{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:55:34Z","timestamp":1729637734773,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578804","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"143-145","source":"Crossref","is-referenced-by-count":11,"title":["Analyzing users' web surfing patterns to trace terrorists and criminals"],"prefix":"10.1109","author":[{"given":"Gabi","family":"Kedma","sequence":"first","affiliation":[]},{"given":"Mordehai","family":"Guri","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Sela","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Using the Internet to Catch Traditional (Non-cyber) Criminals","year":"2012","author":"sabin-wilson","key":"3"},{"journal-title":"Search Engine Analysis Vital in Criminal Investigations?","year":"2011","author":"parker","key":"2"},{"year":"0","key":"10"},{"key":"1","volume":"1","author":"vacca","year":"2005","journal-title":"Computer Forensics Computer Crime Scene Investigation"},{"journal-title":"Govt Wants ISPs to Record Browsing History","year":"2010","author":"grubb","key":"7"},{"journal-title":"Police Internet Providers Must Keep User Logs","year":"2011","author":"mccullagh","key":"6"},{"key":"5","first-page":"54","volume":"105","year":"2006","journal-title":"Official Journal of the European Union"},{"key":"4","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/978-3-642-29047-3_28","article-title":"Automatic crime prediction using events extracted from twitter posts","volume":"7227","author":"wang","year":"2012","journal-title":"Social Computing Behavioral-Cultural Modeling and Prediction Lecture Notes in Computer Science"},{"journal-title":"One Hundred Third Congress of the United States of America","year":"1994","key":"9"},{"journal-title":"CRIMES CHAPTER 121-STORED WIRE and ELECTRONIC COMMUNICATIONS and TRANSACTIONAL RECORDS ACCESS","year":"2013","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578804.pdf?arnumber=6578804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:13Z","timestamp":1498063993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578804","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}