A Classification Framework for Data Mining Applications in Criminal Science and Investigations
暂无分享,去创建一个
[1] Divya Bansal,et al. Usage of Apriori Algorithm of Data Mining as an Application to Grievous Crimes against Women , 2013 .
[2] M. Durairaj,et al. Criminal behavior analysis by using data mining techniques , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[3] Shiju Sathyadevan,et al. Crime analysis and prediction using data mining , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[4] S. S. Pawar,et al. Comparison of association rule mining with pruning and adaptive technique for classification of phishing dataset , 2013 .
[5] Gaurav Kapoor,et al. Detecting evolutionary financial statement fraud , 2011, Decis. Support Syst..
[6] Ran Wolff,et al. Distributed Data Mining in Peer-to-Peer Networks , 2006, IEEE Internet Computing.
[7] Omowunmi E. Isafiade,et al. A Revised Frequent Pattern Model for Crime Situation Recognition Based on Floor-Ceil Quartile Function , 2015, ITQM.
[8] Shian-Shyong Tseng,et al. Data types generalization for data mining algorithms , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[9] Mohammad Reza Keyvanpour,et al. Detecting and investigating crime by means of data mining: a general crime matching framework , 2011, WCIT.
[10] Abhishek Vaish,et al. Apriori Viterbi Model for Prior Detection of Socio-Technical Attacks in a Social Network , 2014, 2014 International Conference on Engineering and Telecommunication.
[11] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[12] Nurfadhlina Mohd Sharef,et al. Evolving fuzzy grammar for crime texts categorization , 2015, Appl. Soft Comput..
[13] Johan L. Perols. Financial Statement Fraud Detection: An Analysis of Statistical and Machine Learning Algorithms , 2011 .
[14] B. B. Meshram,et al. Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.
[15] J. E. Judith,et al. Secured distributed document clustering & keyphrase extraction algorithm in structured Peer to Peer networks , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.
[16] Tushar Gupta,et al. Crime detection and criminal identification in India using data mining techniques , 2014, AI & SOCIETY.
[17] Krzysztof Michalak,et al. Graph mining approach to suspicious transaction detection , 2011, 2011 Federated Conference on Computer Science and Information Systems (FedCSIS).
[18] Juan D. Velásquez,et al. Characterization and detection of taxpayers with false invoices using data mining techniques , 2013, Expert Syst. Appl..
[19] Benjamin C. M. Fung,et al. Mining writeprints from anonymous e-mails for forensic investigation , 2010, Digit. Investig..
[20] M. Tahar Kechadi,et al. A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank , 2010, 2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications.
[21] Mugdha Sharma. Z - CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).
[22] Omowunmi E. Isafiade,et al. CitiSafe: Adaptive Spatial Pattern Knowledge Using Fp-Growth Algorithm for Crime Situation Recognition , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.
[23] Ravi Shankar,et al. Modeling brain and behavior of a terrorist through fuzzy logic and ontology , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.
[24] Vadlamani Ravi,et al. Detection of financial statement fraud and feature selection using data mining techniques , 2011, Decis. Support Syst..
[25] Roger S. Debreceny,et al. A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits , 2014, Int. J. Account. Inf. Syst..
[26] Nagiza F. Samatova,et al. RACHET: An Efficient Cover-Based Merging of Clustering Hierarchies from Distributed Datasets , 2002, Distributed and Parallel Databases.
[27] Shalinda Adikari,et al. Intelligent criminal identification system , 2013, 2013 8th International Conference on Computer Science & Education.
[28] Yong Hu,et al. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..
[29] Xiuyu Zhong. THE APPLICATION OF APRIORI ALGORITHM FOR NETWORK FORENSICS ANALYSIS , 2013 .