Fuzzy Clustering based Methodology for Multidimensional Data Analysis in Computational Forensic Domain
暂无分享,去创建一个
[1] Ryan Kling,et al. Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation , 2002, Australasian Data Mining Conference.
[2] J. Wu,et al. A genetic fuzzy k-Modes algorithm for clustering categorical data , 2009, Expert Syst. Appl..
[3] Hany H. Ammar,et al. A neural network system for matching dental radiographs , 2007, Pattern Recognit..
[4] J. C. Dunn,et al. A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .
[5] Satoru Fukami,et al. Some considerations on fuzzy conditional inference , 1980 .
[6] Andrew H. Sung,et al. Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques , 2003, Int. J. Digit. EVid..
[7] Ricci S. C. Ieong,et al. FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..
[8] Sheng-Tun Li,et al. An intelligent decision-support model using FSOM and rule extraction for crime prevention , 2010, Expert Syst. Appl..
[9] J A Lambert,et al. Using a tree diagram to interpret a mixed DNA profile. , 1998, Journal of forensic sciences.
[10] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[11] Tinghua Wang,et al. Network forensics based on fuzzy logic and expert system , 2009, Comput. Commun..
[12] M. Sugeno. FUZZY MEASURES AND FUZZY INTEGRALS—A SURVEY , 1993 .
[13] Sargur N. Srihari,et al. Computational Forensics: Towards Hybrid-Intelligent Crime Investigation , 2007, Third International Symposium on Information Assurance and Security.
[14] R. Yager. On a general class of fuzzy connectives , 1980 .
[15] Haoyuan Li,et al. Discovery of Unexpected Fuzzy Recurrence Behaviors in Sequence Databases , 2010 .
[16] Salvatore J. Stolfo,et al. Data mining-based intrusion detectors: an overview of the columbia IDS project , 2001, SGMD.
[17] Didier Dubois,et al. Fuzzy sets and systems ' . Theory and applications , 2007 .
[18] Gang Wang,et al. Automatically detecting deceptive criminal identities , 2004, CACM.
[19] P. Sinha. A symmetry perceiving adaptive neural network and facial image recognition. , 1998, Forensic science international.
[20] Megan Carney,et al. The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..
[21] Sridha Sridharan,et al. A two stage fuzzy decision classifier for speaker identification , 1996, Speech Commun..
[22] Shaio Yan Huang,et al. Using the artificial neural network to predict fraud litigation: Some empirical evidence from emerging markets , 2009, Expert Syst. Appl..
[23] Matthew M. Shannon. Forensic Relative Strength Scoring: ASCII and Entropy Scoring , 2004, Int. J. Digit. EVid..
[24] Khosrow Kaikhah,et al. Discovering Trends in Large Datasets Using Neural Networks , 2006, Applied Intelligence.
[25] Hiok Chai Quek,et al. Pseudo-outer product based fuzzy neural network fingerprint verification system , 2001, Neural Networks.
[26] Hsinchun Chen,et al. Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.
[27] James C. Bezdek,et al. Pattern Recognition with Fuzzy Objective Function Algorithms , 1981, Advanced Applications in Pattern Recognition.
[28] Xiyu Liu,et al. A Novel Fuzzy Clustering Based on Particle Swarm Optimization , 2007, 2007 First IEEE International Symposium on Information Technologies and Applications in Education.
[29] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[30] Pierre Margot,et al. The contribution of forensic science to crime analysis and investigation: forensic intelligence. , 2006, Forensic science international.
[31] Lotfi A. Zadeh,et al. Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..
[32] Ebrahim H. Mamdani,et al. An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..
[33] Tony H. Grubesic,et al. On The Application of Fuzzy Clustering for Crime Hot Spot Detection , 2006 .
[34] Rong Zheng,et al. Crime Data Mining: An Overview and Case Studies , 2003, DG.O.
[35] Sankar K. Pal,et al. Rough Set Based Generalized Fuzzy $C$ -Means Algorithm and Quantitative Indices , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[36] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[37] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[38] Tamas Abraham,et al. Investigative profiling with computer forensic log data and association rules , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[39] 菅野 道夫,et al. Industrial applications of fuzzy control , 1985 .
[40] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[41] L. A. ZADEH,et al. The concept of a linguistic variable and its application to approximate reasoning - I , 1975, Inf. Sci..
[42] Hsinchun Chen,et al. Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.
[43] Hsinchun Chen,et al. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..