{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T05:07:04Z","timestamp":1747285624561},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,19]],"date-time":"2013-01-19T00:00:00Z","timestamp":1358553600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/2190-8532-2-3","type":"journal-article","created":{"date-parts":[[2013,1,19]],"date-time":"2013-01-19T13:14:02Z","timestamp":1358601242000},"source":"Crossref","is-referenced-by-count":5,"title":["Validating distance decay through agent based modeling"],"prefix":"10.1186","volume":"2","author":[{"given":"Arvind","family":"Verma","sequence":"first","affiliation":[]},{"given":"Ramyaa","family":"Ramyaa","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Marru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,19]]},"reference":[{"key":"24_CR1","volume-title":"Environmental Criminology","author":"PJ Brantingham","year":"1981","unstructured":"Brantingham PJ, Brantingham PL: Environmental Criminology. Sage, Beverley Hills, Ca.; 1981."},{"key":"24_CR2","volume-title":"Target Patterns Of Serial Murderers PhD Thesis","author":"K Rossmo","year":"1995","unstructured":"Rossmo K, Geographic Profiling: Target Patterns Of Serial Murderers PhD Thesis. Simon Fraser University, Burnaby; 1995."},{"issue":"2","key":"24_CR3","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1111\/j.1745-9125.1999.tb00492.x","volume":"37","author":"GF Rengert","year":"1999","unstructured":"Rengert GF, Piquero AR, Jones PR: Distance decay reexamined. Criminology 1999, 37(2):427\u2013445. 10.1111\/j.1745-9125.1999.tb00492.x","journal-title":"Criminology"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/000276427602000203","volume":"20","author":"DL Capone","year":"1976","unstructured":"Capone DL, Woodrow W Jr: Nichols, Urban Structure and Criminal Mobility. Am. Behav. Sci. 1976, 20: 119\u20132213.","journal-title":"Am. Behav. Sci"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"588","DOI":"10.2307\/2094589","volume":"44","author":"LE Cohen","year":"1979","unstructured":"Cohen LE, Felson M: Social Change and Crime Rate Trends: A Routine Activity Approach. Am. Sociol. Rev. 1979, 44: 588\u2013608. 10.2307\/2094589","journal-title":"Am. Sociol. Rev"},{"key":"24_CR6","doi-asserted-by":"crossref","DOI":"10.4135\/9781452204260","volume-title":"Crime and Nature","author":"M Felson","year":"2006","unstructured":"Felson M: Crime and Nature. Sage, Thousand Oaks, CA; 2006."},{"key":"24_CR7","volume-title":"Geographic Profiling","author":"K Rossmo","year":"2000","unstructured":"Rossmo K: Geographic Profiling. CRC Press, Boca Raton, FL; 2000."},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BF01064212","volume":"3","author":"JL LeBeau","year":"1987","unstructured":"LeBeau JL: The methods and measures of centrography and the spatial dynamics of rape. J. Quant. Criminol. 1987, 3: 125\u2013141. 10.1007\/BF01064212","journal-title":"J. Quant. Criminol"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/S0272-4944(05)80215-4","volume":"13","author":"D Canter","year":"1993","unstructured":"Canter D, Larkin P: The environmental range of serial rapists. J. Environ. Psychol. 1993, 13: 663\u2013669.","journal-title":"J. Environ. Psychol"},{"key":"24_CR10","volume-title":"Drug Offender Mobility","author":"JE Eck","year":"1992","unstructured":"Eck JE, Drugs Trips: Drug Offender Mobility. Paper presented at the 44th American Society of Criminology Annual Meetings, New Orleans; 1992."},{"key":"24_CR11","volume-title":"The \u2018road to nowhere\u2019: the evidence for travelling criminals, Home Office Research Study 207","author":"P Wiles","year":"2000","unstructured":"Wiles P, Costello A: The \u2018road to nowhere\u2019: the evidence for travelling criminals, Home Office Research Study 207. Home Office, London; 2000."},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1057\/palgrave.sj.8350030","volume":"20","author":"R Block","year":"2007","unstructured":"Block R, Galary A, Brice D: The Journey to Crime: Victims and Offenders Converge in Violence Index Offences in Chicago. Secur. J. 2007, 20: 123\u2013137. 10.1057\/palgrave.sj.8350030","journal-title":"Secur. J"},{"key":"24_CR13","volume-title":"Patterns in juvenile delinquency: A spatial perspective","author":"A Rand","year":"1984","unstructured":"Rand A: Patterns in juvenile delinquency: A spatial perspective. University Microfilms International Ann Arbor, MI; 1984."},{"issue":"3","key":"24_CR14","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1111\/j.1745-9125.1997.tb01227.x","volume":"35","author":"PJ Van Koppen","year":"1996","unstructured":"Van Koppen PJ, de Keijser JW: Desisting distance decay: On the aggregation of individual crime trips. Criminology 1996, 35(3):505\u2013515.","journal-title":"Criminology"},{"issue":"2","key":"24_CR15","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1093\/oxfordjournals.bjc.a014233","volume":"38","author":"PJ Van Koppen","year":"1998","unstructured":"Van Koppen PJ, Robert W, Jansen J: The road to the robbery: travel patterns in commercial robberies. Br. J. Criminol. 1998, 38(2):230\u2013246. 10.1093\/oxfordjournals.bjc.a014233","journal-title":"Br. J. Criminol"},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/S0379-0738(02)00385-7","volume":"131","author":"P Santtila","year":"2003","unstructured":"Santtila P, Zappala A, Laukkanen M: Testing the utility of a geographic profiling approach in three rape series of a single offender: A case study. Forensic Sci. Int. 2003, 131(1):42\u201352. 10.1016\/S0379-0738(02)00385-7","journal-title":"Forensic Sci. Int"},{"key":"24_CR17","volume-title":"Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems","year":"2008","unstructured":"Liu L, Eck J (Eds): Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems. IGI Global, Pennsylvania; 2008."},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1086\/524284","volume":"17","author":"D Weisburd","year":"2008","unstructured":"Weisburd D, Piquero A: How Well Do Criminologists Explain Crime? Statistical Modeling in Published Studies. Crime and Justice 2008, 17: 453\u2013502.","journal-title":"Crime and Justice"},{"key":"24_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511488801","volume-title":"Dissecting the Social: On the Principles of Analytical Sociology","author":"P Hedstr\u00f6m","year":"2005","unstructured":"Hedstr\u00f6m P: Dissecting the Social: On the Principles of Analytical Sociology. Oxford University Press, UK; 2005."},{"key":"24_CR20","volume-title":"Complex Adaptive Systems: An Introduction to Computational Models of Social Life","author":"JH Miller","year":"2007","unstructured":"Miller JH, Page SE: Complex Adaptive Systems: An Introduction to Computational Models of Social Life. Princeton University Press, Princeton Studies in Complexity; 2007."},{"key":"24_CR21","volume-title":"Rationalizing Police Patrol Beats using Voronoi Tesellations","author":"A Verma","year":"2010","unstructured":"Verma A, Ramyaa R, Marru S, Fan Y, Singh R: Rationalizing Police Patrol Beats using Voronoi Tesellations. Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Vancouver BC, Canada; 2010."},{"issue":"1","key":"24_CR22","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1057\/palgrave.sj.8340159","volume":"17","author":"PL Brantingham","year":"2004","unstructured":"Brantingham PL, Brantingham PJ: Computer simulation as a tool for environmental criminologists. Security Journal 2004, 17(1):21\u201330. 10.1057\/palgrave.sj.8340159","journal-title":"Security Journal"},{"key":"24_CR23","volume-title":"Agent Based Modeling of Burglary PhD Thesis","author":"N Malleson","year":"2010","unstructured":"Malleson N: Agent Based Modeling of Burglary PhD Thesis. School of Geography, The University of Leeds, UK; 2010."},{"key":"24_CR24","volume-title":"GENIUS: A Computational Modeling Framework for Counter-Terrorism Planning and Response","author":"HH Tsang","year":"2010","unstructured":"Tsang HH, Park AJ, Sun M, Glasser U: GENIUS: A Computational Modeling Framework for Counter-Terrorism Planning and Response. Proc. IEEE Intelligence and Security Informatics Vancouver BC, Canada; 2010."},{"key":"24_CR25","first-page":"372","volume-title":"Artificial Crime Analysis","author":"A Alimadad","year":"2009","unstructured":"Alimadad A, Borwein P, Brantingham PL, Brantingham PJ, Dabbaghian-Abdoly V, Ferguson R, Fowler E, Ghaseminejad AH, Giles C, Li J, Pollard N, Rutherford A, Waal A: Utilizing Simulation Modeling for Criminal Justice System Analysis. In Artificial Crime Analysis. Edited by: Liu L, Eck J. Idea Group Publishing, Hershey, PA; 2009:372\u2013411."},{"issue":"3","key":"24_CR26","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11292-008-9057-1","volume":"4","author":"A Dray","year":"2008","unstructured":"Dray A, Mazerolle L, Perez P, Ritter A: Policing Australia\u2019s heroin drought: using an agent-based model to simulate alternative outcomes. J. Exp. Criminol. 2008, 4(3):267\u2013287. 10.1007\/s11292-008-9057-1","journal-title":"J. Exp. Criminol"},{"key":"24_CR27","doi-asserted-by":"publisher","first-page":"197","DOI":"10.4018\/978-1-59140-453-8.ch012","volume-title":"Geographic Information Systems and Crime Analysis","author":"L Liu","year":"2005","unstructured":"Liu L, Wang X, Eck J, Liang J: Simulating crime events and crime patterns in a RA\/CA models. In Geographic Information Systems and Crime Analysis. Edited by: Wang F. Idea Publishing, Reading, PA; 2005:197\u2013213."},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10940-006-9021-z","volume":"23","author":"ER Groff","year":"2007","unstructured":"Groff ER: Simulation for Theory Testing and Experimentation: An Example Using Routine Activity Theory and Street Robbery. J. Quanti. Criminol. 2007, 23: 75\u2013103. 10.1007\/s10940-006-9021-z","journal-title":"J. Quanti. Criminol"},{"key":"24_CR29","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-662-03366-1_2","volume-title":"Simulating Social Phenomena","author":"R Axelrod","year":"1997","unstructured":"Axelrod R: Advancing the art of simulation in the social sciences. In Simulating Social Phenomena. Edited by: Conte R, Hegselmann R, Terna P. Springer, Berlin; 1997:21\u201340."},{"key":"24_CR30","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11292-008-9055-3","volume":"4","author":"SD Johnson","year":"2008","unstructured":"Johnson SD: Repeat Burglary Victimization: A tale of two theories. J. Exp. Criminol. 2008, 4: 215\u2013240. 10.1007\/s11292-008-9055-3","journal-title":"J. Exp. Criminol"},{"key":"24_CR31","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11292-008-9059-z","volume":"4","author":"J Eck","year":"2008","unstructured":"Eck J, Liu L: Contrasting simulated and empirical experiments in crime prevention. J. Exp. Criminol. 2008, 4: 195\u2013213. 10.1007\/s11292-008-9059-z","journal-title":"J. Exp. Criminol"},{"key":"24_CR32","doi-asserted-by":"publisher","first-page":"7280","DOI":"10.1073\/pnas.082080899","volume":"99","author":"E Bonabeau","year":"2002","unstructured":"Bonabeau E: Agent-based modeling: Methods and techniques for simulating human systems. Proc. Natl. Acad. Sci. 2002, 99: 7280\u20137287. 10.1073\/pnas.082080899","journal-title":"Proc. Natl. Acad. Sci"},{"issue":"4","key":"24_CR33","first-page":"13","volume":"8","author":"S Moss","year":"2005","unstructured":"Moss S, Edmonds B: Towards good social science. J. Artif. Soc. Soc. Simul. 2005, 8(4):13. http:\/\/jasss.soc.surrey.ac.uk\/8\/4\/13.html","journal-title":"J. Artif. Soc. Soc. Simul"},{"key":"24_CR34","volume-title":"Epstein, Robert Axtell, Growing Artificial Societies Social Science From the Bottom Up","author":"M Joshua","year":"1996","unstructured":"Joshua M: Epstein, Robert Axtell, Growing Artificial Societies Social Science From the Bottom Up. Brookings Institution Press and MIT Press, Cambridge, MA; 1996."},{"key":"24_CR35","volume-title":"J. Artif. Soc. Soc. Simul","author":"J Doran","year":"1998","unstructured":"Doran J: Simulating collective mis-belief. J. Artif. Soc. Soc. Simul. 1998., 1(1): http:\/\/jasss.soc.surrey.ac.uk\/1\/1\/3.html"},{"issue":"3","key":"24_CR36","doi-asserted-by":"publisher","first-page":"7243","DOI":"10.1073\/pnas.092080199","volume":"99","author":"JM Epstein","year":"2002","unstructured":"Epstein JM: Modeling civil violence: An agent-based computational approach. Proc. Natl. Acad. Sci. 2002, 99(3):7243\u20137250. 10.1073\/pnas.092080199","journal-title":"Proc. Natl. Acad. Sci"},{"key":"24_CR37","volume-title":"Putting Crime in its Place: Units of Analysis in Geographic Criminology","author":"PL Brantingham","year":"2009","unstructured":"Brantingham PL, Brantingham PJ, Vajihollahi M, Wuschke K: Crime analysis at multiple scales of aggregation: A topological approach. In Putting Crime in its Place: Units of Analysis in Geographic Criminology. Edited by: Weisburd D, Bernasco W, Bruinsma G. Springer, New York; 2009."},{"key":"24_CR38","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11292-008-9053-5","volume":"4","author":"R Berk","year":"2008","unstructured":"Berk R: How you can tell if the simulations in computational criminology are any good? J. Exp. Criminol. 2008, 4: 289\u2013308. 10.1007\/s11292-008-9053-5","journal-title":"J. Exp. Criminol"},{"key":"24_CR39","volume-title":"Patterns in Crime","author":"PL Brantingham","year":"1984","unstructured":"Brantingham PL, Brantingham PJ: Patterns in Crime. Macmillan, New York; 1984."},{"issue":"3","key":"24_CR40","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1093\/bjc\/azh070","volume":"45","author":"W Bernasco","year":"2005","unstructured":"Bernasco W, Nieuwbeerta P: How do residential burglars select target areas? Br. J. Criminol. 2005, 45(3):296\u2013315.","journal-title":"Br. J. Criminol"},{"key":"24_CR41","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1111\/j.1745-9125.2010.00190.x","volume":"48","author":"W Bernasco","year":"2010","unstructured":"Bernasco W: A sentimental journey to crime: Effects of residential history on crime location choice. Criminology 2010, 48: 389\u2013416. 10.1111\/j.1745-9125.2010.00190.x","journal-title":"Criminology"},{"key":"24_CR42","volume-title":"Social Learning and Social Structure: A General Theory of Crime and Deviance","author":"RL Akers","year":"1998","unstructured":"Akers RL: Social Learning and Social Structure: A General Theory of Crime and Deviance. Northeastern University Press, Boston; 1998."},{"key":"24_CR43","first-page":"23","volume-title":"Explaining Criminals and Crime","author":"RV Clarke","year":"2001","unstructured":"Clarke RV, Cornish DB: Rational Choice. In Explaining Criminals and Crime. Edited by: Paternoster R, Bachman R. Roxbury, Los Angeles; 2001:23\u201342."},{"issue":"8","key":"24_CR44","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1068\/a32140","volume":"32","author":"D O\u2019Sullivan","year":"2000","unstructured":"O\u2019Sullivan D, Haklay M: Agent-based models and individualism: Is the world agent-based? Environ. Plann. 2000, 32(8):1409\u20131425. 10.1068\/a32140","journal-title":"Environ. Plann"},{"key":"24_CR45","volume-title":"Viewing Multi-Agent Systems as Abstract State Machines","author":"PL Brantingham","year":"2005","unstructured":"Brantingham PL, Glasser U, Kinney B, Singh K, Vajihollahi M, Modeling Urban Crime Patterns: Viewing Multi-Agent Systems as Abstract State Machines. Edited by: Beauquier D, B\u00f6rger E, Slissenko A. Proc. 12th International Workshop on Abstract State Machines, Paris; 2005."}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/2190-8532-2-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T20:09:56Z","timestamp":1687982996000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/2190-8532-2-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,19]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["24"],"URL":"https:\/\/doi.org\/10.1186\/2190-8532-2-3","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,19]]},"article-number":"3"}}