{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T06:29:48Z","timestamp":1764656988213,"version":"3.46.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,29]]},"DOI":"10.1109\/ispa66905.2025.11259455","type":"proceedings-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:23:30Z","timestamp":1764613410000},"page":"175-180","source":"Crossref","is-referenced-by-count":0,"title":["ShielDir: AI-Powered Real-Time Threat Detection System to Reduce Crime Response Time"],"prefix":"10.1109","author":[{"given":"Berkay","family":"Arda","sequence":"first","affiliation":[{"name":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"}]},{"given":"Ahmet Alp","family":"Samur","sequence":"additional","affiliation":[{"name":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"}]},{"given":"Furkan","family":"Marifoglu","sequence":"additional","affiliation":[{"name":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"}]},{"given":"Fikri Barca","family":"Bulut","sequence":"additional","affiliation":[{"name":"Polytechnic University of Turin,Control and Computer Engineering Department,Turin,Italy"}]},{"given":"Serhat","family":"Uzunbayir","sequence":"additional","affiliation":[{"name":"Izmir University of Economics,Software Engineering Department,Izmir,T&#x00FC;rkiye"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12173567"},{"year":"2015","key":"ref2","article-title":"Sustainable development goals"},{"key":"ref3","article-title":"Yolov11: An overview of the key architectural enhancements","volume-title":"arXiv preprint","author":"Khanam","year":"2024"},{"year":"2025","key":"ref4","article-title":"Automate crime detection without compromising your privacy"},{"year":"2024","key":"ref5","article-title":"G\u00f6r\u00fcnt\u00fc \u0130\u015flemeye dayal\u0131 g\u00fcvenlik sistemleri"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17798\/bitlisfen.333984"},{"year":"2024","key":"ref7","article-title":"Vsam project overview"},{"issue":"41","key":"ref8","first-page":"16","article-title":"G\u00fcvenlik kameralar\u0131nda otomatik silah ve b\u0131\u00e7ak tespit sistemi: Kar\u015f\u0131la\u015ft\u0131rmal\u0131 yolo modelleri","author":"A\u011fda\u015f","year":"2022","journal-title":"Avrupa Bilim ve Teknoloji Dergisi"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3074319"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.920"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13132579"},{"issue":"2","key":"ref12","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"239","author":"Merkel","year":"2014","journal-title":"Linux J"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.63345\/ijrmeet.org.v13.i3.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3665926"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-62362-2_36"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7962-2_39"},{"year":"2025","key":"ref17","article-title":"CVCS Crime Project Dataset"},{"year":"2023","key":"ref18","article-title":"Knife detection dataset"},{"article-title":"Handgun Detection Dataset","year":"2023","author":"Maulana","key":"ref19"},{"year":"2025","key":"ref20","article-title":"Shieldir: Weapon Detection Model Computer Vision Projec"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw59228.2023.00587"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8844-3_4"}],"event":{"name":"2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)","start":{"date-parts":[[2025,10,29]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2025,10,31]]}},"container-title":["2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11259440\/11259097\/11259455.pdf?arnumber=11259455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T06:26:06Z","timestamp":1764656766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11259455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ispa66905.2025.11259455","relation":{},"subject":[],"published":{"date-parts":[[2025,10,29]]}}}