Predictive Models in Cybercrime Investigation: An Application of Data Mining Techniques
暂无分享,去创建一个
[1] Norwood East. International Review of Criminal Policy , 1953 .
[2] Mario Piattini,et al. Security Engineering for Cloud Computing: Approaches and Tools , 2012 .
[3] Jarkko Vesa. Mobile Services In The Networked Economy , 2005 .
[4] Jan Muntermann,et al. Mobile Emergency Management Services Targeting Large Public Events , 2011, Int. J. Serv. Sci. Manag. Eng. Technol..
[5] F. Pocar. New Challenges for International Rules Against Cyber-Crime , 2002 .
[6] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[7] Adamantios Koumpis,et al. Service Science for Socio-Economical and Information Systems Advancement: Holistic Methodologies , 2009 .
[8] Bo K. Wong,et al. Neural network applications in business: A review and analysis of the literature (1988-1995) , 1997, Decis. Support Syst..
[9] Shihchieh Chou,et al. Cybercrime & Cybercriminals: An Overview of the Taiwan Experience , 2006, J. Comput..
[10] Richard S. Rosenberg,et al. Watching the Web: Thoughts on Expanding Police Surveillance Opportunities under the Cyber-Crime Convention , 2004 .
[11] Sven Laumer,et al. An IT-Architecture to Align E-Recruiting and Retention Processes , 2009, Int. J. E Serv. Mob. Appl..
[12] Nikos Passas,et al. Background and outline of the 2nd world summit of attorneys general, prosecutors general, chief prosecutors, prosecutors and ministers of justice , 2007 .
[13] Tugrul U. Daim,et al. Exploration of Adoption of Service Innovations through Technology Road-Mapping: Case of Location Based Services , 2010, Int. J. Serv. Sci. Manag. Eng. Technol..
[14] Adamantios Koumpis. Service Science and Practice , 2010 .
[15] Mokerrom Hossain,et al. Global-Local Nexus and the Emerging Field of Criminology and Criminal Justice in South Asia: Bangladesh Case , 2008 .
[16] Chris Chatfield,et al. Time series forecasting with neural networks: a comparative study using the air line data , 2008 .
[17] Richard Bassett,et al. Computer Forensics: An Essential Ingredient for Cyber Security , 2006 .
[18] Daniele Cangemi,et al. Procedural law provisions of the council of Europe convention on cybercrime1 , 2004 .