{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T21:38:14Z","timestamp":1774301894046,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1186\/2190-8532-1-23","type":"journal-article","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T06:17:04Z","timestamp":1365142624000},"source":"Crossref","is-referenced-by-count":9,"title":["An agent-based model and computational framework for counter-terrorism and public safety based on swarm intelligencea"],"prefix":"10.1186","volume":"1","author":[{"given":"Andrew J","family":"Park","sequence":"first","affiliation":[]},{"given":"Herbert H","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"Mengting","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Uwe","family":"Gl\u00e4sser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,23]]},"reference":[{"key":"29_CR1","volume-title":"CRTI\u2014Call for Proposals: Guidebook for Fiscal Year 2008-2009","author":"Defence R&D Canada\u2014Centre for Security Science","year":"2008","unstructured":"Defence R&D Canada\u2014Centre for Security Science: CRTI\u2014Call for Proposals: Guidebook for Fiscal Year 2008\u20132009. 2008."},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"252","DOI":"10.4018\/978-1-59904-591-7.ch013","volume-title":"Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems","author":"PL Brantingham","year":"2008","unstructured":"Brantingham PL, Kinney B, Gl\u00e4sser U, Jackson P, Vajihollahi M: Mastermind: Computational Modeling and Simulation of Spatiotemporal Aspects of Crime in Urban Environments. In Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. Edited by: Liu L, Eck J. Hershey, PA: Information Science Reference; 2008:252\u2013280."},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-211-09442-6_2","volume-title":"To appear in Mathematical Methods in Counterterrorism","author":"PL Brantingham","year":"2009","unstructured":"Brantingham PL, Gl\u00e4sser U, Jackson P, Vajihollahi M: Modeling Criminal Activity in Urban Landscapes. In To appear in Mathematical Methods in Counterterrorism. Vienna: Springer; 2009:9\u201331."},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-89900-6_7","volume-title":"Intelligence and Security Informatics: Proceedings of the EuroISI 2008","author":"U Gl\u00e4sser","year":"2008","unstructured":"Gl\u00e4sser U, Vajihollahi M: Computational Modeling of Criminal Activity. In Intelligence and Security Informatics: Proceedings of the EuroISI 2008. Berlin\/Heidelberg: Springer; 2008:39\u201350."},{"key":"29_CR5","volume-title":"Dictionary of Greek and Roman Biography and Mythology","author":"W Smith","year":"1870","unstructured":"Smith W: Dictionary of Greek and Roman Biography and Mythology. Boston: Little, Brown and Company; 1870. [\n                    http:\/\/www.ancientlibrary.com\/smith-bio\/1349.html\n                    \n                  ] []"},{"key":"29_CR6","volume-title":"Agent-Based Models (Quantitative Applications in the Social Sciences)","author":"N Gilbert","year":"2007","unstructured":"Gilbert N: Agent-Based Models (Quantitative Applications in the Social Sciences). Thousand Oaks, annotated edition: Sage Publications Inc; 2007."},{"issue":"6","key":"29_CR7","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.trc.2008.03.002","volume":"16","author":"D Teodorovic","year":"2008","unstructured":"Teodorovic D: Swarm intelligence systems for transportation engineering: Principles and applications. Transportation Res Part C: Emerging Technol 2008,16(6):651\u2013667. 10.1016\/j.trc.2008.03.002","journal-title":"Transportation Res Part C: Emerging Technol"},{"key":"29_CR8","first-page":"1942","volume-title":"Neural Networks, 1995. Proceedings., IEEE International Conference on, 4","author":"J Kennedy","year":"2002","unstructured":"Kennedy J, Eberhart R: Particle swarm optimization. Neural Networks, 1995. Proceedings., IEEE International Conference on, 4 2002, 1942\u20131948."},{"key":"29_CR9","volume-title":"Proceedings of the NATO Advanced Workshop on Robots and Biological Systems","author":"G Beni","year":"1989","unstructured":"Beni G, Wang J: Swarm Intelligence in Cellular Robotic Systems. In Proceedings of the NATO Advanced Workshop on Robots and Biological Systems. Tuscany, Italy; 1989."},{"issue":"7","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1016\/j.physa.2008.12.008","volume":"388","author":"J Izquierdo","year":"2009","unstructured":"Izquierdo J, Montalvo I, Plrez R, Fuertes V: Forecasting pedestrian evacuation times by using swarm intelligence. Physica A: Stat Mech and its Appl 2009,388(7):1213\u20131220. 10.1016\/j.physa.2008.12.008","journal-title":"Physica A: Stat Mech and its Appl"},{"key":"29_CR11","first-page":"1927","volume-title":"Proceedings of the Congress on Evolutionary Computation","author":"RC Eberhart","year":"1999","unstructured":"Eberhart RC, Hu X: Human Tremor Analysis Using Particle Swarm Optimization. In Proceedings of the Congress on Evolutionary Computation. Washington D.C.; 1999:1927\u20131930."},{"key":"29_CR12","first-page":"739","volume-title":"Proceedings of AVBPA","author":"T Wakita","year":"2005","unstructured":"Wakita T, Ozawa K, Miyajima C, Takeda K: Parametric Versus Non-parametric Models of Driving Behavior Signals for Driver Identification. In Proceedings of AVBPA. Hilton Rye Town; 2005:739\u2013747."},{"key":"29_CR13","unstructured":"Park A: Modeling the Role of Fear of Crime in Pedestrian Navigation. PhD thesis. (Simon Fraser University, Burnaby, BC, Canada 2008) (Simon Fraser University, Burnaby, BC, Canada 2008)"},{"issue":"6","key":"29_CR14","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCG.2006.133","volume":"26","author":"N Pelechano","year":"2006","unstructured":"Pelechano N, Badler NI: Modeling Crowd and Trained Leader Behavior during Building Evacuation. IEEE Comput. Graph. Appl 2006,26(6):80\u201386.","journal-title":"IEEE Comput. Graph. Appl"},{"issue":"3","key":"29_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1017\/S1049023X0000460X","volume":"22","author":"RRM Gershon","year":"2007","unstructured":"Gershon RRM, Qureshi KA, Rubin MS, Raveis VH: Factors associated with high-rise evacuation: qualitative results from the World Trade Center Evacuation Study. Prehospital and disaster med : the official j Nat Assoc. EMS Physicians and the World Assoc. Emergency and Disaster Med. assoc. Acute Care Found 2007,22(3):165\u201373.","journal-title":"Prehospital and disaster med : the official j Nat Assoc. EMS Physicians and the World Assoc. Emergency and Disaster Med. assoc. Acute Care Found"},{"issue":"5-6","key":"29_CR16","first-page":"481","volume":"35","author":"RRM Gershon","year":"2011","unstructured":"Gershon RRM, Magda LA, Riley HEM, Sherman MF: The World Trade Center evacuation study: Factors associated with initiation and length of time for evacuation. Fire and Mater 2011,35(5\u20136):481\u2013500.","journal-title":"Fire and Mater"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-1-23.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/2190-8532-1-23\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-1-23.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T23:52:57Z","timestamp":1548114777000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/2190-8532-1-23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["29"],"URL":"https:\/\/doi.org\/10.1186\/2190-8532-1-23","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12]]},"article-number":"23"}}