{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:18:14Z","timestamp":1730287094119,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/octa49274.2020.9151843","type":"proceedings-article","created":{"date-parts":[[2020,7,29]],"date-time":"2020-07-29T21:37:04Z","timestamp":1596058624000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-agent architecture for modeling organizational planning against terrorist attacks in urban areas"],"prefix":"10.1109","author":[{"given":"Oussama","family":"Kebir","sequence":"first","affiliation":[]},{"given":"Issam","family":"Nouaouri","sequence":"additional","affiliation":[]},{"given":"Mouna","family":"Belhaj","sequence":"additional","affiliation":[]},{"given":"Lamjed Ben","family":"Said","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Akrout","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1525\/california\/9780520253476.003.0011"},{"key":"ref11","first-page":"89","article-title":"Darwinian selection in asymmetric warfare: the natural advantage of insurgents and terrorists","author":"johnson","year":"2009","journal-title":"Journal of the Washington Academy of Sciences"},{"journal-title":"Limited war and American defense policy","year":"1964","author":"deitchman","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1090.0700"},{"key":"ref14","first-page":"1","volume":"10","author":"wooldridge","year":"1995","journal-title":"Intel-ligent Agents Theory and Practice"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1102256.1102303"},{"journal-title":"Moving forward with computational red teaming","year":"0","author":"gowlett","key":"ref16"},{"key":"ref17","first-page":"731","author":"cil","year":"2009","journal-title":"Mabsim A multi agent based simulation model of military unit combat turkish general staff department of force development and resource management"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.06.024"},{"journal-title":"Radical religious and violent The new economics of terrorism","year":"2011","author":"berman","key":"ref19"},{"journal-title":"Aircraft in Warfare the Dawn of the Fourth Arm","year":"1916","author":"lanchester","key":"ref4"},{"key":"ref3","first-page":"1816","author":"small","year":"1982","journal-title":"Resort to arms International and civil wars"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1221339"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2538918"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.092080199"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.1217724"},{"journal-title":"Counterinsurgency Warfare Theory and Practice","year":"1964","author":"galula","key":"ref2"},{"key":"ref1","first-page":"101","volume":"fm","author":"army","year":"2005","journal-title":"D of the Army Army Planning and Orders Production"},{"key":"ref9","first-page":"198","author":"doran","year":"2005","journal-title":"Iruba An Agent-Based Model of the Guerrilla War Process"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0080380"},{"key":"ref22","article-title":"Doctrine for Asymmetric Warfare","author":"ancker","year":"2003","journal-title":"Military Review"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18564\/jasss.3540"}],"event":{"name":"2020 International Multi-Conference on: \u201cOrganization of Knowledge and Advanced Technologies\u201d (OCTA)","start":{"date-parts":[[2020,2,6]]},"location":"Tunis, Tunisia","end":{"date-parts":[[2020,2,8]]}},"container-title":["2020 International Multi-Conference on: \u201cOrganization of Knowledge and Advanced Technologies\u201d (OCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9142125\/9151454\/09151843.pdf?arnumber=9151843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:10Z","timestamp":1656453070000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9151843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/octa49274.2020.9151843","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}