{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T08:46:02Z","timestamp":1743669962076,"version":"3.27.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T00:00:00Z","timestamp":1727222400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,25]]},"DOI":"10.23919\/spa61993.2024.10715616","type":"proceedings-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T17:29:18Z","timestamp":1729186158000},"page":"205-210","source":"Crossref","is-referenced-by-count":2,"title":["Effective Application of the Big Data Techniques in the Internet Resource Processing System"],"prefix":"10.23919","volume":"17","author":[{"given":"Damian","family":"Jankowski","sequence":"first","affiliation":[{"name":"Military University of Technology,Warsaw,Poland"}]},{"given":"Przemys\u0142aw","family":"\u015acibiorek","sequence":"additional","affiliation":[{"name":"Military University of Technology,Warsaw,Poland"}]},{"given":"Sebastian","family":"Szwaczyk","sequence":"additional","affiliation":[{"name":"Military University of Technology,Warsaw,Poland"}]},{"given":"Zbigniew","family":"Piotrowski","sequence":"additional","affiliation":[{"name":"Military University of Technology,Warsaw,Poland"}]},{"given":"Pawe\u0142","family":"Kaczmarek","sequence":"additional","affiliation":[{"name":"Military University of Technology,Warsaw,Poland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190746"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59065-9_20"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64283-3_10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98539-8_2"},{"volume-title":"The Definitive Guide. Distributed Data at Web Scale; O\u2019Reilly Media","year":"2020","author":"Carpenter","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iccsnt.2011.6182030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.099"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3158661"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58462-7_14"},{"article-title":"A Comparison of NoSQL Database Systems: A Study on MongoDB, Apache Hbase, and Apache Cassandra","volume-title":"International Conference on Computer Science and Engineering","author":"Hammood","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58462-7_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.3481351"},{"key":"ref13","article-title":"A Study on Big Data Processing Frameworks: Spark and Storm","author":"Alkatheri","year":"2019","journal-title":"International Journal of Computer Science and Information Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745452"},{"key":"ref16","first-page":"24","article-title":"Criminal network mining by web structure and content mining","volume-title":"11th WSEAS International Conference on Information Security and Privacy (ISP\u201912)","author":"Hosseinkhani"},{"issue":"8","key":"ref17","first-page":"75","article-title":"Applying Social Network Analysis Techniques in Crawler Based Search Engine to Support Web Terrorism Mining","volume":"17","author":"Moghaddam","year":"2017","journal-title":"IJCSNS"},{"volume-title":"Criminal Activities Predictive Analysis Using Data Mining Techniques","year":"2021","author":"Rai","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/su9112139"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/su131910743"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s19010134"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/app11114800"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/info11070341"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3463331"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.09.016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10060647"}],"event":{"name":"2024 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)","start":{"date-parts":[[2024,9,25]]},"location":"Poznan, Poland","end":{"date-parts":[[2024,9,27]]}},"container-title":["2024 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10715565\/10715594\/10715616.pdf?arnumber=10715616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:55:46Z","timestamp":1729227346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10715616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/spa61993.2024.10715616","relation":{},"subject":[],"published":{"date-parts":[[2024,9,25]]}}}