A Classification Framework for Data Mining Applications in Criminal Science and Investigations

[1]  Divya Bansal,et al.  Usage of Apriori Algorithm of Data Mining as an Application to Grievous Crimes against Women , 2013 .

[2]  M. Durairaj,et al.  Criminal behavior analysis by using data mining techniques , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[3]  Shiju Sathyadevan,et al.  Crime analysis and prediction using data mining , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).

[4]  S. S. Pawar,et al.  Comparison of association rule mining with pruning and adaptive technique for classification of phishing dataset , 2013 .

[5]  Gaurav Kapoor,et al.  Detecting evolutionary financial statement fraud , 2011, Decis. Support Syst..

[6]  Ran Wolff,et al.  Distributed Data Mining in Peer-to-Peer Networks , 2006, IEEE Internet Computing.

[7]  Omowunmi E. Isafiade,et al.  A Revised Frequent Pattern Model for Crime Situation Recognition Based on Floor-Ceil Quartile Function , 2015, ITQM.

[8]  Shian-Shyong Tseng,et al.  Data types generalization for data mining algorithms , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).

[9]  Mohammad Reza Keyvanpour,et al.  Detecting and investigating crime by means of data mining: a general crime matching framework , 2011, WCIT.

[10]  Abhishek Vaish,et al.  Apriori Viterbi Model for Prior Detection of Socio-Technical Attacks in a Social Network , 2014, 2014 International Conference on Engineering and Telecommunication.

[11]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[12]  Nurfadhlina Mohd Sharef,et al.  Evolving fuzzy grammar for crime texts categorization , 2015, Appl. Soft Comput..

[13]  Johan L. Perols Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms , 2011 .

[14]  B. B. Meshram,et al.  Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.

[15]  J. E. Judith,et al.  Secured distributed document clustering & keyphrase extraction algorithm in structured Peer to Peer networks , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[16]  Tushar Gupta,et al.  Crime detection and criminal identification in India using data mining techniques , 2014, AI & SOCIETY.

[17]  Krzysztof Michalak,et al.  Graph mining approach to suspicious transaction detection , 2011, 2011 Federated Conference on Computer Science and Information Systems (FedCSIS).

[18]  Juan D. Velásquez,et al.  Characterization and detection of taxpayers with false invoices using data mining techniques , 2013, Expert Syst. Appl..

[19]  Benjamin C. M. Fung,et al.  Mining writeprints from anonymous e-mails for forensic investigation , 2010, Digit. Investig..

[20]  M. Tahar Kechadi,et al.  A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank , 2010, 2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications.

[21]  Mugdha Sharma Z - CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).

[22]  Omowunmi E. Isafiade,et al.  CitiSafe: Adaptive Spatial Pattern Knowledge Using Fp-Growth Algorithm for Crime Situation Recognition , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[23]  Ravi Shankar,et al.  Modeling brain and behavior of a terrorist through fuzzy logic and ontology , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.

[24]  Vadlamani Ravi,et al.  Detection of financial statement fraud and feature selection using data mining techniques , 2011, Decis. Support Syst..

[25]  Roger S. Debreceny,et al.  A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits , 2014, Int. J. Account. Inf. Syst..

[26]  Nagiza F. Samatova,et al.  RACHET: An Efficient Cover-Based Merging of Clustering Hierarchies from Distributed Datasets , 2002, Distributed and Parallel Databases.

[27]  Shalinda Adikari,et al.  Intelligent criminal identification system , 2013, 2013 8th International Conference on Computer Science & Education.

[28]  Yong Hu,et al.  The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..

[29]  Xiuyu Zhong THE APPLICATION OF APRIORI ALGORITHM FOR NETWORK FORENSICS ANALYSIS , 2013 .