{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:31:52Z","timestamp":1743100312204,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031133237"},{"type":"electronic","value":"9783031133244"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-13324-4_3","type":"book-chapter","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T20:21:50Z","timestamp":1659558110000},"page":"26-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decision-Support System for Safety and Security Assessment and Management in Smart Cities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8602-908X","authenticated-orcid":false,"given":"Javier","family":"Gonz\u00e1lez-Villa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6366-3982","authenticated-orcid":false,"given":"Arturo","family":"Cuesta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5434-607X","authenticated-orcid":false,"given":"Marco","family":"Spagnolo","sequence":"additional","affiliation":[]},{"given":"Marisa","family":"Zanotti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4978-9650","authenticated-orcid":false,"given":"Luke","family":"Summers","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8453-1954","authenticated-orcid":false,"given":"Alexander","family":"Elms","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2233-8032","authenticated-orcid":false,"given":"Anay","family":"Dhaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7399-6951","authenticated-orcid":false,"given":"Karel","family":"Jedli\u010dka","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Martolos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1047-0685","authenticated-orcid":false,"given":"Deniz","family":"Cetinkaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,4]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1016\/j.ssci.2019.08.038","volume":"120","author":"O Abreu","year":"2019","unstructured":"Abreu, O., Cuesta, A., Balboa, A., Alvear, D.: On the use of stochastic simulations to explore the impact of human parameters on mass public shooting attacks. Saf. Sci. 120, 941\u2013949 (2019)","journal-title":"Saf. Sci."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Anees, V., Kumar, G.: Direction estimation of crowd flow in surveillance videos. In: 2017 IEEE Region 10 Symposium (TENSYMP), pp. 1\u20135 (2017)","DOI":"10.1109\/TENCONSpring.2017.8070040"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Araujo, A., Cacho, N., Thome, A., Medeiros, A., Borges, J.: A predictive policing application to support patrol planning in smart cities. In: 2017 International Smart Cities Conference (ISC2), pp. 1\u20136 (2017)","DOI":"10.1109\/ISC2.2017.8090817"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Balla, P.B., Jadhao, K.: IoT based facial recognition security system. In: 2018 International Conference on Smart City and Emerging Technology (ICSCET), pp. 1\u20134 (2018)","DOI":"10.1109\/ICSCET.2018.8537344"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.jvlc.2017.08.005","volume":"42","author":"P Bellini","year":"2017","unstructured":"Bellini, P., Cenni, D., Nesi, P., Paoli, I.: Wi-Fi based city users\u2019 behaviour analysis for smart city. J. Vis. Lang. Comput. 42, 31\u201345 (2017)","journal-title":"J. Vis. Lang. Comput."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Bonatsos, A., Middleton, L., Melas, P., Sabeur, Z.: Crime open data aggregation and management for the design of safer spaces in urban environments. In: International Symposium on Environmental Software Systems, pp. 311\u2013320 (2013)","DOI":"10.1007\/978-3-642-41151-9_30"},{"issue":"5","key":"3_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3107614","volume":"50","author":"A Boukerche","year":"2017","unstructured":"Boukerche, A., Siddiqui, A., Mammeri, A.: Automated vehicle detection and classification: models, methods, and techniques. ACM Comput. Surv. (CSUR) 50(5), 1\u201339 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Brust, M.R., Danoy, G., Bouvry, P., Gashi, D., Pathak, H., Gon\u00e7alves, M.P.: Defending against intrusion of malicious UAVs with networked Uav defense swarms. In: 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), pp. 103\u2013111 (2017)","DOI":"10.1109\/LCN.Workshops.2017.71"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Chackravarthy, S., Schmitt, S., Yang, L.: Intelligent crime anomaly detection in smart cities using deep learning. In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), p. 399\u2013404 (2018)","DOI":"10.1109\/CIC.2018.00060"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.ssci.2019.08.019","volume":"120","author":"A Cuesta","year":"2019","unstructured":"Cuesta, A., Abreu, O., Balboa, A., Alvear, D.: A new approach to protect soft-targets from terrorist attacks. Saf. Sci. 120, 877\u2013885 (2019)","journal-title":"Saf. Sci."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.procs.2014.08.014","volume":"37","author":"M Dbouk","year":"2014","unstructured":"Dbouk, M., Mcheick, H., Sbeity, I.: CityPro; an integrated city-protection collaborative platform. Procedia Comput. Sci. 37, 72\u201379 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Dial, R.B.: A path-based user-equilibrium traffic assignment algorithm that obviates path storage and enumeration. Transp. Res. Part B Methodol. 40(10), 917\u2013936 (2006)","DOI":"10.1016\/j.trb.2006.02.008"},{"key":"3_CR13","unstructured":"EUROPOL: European union terrorism situation and trend report (2021)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez, J., et al.: An intelligent surveillance platform for large metropolitan areas with dense sensor deployment. Sensors 13(6), 7414\u20137442 (2013)","DOI":"10.3390\/s130607414"},{"key":"3_CR15","unstructured":"Global Terrorism Database\u2122 (GTD): Obtenido de (2021). https:\/\/www.start.umd.edu\/gtd\/"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Hartama, D., et al.: A research framework of disaster traffic management to Smart City. In: 2017 Second International Conference on Informatics and Computing (ICIC), pp. 1\u20135 (2017)","DOI":"10.1109\/IAC.2017.8280607"},{"issue":"5","key":"3_CR17","doi-asserted-by":"publisher","first-page":"4282","DOI":"10.1103\/PhysRevE.51.4282","volume":"51","author":"D Helbing","year":"1995","unstructured":"Helbing, D., Moln\u00e1r, P.: Social force model for pedestrian dynamics. Phys. Rev. E 51(5), 4282 (1995)","journal-title":"Phys. Rev. E"},{"key":"3_CR18","unstructured":"Jayakrishnan, R., Tsai, W.T., Prashker, J.N., Rajadhyaksha, S.: A faster path-based algorithm for traffic assignment (1994)"},{"key":"3_CR19","unstructured":"Jedlicka, K., et al.: Traffic modelling for the smart city of Pilsen (2020)"},{"key":"3_CR20","unstructured":"Kolovsk\u00fd, F., Je\u017eek, J., Kolingerov\u00e1, I.: The origin-destination matrix estimation for large transportation models in an uncongested network. In: International Conference on Mathematical Applications, pp. 17\u201322 (2018)"},{"key":"3_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102023","volume":"55","author":"J Laufs","year":"2020","unstructured":"Laufs, J., Borrion, H., Bradford, B.: Security and the smart city: a systematic review. Sustain. Cities Soc. 55, 102023 (2020)","journal-title":"Sustain. Cities Soc."},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15406\/frcij.2016.03.00087","volume":"3","author":"RH Martin","year":"2016","unstructured":"Martin, R.H.: Soft targets are easy terror targets: increased frequency of attacks, practical preparation, and prevention. Forensic Res. Criminol. Int. J. 3(2), 1\u20137 (2016)","journal-title":"Forensic Res. Criminol. Int. J."},{"key":"3_CR23","unstructured":"McGrattan, K., et al.: Fire Dynamics Simulator User\u2019s Guide. National Institute of Standards and Technology (2017)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Noor, M., Nawawi, W., Ghazali, A.: Supporting decision making in situational crime prevention using fuzzy association rule. In: 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), pp. 225\u2013229 (2013)","DOI":"10.1109\/IC3INA.2013.6819178"},{"key":"3_CR25","unstructured":"Spiess, H.: A gradient approach for the OD matrix adjustment problem. $${\\text{a}} \\in {\\hat{\\text{A}}}$$, 1 (1990)"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Truntsevsky, Y.V., Lukiny, I., Sumachev, A., Kopytova, A.: A smart city is a safe city: the current status of street crime and its victim prevention using a digital application. In: MATEC Web of Conferences, vol. 170, p. 01067 (2018)","DOI":"10.1051\/matecconf\/201817001067"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Tuman, J.S.: Communicating Terror: The Rhetorical Dimensions of Terrorism. Sage Publications (2009)","DOI":"10.4135\/9781452275161"},{"key":"3_CR28","unstructured":"Turban, E.: Decision Support and Expert Systems Management Support Systems. Prentice-Hall, Inc., Hoboken (1995)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, W., et al.: Agent-based modeling of a stadium evacuation in a smart city. In: 2018 Winter Simulation Conference (WSC), pp. 2803\u20132814 (2018)","DOI":"10.1109\/WSC.2018.8632176"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Zhou, W., Saha, D., Rangarajan, S.: A system architecture to aggregate video surveillance data in Smart Cities. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137 (2015)","DOI":"10.1109\/GLOCOM.2015.7417602"},{"issue":"11","key":"3_CR31","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.3390\/rs9111128","volume":"9","author":"A Zingoni","year":"2017","unstructured":"Zingoni, A., Diani, M., Corsini, G.: A flexible algorithm for detecting challenging moving objects in real-time within IR video sequences. Remote Sens. 9(11), 1128 (2017)","journal-title":"Remote Sens."}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Processing. ICIAP 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-13324-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,22]],"date-time":"2022-10-22T19:04:28Z","timestamp":1666465468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-13324-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031133237","9783031133244"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-13324-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Analysis and Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lecce","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciap2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iciap2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"307","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"168","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}