From the Publisher:
Coverage of specific technologies available that represent the cutting-edge in evidence gathering and collection through established information networks
- Introduces professionals to case studies illustrating real-world applications of data mining to law enforcement and investigators
- Illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
- Includes numerous diagrams and screen captures to illustrate the use of these technologies
Cited By
- Sohony I, Pratap R and Nambiar U Ensemble learning for credit card fraud detection Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, (289-294)
- van Dijk J, Kalidien S and Choenni S Development, implementation and use of a judicial data space system Proceedings of the 7th International Conference on Theory and Practice of Electronic Governance, (174-181)
- Duman E and Elikucuk I Solving credit card fraud detection problem by the new metaheuristics migrating birds optimization Proceedings of the 12th international conference on Artificial Neural Networks: advences in computational intelligence - Volume Part II, (62-71)
- Duman E and Elikucuk I Applying Migrating Birds Optimization to Credit Card Fraud Detection Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867, (416-427)
- Kalidien S, Choenni S and Meijer R Crime statistics online Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities, (131-137)
- Pavlou K and Snodgrass R (2008). Forensic analysis of database tampering, ACM Transactions on Database Systems (TODS), 33:4, (1-47), Online publication date: 1-Nov-2008.
- Ozgul F, Erdem Z and Aksoy H Comparing Two Models for Terrorist Group Detection Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (149-160)
- Amirbekyan A and Estivill-Castro V A new efficient privacy-preserving scalar product protocol Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70, (209-214)
- Amirbekyan A and Estivill-Castro V Privacy-preserving regression algorithms Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization, (37-45)
- Amirbekyan A and Estivill-Castro V The privacy of k-NN retrieval for horizontal partitioned data Proceedings of the eighteenth conference on Australasian database - Volume 63, (33-42)
- Shaikh M, Wang J, Liu H and Song Y Investigative data mining for counterterrorism Proceedings of the 1st international conference on Advances in hybrid information technology, (31-41)
- Cao L Activity mining Proceedings of the Second international conference on Advanced Data Mining and Applications, (582-593)
- Wang J, Fu T, Lin H and Chen H A framework for exploring gray web forums Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (498-503)
- Amirbekyan A and Estivill-Castro V Privacy preserving DBSCAN for vertically partitioned data Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics, (141-153)
- Yin X, Yurcik W, Treaster M, Li Y and Lakkaraju K VisFlowConnect Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, (26-34)
Index Terms
- Investigative Data Mining for Security and Criminal Detection
Recommendations
Mining Criminal Networks from Chat Log
WI-IAT '12: Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01Cyber criminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, cyber threatening, blackmail, and drug trafficking. One way to fight cyber crime is ...
Investigative data mining for counterterrorism
ICHIT'06: Proceedings of the 1st international conference on Advances in hybrid information technologyAfter the tragic events of 9/11, the concern about national security has increased significantly. However, law enforcement agencies, particularly in view of current emphasis on terrorism, increasingly face the challenge of information overload and lack ...
Investigative data mining and its application in counterterrorism
AIC'05: Proceedings of the 5th WSEAS International Conference on Applied Informatics and CommunicationsIt is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at ...