{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:19:01Z","timestamp":1729664341428,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284278","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"156-158","source":"Crossref","is-referenced-by-count":1,"title":["Detecting criminal networks: SNA models are compared to proprietary models"],"prefix":"10.1109","author":[{"given":"Fatih","family":"Ozgul","sequence":"first","affiliation":[]},{"given":"Murat","family":"Gok","sequence":"additional","affiliation":[]},{"given":"Zeki","family":"Erdem","sequence":"additional","affiliation":[]},{"given":"Yakup","family":"Ozal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"2","first-page":"1449","article-title":"Group and Topic Discovery from Relations and Their Attributes","volume":"18","author":"wang","year":"2006","journal-title":"Advances in neural information processing systems"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470073049.ch17"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44853-5_18","article-title":"Untangling criminal networks: A case study","author":"xu","year":"2003","journal-title":"First NSF\/NIJ Symposium on Intelligence and Security Informatics (ISI'03) Washington D C"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1059981.1059984"},{"journal-title":"Data Mining Concepts Models Methods and Algorithms","year":"2003","author":"kantardzic","key":"5"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/2577097"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13601-6_1"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","start":{"date-parts":[[2012,6,11]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284278.pdf?arnumber=6284278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T07:31:26Z","timestamp":1562139086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284278","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}