EVIDENCE DIRECTED GENERATION OF PLAUSIBLE CRIME SCENARIOS WITH IDENTITY RESOLUTION
暂无分享,去创建一个
[1] Paul Hsiung,et al. Alias Detection in Link Data Sets , 2004 .
[2] Qiang Shen,et al. Towards Fuzzy Compositional Modelling , 2007, 2007 IEEE International Fuzzy Systems Conference.
[3] Karl Branting. A comparative evaluation of name-matching algorithms , 2003, ICAIL.
[4] Hsinchun Chen,et al. Discovering Identity Problems: A Case Study , 2005, ISI.
[5] Jeroen Keppens,et al. Probabilistic abductive computation of evidence collection strategies in crime investigation , 2005, ICAIL '05.
[6] Jeroen Keppens,et al. Linguistic Bayesian Networks for reasoning with subjective probabilities in forensic statistics , 2003, ICAIL.
[7] Qiang Shen,et al. A novel framework of fuzzy complex numbers and its application to compositional modelling , 2009, 2009 IEEE International Conference on Fuzzy Systems.
[8] Jeroen Keppens,et al. A scenario-driven decision support system for serious crime investigation , 2007 .
[9] Gert de Cooman,et al. A behavioural model for vague probability assessments , 2005, Fuzzy Sets Syst..
[10] Patrick Pantel,et al. Alias Detection in Malicious Environments , 2006, AAAI Fall Symposium: Capturing and Using Patterns for Evidence Detection.
[11] Alexander Weber,et al. Analysing Social Networks Within Bibliographical Data , 2006, DEXA.
[12] Tossapon Boongoen,et al. Disclosing false identity through hybrid link analysis , 2010, Artificial Intelligence and Law.
[13] Jennifer Widom,et al. SimRank: a measure of structural-context similarity , 2002, KDD.
[14] Jeroen Keppens,et al. Centre for Intelligent Systems and Their Applications on Compositional Modelling on Compositional Modelling on Compositional Modelling* , 2022 .
[15] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[16] Tossapon Boongoen,et al. Detecting false identity through behavioral patterns. , 2008 .
[17] Qiang Shen,et al. Linguistic probabilities: theory and application , 2008, Soft Comput..
[18] H. Chen,et al. Automatically detecting criminal identity deception: an adaptive detection algorithm , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[19] Antonio Badia,et al. Link Analysis Tools for Intelligence and Counterterrorism , 2005, ISI.