{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:17:41Z","timestamp":1725733061888},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/isi.2018.8587365","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T23:00:33Z","timestamp":1545951633000},"page":"13-18","source":"Crossref","is-referenced-by-count":1,"title":["Spatial Patterns of Offender Groups"],"prefix":"10.1109","author":[{"given":"Mohammad A.","family":"Tayebi","sequence":"first","affiliation":[]},{"given":"Hamed Yaghoubi","family":"Shahir","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Glasser","sequence":"additional","affiliation":[]},{"given":"Patricia L.","family":"Brantingham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Geographic profiling CRC press","year":"2000","author":"rossmo","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195369083.001.0001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0910921107"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218202510004696"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6629(198601)14:1<6::AID-JCOP2290140103>3.0.CO;2-I"},{"journal-title":"Inside Criminal Networks Springer","year":"2009","author":"carlo","key":"ref15"},{"key":"ref16","article-title":"East Side-West Side: Organizing Crime in New York City, 1930-1950","author":"block","year":"1994","journal-title":"Transaction Publishers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/police\/pan015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"ref19","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proceedings of the 2th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD&#x2019;96)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2010.11.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150467"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0016939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2424321.2424412"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1989.tb00862.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-4944(05)80212-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-0388-3_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/0002716201578001007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367591"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2018,11,9]]},"location":"Miami, FL","end":{"date-parts":[[2018,11,11]]}},"container-title":["2018 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8575039\/8587309\/08587365.pdf?arnumber=8587365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:22:54Z","timestamp":1643250174000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8587365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isi.2018.8587365","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}