<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082023000100011</article-id>
<article-id pub-id-type="doi">10.47741/17943108.398</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[La inteligencia artificial y la video-vigilancia en la predicción y detección de delitos en espacio-tiempo: una revisión sistemática]]></article-title>
<article-title xml:lang="en"><![CDATA[Artificial intelligence and video surveillance in space-time crime prediction and detection: a systematic review]]></article-title>
<article-title xml:lang="pt"><![CDATA[Inteligência artificial e vídeo-vigilância na previsão e detecção de crimes no espaço-tempo: uma revisão sistemática]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Barragán-Huamán]]></surname>
<given-names><![CDATA[Hernán Yonathan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cataño-Añazco]]></surname>
<given-names><![CDATA[Kevin Elías]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sevincha-Chacabana]]></surname>
<given-names><![CDATA[Mauricio Adriano]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vargas-Salas]]></surname>
<given-names><![CDATA[Obed]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Católica de Santa María  ]]></institution>
<addr-line><![CDATA[Arequipa ]]></addr-line>
<country>Peru</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Católica de Santa María  ]]></institution>
<addr-line><![CDATA[Arequipa ]]></addr-line>
<country>Peru</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Católica de Santa María  ]]></institution>
<addr-line><![CDATA[Arequipa ]]></addr-line>
<country>Peru</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad Católica de Santa María  ]]></institution>
<addr-line><![CDATA[Arequipa ]]></addr-line>
<country>Peru</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2023</year>
</pub-date>
<volume>65</volume>
<numero>1</numero>
<fpage>11</fpage>
<lpage>25</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082023000100011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082023000100011&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082023000100011&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En la sociedad de hoy los delitos vienen incrementándose y particularmente en la ciudad de Bogotá, lo que ha causado muchos inconvenientes a la Policía Nacional de Colombia, así como también a los centros de seguridad ciudadana. Ante esta situación, se ha propuesto una predicción de tiempo-espacio en los puntos críticos de crímenes y delitos, con la ayuda de inteligencia artificial. Por consiguiente, este trabajo tiene como objetivo analizar, resumir, interpretar y evaluar las distintas técnicas de predicción espacio-temporal de la delincuencia con un panorama inteligente. Por la propia naturaleza de la investigación, se utilizó una metodología de enfoque descriptivo-cualitativo, con la cual se diseñaron fichas de observación estructurada para sistematizar información de cinco bases de datos: Scopus, Web of Science, IEEE, ACM, Springer; dichas publicaciones comprenden desde 2019 hasta junio de 2021. En consecuencia, se encontraron en total 3015 estudios, después del proceso de cribado y verificación de los criterios de exclusión e inclusión, se seleccionaron 132 artículos, luego se aplicaron preguntas Psicólogo Interno Residente (PIR), quedando así 18 artículos. Los principales hallazgos encontrados indican que los algoritmos de redes neuronales resultaron ser uno de los métodos más eficaces para la detección de puntos críticos de delincuencia, dado que los grandes avances de la tecnología coadyuvarían en los próximos años a predecir de forma rápida y eficaz los actos delictivos y los crímenes ubicados en cualquier región del continente latinoamericano.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In today&#8217;s society, crimes are increasing, particularly in the city of Bogota, which has caused many inconveniences to the National Police of Colombia, as well as to the citizen security centers. Given this situation, a time-space prediction of crime and crime hotspots has been proposed with the help of artificial intelligence. Therefore, this paper aims to analyze, summarize, interpret and evaluate the various techniques of space-time prediction of crime with an intelligent view. Due to the very nature of the research, a descriptive-qualitative approach methodology was used, with which structured observation sheets were designed to systematize information from five databases: Scopus, Web of Science, IEEE, ACM, Springer; these publications span from 2019 to June 2021. Consequently, a total of 3015 studies were found, after the screening process and verification of exclusion and inclusion criteria, 132 articles were selected, then questions were applied Psychologist Internal Resident (PIR), thus leaving 18 articles. The main findings indicate that neural network algorithms proved to be one of the most effective methods for the detection of crime hotspots, given that the great advances in technology would help in the coming years to quickly and effectively predict criminal acts and crimes located in any region of the Latin American continent.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Na sociedade de hoje, a criminalidade está aumentando, particularmente na cidade de Bogotá, o que tem causado muitos inconvenientes para a Polícia Nacional Colombiana, bem como para os centros de segurança do cidadão. Diante desta situação, foi proposta uma previsão tempo-espacial de hotspots de crime com a ajuda da inteligência artificial. Portanto, este documento visa analisar, resumir, interpretar e avaliar as diversas técnicas de previsão espaço-temporal do crime com uma visão inteligente. Devido à própria natureza da pesquisa, foi utilizada uma metodologia de abordagem descritiva-qualitativa, com a qual foram elaboradas fichas de observação estruturadas para sistematizar informações de cinco bancos de dados: Scopus, Web of Science, IEEE, ACM, Springer; estas publicações abrangem o período de 2019 a junho de 2021. Consequentemente, foi encontrado um total de 3015 estudos, após o processo de triagem e verificação dos critérios de exclusão e inclusão, 132 artigos foram selecionados, depois foram aplicadas perguntas ao Psicólogo em Residência (PIR), deixando 18 artigos. As principais descobertas indicam que os algoritmos de redes neurais provaram ser um dos métodos mais eficazes para a detecção de hotspots de crime, dado que os grandes avanços na tecnologia ajudarão nos próximos anos a prever rápida e efetivamente atos criminosos e crimes localizados em qualquer região do continente latino-americano.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Criminología]]></kwd>
<kwd lng="es"><![CDATA[inteligencia artificial]]></kwd>
<kwd lng="es"><![CDATA[detección de delitos]]></kwd>
<kwd lng="es"><![CDATA[geografía social]]></kwd>
<kwd lng="es"><![CDATA[Sistemas de Información Geográfica (GIS)]]></kwd>
<kwd lng="es"><![CDATA[mapas delictivos]]></kwd>
<kwd lng="es"><![CDATA[análisis espacio-temporal]]></kwd>
<kwd lng="en"><![CDATA[Criminology]]></kwd>
<kwd lng="en"><![CDATA[artificial intelligence]]></kwd>
<kwd lng="en"><![CDATA[crime detection]]></kwd>
<kwd lng="en"><![CDATA[social geography]]></kwd>
<kwd lng="en"><![CDATA[Geographic Information Systems (GIS)]]></kwd>
<kwd lng="en"><![CDATA[crime maps]]></kwd>
<kwd lng="en"><![CDATA[spatio-temporal analysis]]></kwd>
<kwd lng="pt"><![CDATA[Criminologia]]></kwd>
<kwd lng="pt"><![CDATA[inteligência artificial]]></kwd>
<kwd lng="pt"><![CDATA[detecção de crime]]></kwd>
<kwd lng="pt"><![CDATA[geografia social]]></kwd>
<kwd lng="pt"><![CDATA[Sistemas de Informação Geográfica (SIG)]]></kwd>
<kwd lng="pt"><![CDATA[mapeamento do crime]]></kwd>
<kwd lng="pt"><![CDATA[análise espaço-temporal]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akhgar]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Yates]]></surname>
<given-names><![CDATA[S.J]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic Intelligence Management for Combating Crime and Terrorism. In: Akhgar, B., Yates, S. (Eds) Intelligence Management. Advanced Information and Knowledge Processing]]></source>
<year>2011</year>
<publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baqir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rehman]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Malik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mustafa]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[Evaluating the Performance of Hierarchical Clustering algorithms to Detect Spatio-Temporal Crime Hot-Spots]]></source>
<year>2020</year>
<volume>1</volume>
<conf-name><![CDATA[ 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brantingham]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Brantingham]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nodes, paths and edges: Considerations on the complexity of crime and the physical environment]]></article-title>
<source><![CDATA[Journal of Environmental Psychology]]></source>
<year>1993</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-28</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Butt]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Letchmunan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Baqir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sherazi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatio-Temporal Crime Hot Spot Detection and Prediction: A Systematic Literature Review]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>166553-74</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Deshmukh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Annappa]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prediction of Crime Hot Spots Using Spatiotemporal Ordinary Kriging]]></article-title>
<source><![CDATA[Studies in Computational Intelligence]]></source>
<year>2019</year>
<volume>771</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>683-91</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elluri]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mandalapu]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Developing Machine Learning Based Predictive Models for Smart Policing]]></source>
<year>2019</year>
<volume>1</volume>
<conf-name><![CDATA[ 2019 IEEE International Conference on Smart Computing (SMARTCOMP)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>198-204</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Esquivel]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nicolis]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Peralta]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Mateu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Spatio-Temporal Prediction of Baltimore Crime Events Using CLSTM Neural Networks, in IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>209101-12</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flores Arias]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modelación y predicción de focos de criminalidad basado en modelos probabilísticos]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Santiago de Chile ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Chile]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gerber]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting Crime Using Twitter and Kernel Density Estimation]]></article-title>
<source><![CDATA[Decision Support Systems]]></source>
<year>2014</year>
<volume>61</volume>
<page-range>115-25</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gorr]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Harries]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction to crime forecasting]]></article-title>
<source><![CDATA[International Journal of Forecasting]]></source>
<year>2003</year>
<volume>19</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>551-5</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Helbich]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jokar Arsanjani]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatial eigenvector filtering for spatiotemporal crime mapping and spatial crime analysis]]></article-title>
<source><![CDATA[Cartography and Geographic Information Science]]></source>
<year>2014</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>134-48</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kalampokis]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Tambouris]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Tarabanis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the predictive power of social media]]></article-title>
<source><![CDATA[Internet Research]]></source>
<year>2013</year>
<volume>23</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>544-59</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kounadi]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Ristea]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Araujo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Leitner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A systematic review on spatial crime forecasting]]></article-title>
<source><![CDATA[Crime Science]]></source>
<year>2020</year>
<volume>9</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chiok]]></surname>
<given-names><![CDATA[C. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modelos de regresión lineal con redes neuronales]]></article-title>
<source><![CDATA[Anales Científicos]]></source>
<year>2014</year>
<volume>75</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>253</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Misyrlis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheung]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Srivastava]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kannan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasanna]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Spatio-Temporal Modeling of Criminal Activity]]></source>
<year>2017</year>
<volume>1</volume>
<conf-name><![CDATA[ Proceedings of the 2nd International Workshop on Social Sensing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>3-8</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Papalexakis]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Dumitras]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chau]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Prakash]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Faloutsos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[SharkFin: Spatio-temporal mining of software adoption and penetration]]></article-title>
<source><![CDATA[Social Network Analysis and Mining]]></source>
<year>2014</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quick]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multiscale Spatiotemporal Patterns of Crime: A Bayesian Cross-Classified Multilevel Modelling Approach]]></article-title>
<source><![CDATA[Journal of Geographical Systems]]></source>
<year>2019</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>339365</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sheehey]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Algorithmic Paranoia: The Temporal Governmentality of Predictive Policing]]></article-title>
<source><![CDATA[Ethics and Information Technology]]></source>
<year>2019</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>49-58</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shiode]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shiode]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A network-based scan statistic for detecting the exact location and extent of hotspots along urban streets]]></article-title>
<source><![CDATA[Computers, Environment and Urban Systems]]></source>
<year>2020</year>
<volume>83</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ugolini]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Shadowing &#8216;The Exceptional&#8217; behind the &#8216;Ordinary&#8217;: Mapping a Network of Intelligence Laundering]]></article-title>
<source><![CDATA[Intelligence and National Security]]></source>
<year>2021</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>72-94</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wain]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ariel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Tankebe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The collateral consequences of GPS-LED supervision in hot spots policing]]></article-title>
<source><![CDATA[Police Practice and Research]]></source>
<year>2017</year>
<volume>18</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>376390</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhan]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A sensitive object-oriented approach to big surveillance data compression for social security applications in smart cities]]></article-title>
<source><![CDATA[Software: Practice and Experience]]></source>
<year>2016</year>
<volume>47</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1061-80</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xie]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Shekhar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Una estadística de exploración basada en la normalización no determinista (exploración NN) hacia la detección robusta de puntos de acceso: un resumen de los resultados]]></source>
<year>2019</year>
<volume>1</volume>
<conf-name><![CDATA[ Actas de la Conferencia Internacional SIAM 2019 sobre Minería de Datos]]></conf-name>
<conf-loc> </conf-loc>
<page-range>82-90</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
