暂无分享,去创建一个
[1] Gang Wang,et al. Automatically detecting deceptive criminal identities , 2004, CACM.
[2] Kun Liu,et al. Privacy Sensitive Distributed Data Mining from Multi-party Data , 2003, ISI.
[3] Hsinchun Chen,et al. Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.
[4] Stephen G. MacDonell,et al. Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .
[5] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Hsinchun Chen,et al. An International Perspective on Fighting Cybercrime , 2003, ISI.
[7] Ted E. Senator,et al. The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions , 1995, IAAI.
[8] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[9] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[10] Hsinchun Chen,et al. Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.