Micro-Level Incident Analysis using Spatial Association Rule Mining
暂无分享,去创建一个
[1] Mansi Ghodsi,et al. A review of data mining applications in crime , 2016, Stat. Anal. Data Min..
[2] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[3] Lizhen Wang,et al. Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets , 2013, IEEE Transactions on Knowledge and Data Engineering.
[4] Max J. Egenhofer,et al. A Formal Definition of Binary Topological Relationships , 1989, FODO.
[5] M. Shahriar Hossain,et al. Storytelling in entity networks to support intelligence analysts , 2012, KDD.
[6] Patricia L. Brantingham,et al. Environmental Criminology: From Theory to Urban Planning Practice , 1998 .
[7] P. Brantingham,et al. Crime Pattern Theory , 2013, Oxford Research Encyclopedia of Criminology and Criminal Justice.
[8] Franco P. Preparata,et al. Computational Geometry , 1985, Texts and Monographs in Computer Science.
[9] Dirk Neumann,et al. Investigating Crime-to-Twitter Relationships in Urban Environments - Facilitating a Virtual Neighborhood Watch , 2014, ECIS.
[10] Chih Hao Ku,et al. Crime Information Extraction from Police and Witness Narrative Reports , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[11] Xin Zhang,et al. Fast mining of spatial collocations , 2004, KDD.
[12] Hsinchun Chen,et al. Extracting Meaningful Entities from Police Narrative Reports , 2002, DG.O.
[13] John Eck,et al. Crime Places in Crime Theory , 2015 .
[14] S. Shekhar,et al. A Join-less Approach for Mining Spatial Co-location Patterns , 2006 .
[15] Patricia L. Brantingham,et al. Patterns in Crime , 1984 .
[16] Shashi Shekhar,et al. Spatial Databases: A Tour , 2003 .
[17] Christopher M. Gifford,et al. Fuzzy association rule mining for community crime pattern discovery , 2010, ISI-KDD '10.
[18] Raúl Sierra-Alcocer,et al. Exploratory analysis of the interrelations between co-located boolean spatial features using network graphs , 2012, Int. J. Geogr. Inf. Sci..
[19] Travis C. Pratt,et al. Assessing Macro-Level Predictors and Theories of Crime: A Meta-Analysis , 2005, Crime and Justice.
[20] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[21] Ulrich Güntzer,et al. Algorithms for association rule mining — a general survey and comparison , 2000, SKDD.
[22] Ronald V. Clarke,et al. The Reasoning Criminal: Rational Choice Perspectives on Offending , 2017 .
[23] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[24] Jin Soung Yoo,et al. Mining spatial colocation patterns: a different framework , 2011, Data Mining and Knowledge Discovery.
[25] Chetan G. Wadhai,et al. Crime Analysis Using K-Means Clustering , 2018 .
[26] Shashi Shekhar,et al. A neighborhood graph based approach to regional co-location pattern discovery: a summary of results , 2011, GIS.
[27] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..
[28] Wim Bernasco,et al. Modeling Micro-Level Crime Location Choice: Application of the Discrete Choice Framework to Crime at Places , 2010 .
[29] Ickjai Lee,et al. Mining co-distribution patterns for large crime datasets , 2012, Expert Syst. Appl..
[30] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[31] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[32] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[33] Hui Xiong,et al. Discovering colocation patterns from spatial data sets: a general approach , 2004, IEEE Transactions on Knowledge and Data Engineering.
[34] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[35] Jiawei Han,et al. Discovery of Spatial Association Rules in Geographic Information Databases , 1995, SSD.
[36] S Lin,et al. Outlier Detection And Data Association For Data Mining Criminal Incidents , 2002 .
[37] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[38] Abdolreza Mirzaei,et al. Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..
[39] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD '00.
[40] C. Whelan,et al. Social network analysis as a tool for criminal intelligence: understanding its potential from the perspectives of intelligence analysts , 2017, Trends in Organized Crime.
[41] R. Vohra,et al. City Crime Profiling Using Cluster Analysis , 2014 .
[42] John E. Eck,et al. Special Mapping Crime : Understanding Hot Spots 0 5 , 2005 .
[43] Hao Huang,et al. Mining regional co-location patterns with kNNG , 2013, Journal of Intelligent Information Systems.