{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:38Z","timestamp":1750309478801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T00:00:00Z","timestamp":1723593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,14]]},"DOI":"10.1145\/3700706.3700710","type":"proceedings-article","created":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:14:42Z","timestamp":1738386882000},"page":"20-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data-Driven Study of UK Terrorism: A K-prototypes Clustering Analysis of the UK's Terrorist Incidents"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5552-8488","authenticated-orcid":false,"given":"Yuri","family":"Lazzeretti","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Northumbria University, Newcastle Upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5367-5568","authenticated-orcid":false,"given":"Pingfan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Northumbria University, Newcastle Upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8833-4360","authenticated-orcid":false,"given":"Jialou","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Northumbria University, Newcastle Upon Tyne, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-7605","authenticated-orcid":false,"given":"Wai Lok","family":"Woo","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Northumbria University, Newcastle Upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"e_1_3_3_2_1_2","volume-title":"Chandan","author":"Aggarwal Charu C.","year":"2014","unstructured":"Charu C. Aggarwal and Reddy K. Chandan. 2014. Data Clustering: Algorithms and Applications (1st ed.). CRC Press., Boca Raton."},{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2020.1769461"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2018.8748567"},{"key":"e_1_3_3_2_4_2","volume-title":"An Overview of Geographical Perspectives and Approaches in Terrorism Research. Perspect. Terror. 7, (February","author":"Bahgat Karim","year":"2013","unstructured":"Karim Bahgat and Richard Medina. 2013. An Overview of Geographical Perspectives and Approaches in Terrorism Research. Perspect. Terror. 7, (February 2013), 38\u201372."},{"key":"e_1_3_3_2_5_2","volume-title":"Retrieved","author":"Salem Semeh Ben","year":"2020","unstructured":"Semeh Ben Salem, Sami Naouali, and Zied Chtourou. 2020. Clustering Terrorist Groups Using Their Activity and Lethality Measures. (November 2020). Retrieved November 23, 2023 from https:\/\/www.researchgate.net\/publication\/350314476_Clustering_Terrorist_Groups_Using_Their_Activity_and_Lethality_Measures"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1080\/14751790701752402"},{"key":"e_1_3_3_2_7_2","volume-title":"Retrieved","author":"Herre Bastian","year":"2023","unstructured":"Bastian Herre. 2023. The Global Terrorism Database: how do researchers measure terrorism? Our World Data (October 2023). Retrieved November 16, 2023 from https:\/\/ourworldindata.org\/the-global-terrorism-database-how-do-researchers-measure-terrorism"},{"key":"e_1_3_3_2_8_2","volume-title":"Retrieved","author":"Office Home","year":"2023","unstructured":"Home Office. 2023. CONTEST: The United Kingdom's Strategy for Countering Terrorism. Retrieved March 12, 2024 from https:\/\/www.gov.uk\/government\/publications\/counter-terrorism-strategy-contest-2023"},{"key":"e_1_3_3_2_9_2","volume-title":"Clustering Large Data Sets with Mixed Numeric And Categorical Values","author":"Huang Zhexue","year":"1997","unstructured":"Zhexue Huang. 1997. Clustering Large Data Sets with Mixed Numeric And Categorical Values. 1997. 21\u201334."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009769707641"},{"key":"e_1_3_3_2_11_2","volume-title":"Terrorist Methods. Retrieved","author":"The Security","year":"2024","unstructured":"MI5 (The Security Service). no date. Terrorist Methods. Retrieved March 12, 2024 from https:\/\/www.mi5.gov.uk\/terrorist-methods"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355370"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03095-1_15"},{"key":"e_1_3_3_2_14_2","volume-title":"Proceedings of the 11th Nordic workshop of secure IT systems.","author":"Petrovic Slobodan","year":"2006","unstructured":"Slobodan Petrovic. 2006. A Comparison Between the Silhouette Index and the Davies-Bouldin Index in Labelling IDS Clusters. In Proceedings of the 11th Nordic workshop of secure IT systems., 2006. Citeseer, 53\u201364."},{"key":"e_1_3_3_2_15_2","volume-title":"Retrieved","author":"Pratt Alison","year":"2023","unstructured":"Alison Pratt, Grahame Allen, and Matthew Burton. 2023. Terrorism in Great Britain: the statistics. (December 2023). Retrieved December 17, 2023 from https:\/\/commonslibrary.parliament.uk\/research-briefings\/cbp-7613\/"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00096"},{"key":"e_1_3_3_2_17_2","volume-title":"Retrieved","author":"(National","year":"2024","unstructured":"(National Consortium for the Study of Terrorism and Responses to Terrorism) START. 2022. Global Terrorism Database 1970 - 2020. Retrieved March 12, 2024 from https:\/\/www.start.umd.edu\/gtd\/"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126092"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1017\/S1049023X21000868"},{"key":"e_1_3_3_2_20_2","volume-title":"Retrieved","author":"U.S. Department of State.","year":"2020","unstructured":"U.S. Department of State. 2020. Country Reports on Terrorism 2020: United Kingdom. Retrieved March 12, 2024 from https:\/\/www.state.gov\/reports\/country-reports-on-terrorism-2020\/united-kingdom\/"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/569\/5\/052024"},{"volume-title":"scikit-learn. Retrieved","year":"2024","key":"e_1_3_3_2_22_2","unstructured":"davies_bouldin_score. scikit-learn. Retrieved June 30, 2024 from https:\/\/scikit-learn\/stable\/modules\/generated\/sklearn.metrics.davies_bouldin_score.html"},{"volume-title":"scikit-learn. Retrieved","year":"2024","key":"e_1_3_3_2_23_2","unstructured":"calinski_harabasz_score. scikit-learn. Retrieved June 30, 2024 from https:\/\/scikit-learn\/stable\/modules\/generated\/sklearn.metrics.calinski_harabasz_score.html"}],"event":{"name":"ICISS 2024: 2024 the 7th International Conference on Information Science and Systems","acronym":"ICISS 2024","location":"Edinburgh Iasi United Kingdom"},"container-title":["Proceedings of the 2024 7th International Conference on Information Science and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700706.3700710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700706.3700710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:28Z","timestamp":1750295848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700706.3700710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,14]]},"references-count":23,"alternative-id":["10.1145\/3700706.3700710","10.1145\/3700706"],"URL":"https:\/\/doi.org\/10.1145\/3700706.3700710","relation":{},"subject":[],"published":{"date-parts":[[2024,8,14]]},"assertion":[{"value":"2025-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}