{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:05:15Z","timestamp":1729652715230,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565059","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T16:05:44Z","timestamp":1216310744000},"page":"212-214","source":"Crossref","is-referenced-by-count":0,"title":["An integrated approach to mapping worldwide bioterrorism research capabilities"],"prefix":"10.1109","author":[{"family":"Yan Dang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Yulei Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Nichalin Suakkaphong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cathy","family":"Larson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Hsinchun Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/VL.1996.545307"},{"year":"0","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1002\/aris.1440390111"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1080\/09546559108427094"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1093\/bib\/6.1.57"},{"key":"1","first-page":"1","article-title":"literature mining in molecular biology","author":"bruijn","year":"2002","journal-title":"Proceedings of the EFMI Workshop on Natural Language Processing in Biomedical Applications"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/11427995_6"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/S0306-4573(96)00052-0"},{"year":"2003","author":"kennedy","journal-title":"Developing a foundation for policy relevant terrorism research in criminology","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ijhcs.2006.08.006","article-title":"mapping the contemporary terrorism research domain","volume":"65","author":"reid","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1080\/09546550109609697"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1197\/jamia.M1054"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1353\/pbm.1986.0087"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565059.pdf?arnumber=4565059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T05:58:07Z","timestamp":1497765487000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4565059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565059","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}