Detecting Suspicion Information on the Web Using Crime Data Mining Techniques
暂无分享,去创建一个
Javad Hosseinkhani | Javid Hosseinkhani Naniz | J. Hosseinkhani | Mohammad Koochakzaei | Mohammad Koochakzaei
[1] Mithilesh Kumar,et al. An approach to adaptive user interfaces using interactive media systems , 2006, IUI '06.
[2] Ramasamy Uthurusamy,et al. EVOLVING DATA MINING INTO SOLUTIONS FOR INSIGHTS , 2002 .
[3] S. Chuprat,et al. Discovering criminal networks by Web structure mining , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[4] Bing Liu,et al. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data , 2006, Data-Centric Systems and Applications.
[5] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[6] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Hsinchun Chen,et al. Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.
[8] Cherri M. Pancake,et al. HyperSQL: web-based query interfaces for biological databases , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[9] Stephen G. MacDonell,et al. Software Forensics: Extending Authorship Analysis Techniques to Computer Programs , 2002 .
[10] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[11] Petra Perner,et al. Data Mining on Multimedia Data , 2002, Lecture Notes in Computer Science.
[12] Pierre Baldi,et al. Modeling the Internet and the Web: Probabilistic Methods and Algorithms. By Pierre Baldi, Paolo Frasconi, Padhraic Smith, John Wiley and Sons Ltd., West Sussex, England, 2003. 285 pp ISBN 0 470 84906 1 , 2006, Inf. Process. Manag..
[13] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[14] Kun Liu,et al. Privacy Sensitive Distributed Data Mining from Multi-party Data , 2003, ISI.
[15] Chabane Djeraba,et al. Mining Multimedia and Complex Data , 2002, Lecture Notes in Computer Science.
[16] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[17] Hamed Taherdoost,et al. Criminal Network Mining by Web Structure and Content Mining , 2012 .
[18] Ted E. Senator,et al. The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions , 1995, IAAI.
[19] Hamed Taherdoost,et al. Propose a Framework for Criminal Mining by Web Structure and Content Mining , 2013 .
[20] Suhaimi Ibrahim,et al. Web Crime Mining by Means of Data Mining Techniques , 2014 .
[21] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[22] Karl Aberer,et al. The design of query interfaces to the GPCRDB biological database , 1999, Proceedings User Interfaces to Data Intensive Systems.
[23] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[24] Gang Wang,et al. Automatically detecting deceptive criminal identities , 2004, CACM.
[25] Hsinchun Chen,et al. Using Coplink to Analyze Criminal-Justice Data , 2002, Computer.
[26] Mohammad Reza Keyvanpour,et al. Detecting and investigating crime by means of data mining: a general crime matching framework , 2011, WCIT.