{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:37:05Z","timestamp":1772908625263,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,13]],"date-time":"2009-04-13T00:00:00Z","timestamp":1239580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,13]]},"DOI":"10.1145\/1558607.1558630","type":"proceedings-article","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T13:10:54Z","timestamp":1246367454000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Automatic image analysis process for the detection of concealed weapons"],"prefix":"10.1145","author":[{"given":"Richard","family":"Gesick","sequence":"first","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Caner","family":"Saritac","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]},{"given":"Chih-Cheng","family":"Hung","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2009,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abidi B. Y. Zheng A. Gribok and M. Abidi . \"Improving Weapon Detection in Single Energy X-Ray Images Through Pseudocoloring \" http:\/\/imaging.utk.edu\/publications\/papers\/2006\/237_01715507.pdf  Abidi B. Y. Zheng A. Gribok and M. Abidi . \"Improving Weapon Detection in Single Energy X-Ray Images Through Pseudocoloring \" http:\/\/imaging.utk.edu\/publications\/papers\/2006\/237_01715507.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.521"},{"key":"e_1_3_2_1_3_1","unstructured":"AIRPORT PASSENGER SCREENING GAO-03-1173 http:\/\/www.gao.gov\/new.items\/d031173.pdf  AIRPORT PASSENGER SCREENING GAO-03-1173 http:\/\/www.gao.gov\/new.items\/d031173.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"Congress, Office of Technology Assessment","author":"Aviation Security","year":"1992"},{"key":"e_1_3_2_1_5_1","unstructured":"American Science and Engineering image library ASE_Gemini_12B.jpg http:\/\/www.as-e.com\/american_science_and_engineering\/image_library.asp  American Science and Engineering image library ASE_Gemini_12B.jpg http:\/\/www.as-e.com\/american_science_and_engineering\/image_library.asp"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.386"},{"key":"e_1_3_2_1_7_1","unstructured":"Ferrella R. K. Tobina and B. Abidi \"Operator-assisted Threat Assessment: Adaptation of a Focus-of-attention Technique to the Identification of Potential Threat Regions in Carry-on Baggage Imagery \" http:\/\/www.ornl.gov\/sci\/ismv\/pdfs\/publications\/Operatorassisted threatassessment nov01.pdf  Ferrella R. K. Tobina and B. Abidi \"Operator-assisted Threat Assessment: Adaptation of a Focus-of-attention Technique to the Identification of Potential Threat Regions in Carry-on Baggage Imagery \" http:\/\/www.ornl.gov\/sci\/ismv\/pdfs\/publications\/Operatorassisted threatassessment nov01.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"ImageJ National Institute of Health http:\/\/rsb.info.nih.gov\/ij\/index.html  ImageJ National Institute of Health http:\/\/rsb.info.nih.gov\/ij\/index.html"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. Of the International Conference on Computer Vision","author":"Lowe D.","year":"1999"},{"key":"e_1_3_2_1_10_1","volume-title":"Conventional X-ray Systems, email of","author":"Smiths Detection","year":"2008"},{"key":"e_1_3_2_1_11_1","volume-title":"CRC Press","author":"Umbaugh S. E.","year":"2005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099580"}],"event":{"name":"CSIIRW '09: Fifth Cyber Security and Information Intelligence Research Workshop","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '09"},"container-title":["Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1558607.1558630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:57Z","timestamp":1750253397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1558607.1558630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,13]]},"references-count":12,"alternative-id":["10.1145\/1558607.1558630","10.1145\/1558607"],"URL":"https:\/\/doi.org\/10.1145\/1558607.1558630","relation":{},"subject":[],"published":{"date-parts":[[2009,4,13]]},"assertion":[{"value":"2009-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}