{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:17:43Z","timestamp":1725524263163},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578829","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"251-253","source":"Crossref","is-referenced-by-count":0,"title":["A model docking system for understanding radicalization"],"prefix":"10.1109","author":[{"given":"Lora","family":"Weiss","sequence":"first","affiliation":[]},{"given":"Erica","family":"Briscoe","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Sim","family":"Harbert","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Kline","sequence":"additional","affiliation":[]},{"given":"John","family":"Horgan","sequence":"additional","affiliation":[]},{"given":"Lily","family":"Cushenbery","sequence":"additional","affiliation":[]},{"given":"Casey","family":"Hilland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Behavioral Modeling and Simulation from Individuals to Societies","year":"2008","author":"zacharias","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/14751798.2011.578717"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12079-4_47"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA448287","author":"bartolomei","year":"2004","journal-title":"Modeling Violent Non-state Actors A Summary of Concepts and Methods"},{"key":"6","first-page":"42","author":"sterman","year":"2002","journal-title":"Business Dynamics Systems Thinking and Modeling for a Complex World"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.082080899"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419707"},{"journal-title":"Blackboard Systems","year":"1988","author":"engelmore","key":"9"},{"journal-title":"Homegrown Terrorists in the U S","year":"2009","author":"gartenstein-ross","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578829.pdf?arnumber=6578829","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:21:48Z","timestamp":1563801708000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578829","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}