A Novel Ontology Construction and Reasoning Approach Based on the Case Investigation

The big data has become a key component for intelligent systems and it is very important about data mining and cognitive reasoning in the field of criminal data analysis. Modeling of investigation knowledge is very important to realize the semantic retrieval, knowledge discovery, information push and classification for case data. Ontology modeling combined with the characteristics of the case in the investigation process, a method of ontology construction based on investigation knowledge is proposed in this paper. It builds an organization system of the investigation process at the first, which is described in stages by collecting terminology. Then the ontology of investigation knowledge is constructed. In addition, an instance is added for verification to describe the investigation process in detail. The method has a good advantage of describing the detection process quickly and integrate knowledge according to different investigation stages, formulating a standardized organization mode and providing standardized knowledge assistance in the investigation process.

[1]  Jugal Kalita,et al.  A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking , 2019 .

[2]  Wanlei Zhou,et al.  E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.

[3]  Henryk Krawczyk,et al.  Ontology Oriented Threat Detection System (OOTDS) , 2009, 2009 Fourth International Conference on Dependability of Computer Systems.

[4]  Mohamad Khalil,et al.  Towards a Legal Rule-Based System Grounded on the Integration of Criminal Domain Ontology and Rules , 2017, KES.

[5]  Sukhjit Singh Sehra,et al.  Analyzing and Displaying of Crime Hotspots using Fuzzy Mapping Method , 2014 .

[6]  Naixue Xiong,et al.  TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things , 2019, IEEE Access.

[7]  Li Ma,et al.  Research on Construction and SWRL Reasoning of Ontology of Maize Diseases , 2012, CCTA.

[8]  Christopher M. Gifford,et al.  Fuzzy association rule mining for community crime pattern discovery , 2010, ISI-KDD '10.

[9]  Rose F. Gamble,et al.  Developing a platform to evaluate and assess the security of wearable devices , 2019, Digit. Commun. Networks.

[10]  Jie Ma,et al.  Semantic Information Extraction of Video Based on Ontology and Inference , 2007, International Conference on Semantic Computing (ICSC 2007).

[11]  Yisheng Dong,et al.  Formal Approach and Automated Tool for Translating ER Schemata into OWL Ontologies , 2004, PAKDD.

[12]  Ian Horrocks,et al.  The Even More Irresistible SROIQ , 2006, KR.

[13]  Liu Qiao,et al.  Semantical Symbol Mapping Embedding Learning Algorithm for Knowledge Graph , 2018 .

[14]  Marko Grobelnik,et al.  A SURVEY OF ONTOLOGY EVALUATION TECHNIQUES , 2005 .

[15]  Ravi Shankar,et al.  Modeling brain and behavior of a terrorist through fuzzy logic and ontology , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.

[16]  Lao Songyang Video Semantic Content Analysis Based on Ontology , 2009 .

[17]  Chen Jian-yun Video Semantic Content Analysis Using Extensions to OWL , 2010 .

[18]  Timothy W. Finin,et al.  CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[19]  Riichiro Mizoguchi,et al.  Distributed reasoning with ontologies and rules in order-sorted logic programming , 2009, J. Web Semant..

[20]  Latif Ullah Khan,et al.  Visible light communication: Applications, architecture, standardization and research challenges , 2017, Digit. Commun. Networks.

[21]  Hyuk-Chul Kwon,et al.  Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.

[22]  Yao Zhang,et al.  A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks , 2018, J. Netw. Comput. Appl..

[23]  Raymond Y. K. Lau,et al.  A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media , 2014, IEEE Computational Intelligence Magazine.