{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:08:34Z","timestamp":1730218114304,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/eisic.2017.22","type":"proceedings-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T16:30:02Z","timestamp":1514478602000},"page":"107-114","source":"Crossref","is-referenced-by-count":0,"title":["Customs Risk Analysis through the ConTraffic Visual Analytics Tool"],"prefix":"10.1109","author":[{"given":"Mikaela","family":"Poulymenopoulou","sequence":"first","affiliation":[]},{"given":"Aris","family":"Tsois","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70956-5_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/2945.981847"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2011.6102460"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45378-1_63"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CMV.2007.20"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CGIV.2009.54"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598495"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21928-3_18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2535234"},{"key":"ref19","article-title":"Illuminating the path: The research and development agenda for visual analytics","author":"thomas","year":"2005","journal-title":"National Visualization and Analytics Center"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.39"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2011.01946.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2014.7042558"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.226"},{"key":"ref7","first-page":"95","article-title":"Semantic Integration: Coupling cognition and computation through usable interactive analysis","author":"endert","year":"2015","journal-title":"IEEE Computer Graphics and Applications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1345448.1345455"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2011.02.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CoASE.2013.6653910"},{"key":"ref20","first-page":"13","article-title":"ConTraffic: Anomaly detection for maritime container traffic","author":"varfis","year":"2011","journal-title":"Proceedings of MADNES Workshop"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70515"},{"key":"ref21","first-page":"801","article-title":"Evaluation of the visibility of vessel movement fetaures in trajectory visualizations","volume":"30","author":"willems","year":"0"}],"event":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2017,9,11]]},"location":"Athens","end":{"date-parts":[[2017,9,13]]}},"container-title":["2017 European Intelligence and Security Informatics Conference (EISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234922\/8240751\/08240776.pdf?arnumber=8240776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:14:16Z","timestamp":1517246056000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/eisic.2017.22","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}