{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:25:59Z","timestamp":1730280359099,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/kse.2018.8573353","type":"proceedings-article","created":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T01:06:45Z","timestamp":1544749605000},"page":"364-369","source":"Crossref","is-referenced-by-count":0,"title":["Modeling The Causes Of Terrorism From Media News: An Innovative Framework Connecting Impactful Events With Terror Incidents"],"prefix":"10.1109","author":[{"given":"Truong Son","family":"Pham","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tuan-Hao","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.02.029"},{"key":"ref3","first-page":"1629","article-title":"Towards the investigation of using social network analysis for counter terrorism in West Africa: case study of Boko Haram in Nigeria","volume":"11","author":"olajide","year":"2016","journal-title":"J Eng Sci Technol"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2676585.2676618"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.5120\/7236-0266","article-title":"Web content mining techniques: a survey","volume":"47","author":"johnson","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1147\/rd.14.0309","article-title":"A statistical approach to mechanized encoding and searching of literary information","volume":"1 4","author":"luhn","year":"1957","journal-title":"IBM Journal of Research and Development"},{"key":"ref5","first-page":"330","article-title":"Web Data Mining Techniques and Implementation for Handling Big Data","volume":"4 4","author":"mohata","year":"2015","journal-title":"Computer Science and Mobile Computing"},{"key":"ref8","first-page":"186","article-title":"The use of web-scraping software in searching for grey literature","volume":"11 3","author":"haddaway","year":"2015","journal-title":"The Journal of Grey"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2011.97"},{"key":"ref2","article-title":"What makes a terrorist","author":"krueger","year":"2007","journal-title":"Economics and the Roots of Terrorism 6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1037\/met0000081"},{"key":"ref1","first-page":"99","article-title":"The causes of terrorism","author":"crenshaw","year":"2012","journal-title":"Terrorism studies A reader"}],"event":{"name":"2018 10th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2018,11,1]]},"location":"Ho Chi Minh City","end":{"date-parts":[[2018,11,3]]}},"container-title":["2018 10th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8553666\/8573236\/08573353.pdf?arnumber=8573353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T12:42:13Z","timestamp":1643287333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8573353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/kse.2018.8573353","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}