{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:44:10Z","timestamp":1730274250243,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1109\/isi53945.2021.9624736","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T18:55:42Z","timestamp":1638298542000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Differences in Geographic Profiles When Using Street Routing Versus Manhattan Distances in Buffer Zone Radii Calculations"],"prefix":"10.1109","author":[{"given":"Stefano Z.","family":"Stamato","sequence":"first","affiliation":[]},{"given":"Andrew J.","family":"Park","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Eng","sequence":"additional","affiliation":[]},{"given":"Valerie","family":"Spicer","sequence":"additional","affiliation":[]},{"given":"Herbert H.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"D. Kim","family":"Rossmo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.2190\/DTHJ-ERNN-HVCV-6K5T"},{"key":"ref11","first-page":"100","article-title":"Crime pattern theory","author":"brantingham","year":"2013","journal-title":"Environmental Criminology and Crime Analysis"},{"key":"ref12","first-page":"36","article-title":"An evaluation of rational choice theory in criminology","volume":"4","author":"gul","year":"2009","journal-title":"Girne Am Univ J Soc Appl Sci"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1823854.1823920"},{"year":"2004","author":"rich","journal-title":"A methodology for evaluating geographic profiling software final report","key":"ref14"},{"key":"ref15","article-title":"Expert system method of performing crime site analysis","author":"rossmo","year":"1998","journal-title":"US Patent"},{"year":"0","journal-title":"Rigel analyst","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1348\/135532507X238673"},{"year":"0","journal-title":"The directions api overview","key":"ref18"},{"year":"0","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s10940-014-9232-7"},{"year":"1984","author":"brantingham","journal-title":"Patterns in Crime","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.compenvurbsys.2004.10.002"},{"year":"2003","author":"kent","article-title":"Using functional distance measures when calibrating journey-to-crime distance decay algorithms","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1111\/j.1469-7998.2009.00586.x"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.tree.2012.03.004"},{"key":"ref2","first-page":"161","article-title":"Modeling criminal distance decay","author":"o\u2019leary","year":"2011","journal-title":"Cityscape"},{"key":"ref1","article-title":"Geographic profiling: Target patterns of serial murderers","author":"rossmo","year":"1995","journal-title":"Ph D Dissertation"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1186\/1476-072X-10-35"},{"year":"0","key":"ref20"}],"event":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2021,11,2]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2021,11,3]]}},"container-title":["2021 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624673\/9624675\/09624736.pdf?arnumber=9624736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:53:49Z","timestamp":1652187229000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isi53945.2021.9624736","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]}}}