{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:25:25Z","timestamp":1730237125647,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,30]]},"DOI":"10.1109\/iccta45985.2018.9499167","type":"proceedings-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T16:51:57Z","timestamp":1628095917000},"page":"55-59","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining"],"prefix":"10.1109","author":[{"given":"Firas","family":"Saidi","sequence":"first","affiliation":[]},{"given":"Zouheir","family":"Trabelsi","sequence":"additional","affiliation":[]},{"given":"Henda Ben","family":"Ghezala","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"57","article-title":"Discovering bin- Laden's replacement in al-Qaeda, using social network analysis: a methodological investigation","volume":"8","author":"wu","year":"2014","journal-title":"Perspectives on Terrorism"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/10576100600798418"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/583890.583894"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2006.1007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2202\/1554-8597.1207"},{"key":"ref5","article-title":"Analyzing News Summaries for Identification of Terrorism Incident Type","volume":"3","author":"nizamani","year":"2014","journal-title":"International Journal of Educational Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2015.27"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00117-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/09546550701246817"},{"journal-title":"The Data Warehouse Toolkit The Complete Guide to Dimensional Modeling","year":"2011","author":"kimball","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.017"}],"event":{"name":"2018 28th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2018,10,30]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2018,11,1]]}},"container-title":["2018 28th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9499109\/9499103\/09499167.pdf?arnumber=9499167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T17:09:21Z","timestamp":1635268161000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9499167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,30]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iccta45985.2018.9499167","relation":{},"subject":[],"published":{"date-parts":[[2018,10,30]]}}}