{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:23:01Z","timestamp":1741839781361,"version":"3.38.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6023897","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:24:52Z","timestamp":1318451092000},"page":"4007-4009","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of two mathematical models for predicting the fallout hazard from terrorist nuclear detonations"],"prefix":"10.1109","author":[{"given":"Zhiliang","family":"Liu","sequence":"first","affiliation":[{"name":"Engineering Command Institute of Chemical Defence, 102205, Beijing, P.R. China"}]},{"given":"Xin","family":"Lu","sequence":"additional","affiliation":[{"name":"Engineering Command Institute of Chemical Defence, 102205, Beijing, P.R. China"}]},{"given":"Peng","family":"Peng","sequence":"additional","affiliation":[{"name":"Engineering Command Institute of Chemical Defence, 102205, Beijing, P.R. China"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511816314"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.5040\/9798400694684","author":"clarke","year":"2006","journal-title":"Outsmarting the Terrorists"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.atmosenv.2005.09.069"},{"key":"1","article-title":"Terrorist targets and tactics: New risks to world order","author":"paul","year":"1990","journal-title":"Conflict Studies"},{"journal-title":"Seer II A New Damage Assessment Fallout Model","year":"1972","author":"lee","key":"7"},{"year":"0","author":"crocker","key":"6"},{"year":"0","author":"glasstone","key":"5"},{"key":"4","article-title":"Crude nuclear weapons: Proliferation and the terrorist threat","author":"gururaj mutalik","year":"1996","journal-title":"IPPNW Global Health Watch Report Number 1"},{"journal-title":"DNAF-1 an Analytical Fallout Prediction Model and Code","year":"1981","author":"norment","key":"9"},{"key":"8","first-page":"231","author":"ja?ppinen","year":"2006","journal-title":"Lightweight Planning and Warning Tool for Hazardous Events in NBC 2006 Symposium Proceedings"}],"event":{"name":"2011 International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6023088\/06023897.pdf?arnumber=6023897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T20:53:43Z","timestamp":1741812823000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6023897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6023897","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}