{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:24:45Z","timestamp":1759962285194,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/ic3.2019.8844904","type":"proceedings-article","created":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:37:05Z","timestamp":1568939825000},"page":"1-7","source":"Crossref","is-referenced-by-count":18,"title":["Comparison of Machine Learning Approaches in the Prediction of Terrorist Attacks"],"prefix":"10.1109","author":[{"given":"Palak","family":"Agarwal","sequence":"first","affiliation":[]},{"given":"Mahak","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Satish","family":"Chandra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126092"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2017.8078815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA.2017.7951886"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTE.2010.5608902"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CASON.2011.6085954"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258374"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284096"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317386"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP1.2018.8325847"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2017.20"},{"journal-title":"Extremist videos on YouTube will now carry warnings","year":"2017","author":"snider","key":"ref4"},{"journal-title":"Google says it will do more to suppress terrorist propaganda","year":"2017","author":"rupp","key":"ref3"},{"journal-title":"START Global Terrorism Database ISIL Auxiliary Dataset","year":"2017","key":"ref6"},{"journal-title":"Proportion of terrorist attacks by religious and right-wing extremists on the rise in United States","year":"2017","author":"rivinius","key":"ref5"},{"journal-title":"Mastering Machine Learning with R Packt Publishing Ltd","year":"2017","author":"lesmeister","key":"ref8"},{"journal-title":"Evaluating Machine Learning Models","year":"2018","author":"zheng","key":"ref7"},{"journal-title":"Global Terrorism Index Institute for economics and peace National Consortium for START","year":"0","key":"ref2"},{"journal-title":"Terror attacks in developed world surge 650% in one year","year":"2016","author":"fox","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355370"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2017.152"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.icte.2016.05.001","article-title":"A deep-learning-based emergency alert system","volume":"2","author":"byngseok","year":"2016","journal-title":"ICT Express"}],"event":{"name":"2019 Twelfth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2019,8,8]]},"location":"Noida, India","end":{"date-parts":[[2019,8,10]]}},"container-title":["2019 Twelfth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8830728\/8844868\/08844904.pdf?arnumber=8844904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:32:40Z","timestamp":1658158360000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8844904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ic3.2019.8844904","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}