{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:08:41Z","timestamp":1730218121953,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/eisic.2017.33","type":"proceedings-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T21:30:02Z","timestamp":1514496602000},"page":"159-162","source":"Crossref","is-referenced-by-count":1,"title":["Are We Really That Close Together? Tracing and Discussing Similarities and Differences between Greek Terrorist Groups Using Cluster Analysis"],"prefix":"10.1109","author":[{"given":"Ioanna","family":"Lekea","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Karampelas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.55"},{"journal-title":"Inside Greek Terrorism","year":"2013","author":"george","key":"ref12"},{"key":"ref13","first-page":"77","article-title":"English Collocation Studies","author":"john","year":"2004","journal-title":"The OSTI Report"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref3","first-page":"525","article-title":"A comparison of document clustering techniques","volume":"400","author":"steinbach","year":"2000","journal-title":"KDD Workshop on Text Mining"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.1136800"},{"key":"ref5","article-title":"Using tf-idf to determine word relevance in document queries","author":"ramos","year":"2003","journal-title":"Proceedings of the First Instructional Conference on Machine Learning"},{"key":"ref8","first-page":"2825","article-title":"Scikit-Ieam: Machine learning in Python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"journal-title":"The Text Mining Handbook Advanced Approaches in Analyzing Unstructured Data","year":"2007","author":"feldman","key":"ref2"},{"journal-title":"Greek 17N Ot ? 1975–2002","article-title":"17N, 2002. 17N: The Proclamations 1974–2002","year":"0","key":"ref1"},{"journal-title":"Python for Data Analysis Data Wrangling with Pandas NumPy and IPython","year":"2012","author":"mckinney","key":"ref9"}],"event":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2017,9,11]]},"location":"Athens","end":{"date-parts":[[2017,9,13]]}},"container-title":["2017 European Intelligence and Security Informatics Conference (EISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234922\/8240751\/08240787.pdf?arnumber=8240787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T22:14:19Z","timestamp":1517264059000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/eisic.2017.33","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}