int.20323"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.09.029"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.840099"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CIMSA.2011.6059924"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.102"},{"journal-title":"Larus Technologies and GE Fanuc Intelligent Platforms 21st Century Territorial Security A Sensor Network Approach","year":"2008","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2007.383888"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2007.4413710"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295318"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586036"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2008.4779131"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2008.4531233"}],"event":{"name":"2012 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2012,7,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,7,13]]}},"container-title":["2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6279634\/6291498\/06291542.pdf?arnumber=6291542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:59:58Z","timestamp":1490140798000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6291542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cisda.2012.6291542","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}