-
2
-
-
33846607497
-
Data mining at the West Midlands police: A study of bogus official burglaries
-
ES99, London: Springer-Verlag
-
Adderley, R., & Musgrove, P. (1999). Data mining at the West Midlands police: A study of bogus official burglaries. In Proceedings of BCS Special Group Expert Systems, ES99 (pp. 191-203). London: Springer-Verlag.
-
(1999)
Proceedings of BCS Special Group Expert Systems
, pp. 191-203
-
-
Adderley, R.1
Musgrove, P.2
-
3
-
-
0027621699
-
Mining association rules between items in large databases
-
Washington, DC
-
Agrawal, R., Imielinski, T., & Swami, A. (1993). Mining association rules between items in large databases. In Proceedings of the International Conference on Management of Data (ACM SIGMOD'93) (pp. 207-216). Washington, DC.
-
(1993)
Proceedings of the International Conference On Management of Data (ACM SIGMOD'93)
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
4
-
-
0003569413
-
-
Technical report. University of Helsinki, Department of Computer Science
-
Ahonen, H., Heinonen, O., Klemettinen, M., & Verkamo, A. (1997). Applying data mining techniques in text analysis. Technical report. University of Helsinki, Department of Computer Science.
-
(1997)
Applying Data Mining Techniques In Text Analysis
-
-
Ahonen, H.1
Heinonen, O.2
Klemettinen, M.3
Verkamo, A.4
-
5
-
-
34248666659
-
Modelling insider behavior using multi-entity bayesian networks
-
AlGhamdi, G., Wright, E., Barbara, D., & Chang, K. (2005). Modelling insider behavior using multi-entity bayesian networks. In Proceedings of the 10th Annual Command and Control Research and Technology Symposium.
-
(2005)
Proceedings of the 10th Annual Command and Control Research and Technology Symposium
-
-
Alghamdi, G.1
Wright, E.2
Barbara, D.3
Chang, K.4
-
7
-
-
0035402082
-
Using clustering to discover the preferences of computer criminals
-
Brown, D., & Gunderson, L. (2001). Using clustering to discover the preferences of computer criminals. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Human, 31(4), 311-318.
-
(2001)
IEEE Transactions On Systems, Man and Cybernetics, Part A: Systems and Human
, vol.31
, Issue.4
, pp. 311-318
-
-
Brown, D.1
Gunderson, L.2
-
8
-
-
0004042547
-
-
Retrieved August 10, 2003, from
-
Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., et al. (2003). CRISP-DM 1.0 step-by-step data mining guide. Retrieved August 10, 2003, from http://www.crisp-dm.org/
-
(2003)
CRISP-DM 1.0 Step-by-step Data Mining Guide
-
-
Chapman, P.1
Clinton, J.2
Kerber, R.3
Khabaza, T.4
Reinartz, T.5
Shearer, C.6
-
9
-
-
1942475668
-
Extracting meaningful entities from police narrative reports
-
Los Angeles, California
-
Chau, M., Xu, J., & Chen, H. (2002). Extracting meaningful entities from police narrative reports. In Proceedings of the National Conference for Digital Government Research (pp. 271-275). Los Angeles, California.
-
(2002)
Proceedings of the National Conference For Digital Government Research
, pp. 271-275
-
-
Chau, M.1
Xu, J.2
Chen, H.3
-
10
-
-
1942500388
-
Crime data mining: A general framework and some examples
-
Chen, H., Chung, W., Xu, J., Wang, G., Qin, Y., & Chau, M. (2004). Crime data mining: A general framework and some examples. IEEE Computer, 37(4), 50-56.
-
(2004)
IEEE Computer
, vol.37
, Issue.4
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.3
Wang, G.4
Qin, Y.5
Chau, M.6
-
13
-
-
2942653436
-
Integration of text and data mining
-
In A. Zanasi, C. A. Brebbia, N.F.F. Ebecken, & P. Melli (Eds.), UK: WIT
-
Drewes, B. (2002). Integration of text and data mining. In A. Zanasi, C. A. Brebbia, N.F.F. Ebecken, & P. Melli (Eds.), Data mining III (pp. 288-298). UK: WIT.
-
(2002)
Data Mining III
, pp. 288-298
-
-
Drewes, B.1
-
14
-
-
80052700929
-
-
(n.d.), Retrieved May 21, 2005, from
-
Eagle, N., & Pentland, A. (n.d.). Reality mining: Sensing complex social systems. Retrieved May 21, 2005, from http://reality.media.mit.edu/pdfs/realitymining.pdf
-
Reality Mining: Sensing Complex Social Systems
-
-
Eagle, N.1
Pentland, A.2
-
15
-
-
0013113240
-
Adaptive fraud detection
-
Fawcett, T., & Provost, F. (1997). Adaptive fraud detection. Data Mining and Knowledge Discovery, 1(3), 291-316.
-
(1997)
Data Mining and Knowledge Discovery
, vol.1
, Issue.3
, pp. 291-316
-
-
Fawcett, T.1
Provost, F.2
-
16
-
-
85130734369
-
Knowledge discovery and data mining: Towards a unifying framework
-
Portland, OR: AAI Press
-
Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). Knowledge discovery and data mining: Towards a unifying framework. In Proceedings of the 2nd International Conference of Knowledge Discovery and Data Mining (KDD96) (pp. 24-26). Portland, OR: AAI Press.
-
(1996)
Proceedings of the 2nd International Conference of Knowledge Discovery and Data Mining (KDD96)
, pp. 24-26
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
17
-
-
1542583403
-
A lexical database of English: The mother of all Word Nets
-
(Eds.), Dordrecht, Holland, Kluwer
-
Fellbaum, C., & Vossen, P. (Eds.). (1998). A lexical database of English: The mother of all Word Nets. Special issue of computers and the humanities (pp. 209-220). Dordrecht, Holland: Kluwer.
-
(1998)
Special Issue of Computers and The Humanities
, pp. 209-220
-
-
Fellbaum, C.1
Vossen, P.2
-
18
-
-
84900048949
-
Predicate logic-based assembly of situation-specific
-
Retrieved February 26, 2005, from
-
Fung, F. (2004). Predicate logic-based assembly of situation-specific. Navy STTR FY2004. Retrieved February 26, 2005, from http://www.navysbir.com/04/65.htm
-
(2004)
Navy STTR FY2004
-
-
Fung, F.1
-
21
-
-
0036500849
-
Using coplink to analyse criminal-justice data
-
Hauck, R., Atabakhsh, H., Angvasith, P., Gupta, H., & Chen, H. (2002). Using coplink to analyse criminal-justice data. IEEE Computer, 35(3), 30-37.
-
(2002)
IEEE Computer
, vol.35
, Issue.3
, pp. 30-37
-
-
Hauck, R.1
Atabakhsh, H.2
Angvasith, P.3
Gupta, H.4
Chen, H.5
-
24
-
-
27544439470
-
-
George Mason University Homeland Security and Military Transformation Laboratory. Retrieved May 12, 2005, from
-
Hudson, L., Ware, B., Mahoney, S., & Laskey, K. (2005). An application of bayesian networks to anti-terrorism risk management for military planners. George Mason University Homeland Security and Military Transformation Laboratory. Retrieved May 12, 2005, from http://ite.gmu.edu/~klaskey/papers/Antiterrorism.pdf
-
(2005)
An Application of Bayesian Networks to Anti-terrorism Risk Management For Military Planners
-
-
Hudson, L.1
Ware, B.2
Mahoney, S.3
Laskey, K.4
-
25
-
-
0029344964
-
Applying agent technology
-
Jennings, N., & Wooldridge, M. (1995). Applying agent technology. Applied Artificial Intelligence, 9(4), 351-361.
-
(1995)
Applied Artificial Intelligence
, vol.9
, Issue.4
, pp. 351-361
-
-
Jennings, N.1
Wooldridge, M.2
-
27
-
-
33747496867
-
-
Retrieved May 11, 2005, from
-
Laskey, K. (2005). First-order bayesian logic. Retrieved May 11, 2005, from http://ite.gmu.edu/~klaskey/papers/Laskey_MEBN_Logic.pdf
-
(2005)
First-order Bayesian Logic
-
-
Laskey, K.1
-
28
-
-
84883532163
-
-
BRIMS 04. Retrieved January 2005, from
-
Laskey, K., AlGhamdi, G., Wang, X., Barbara, D., Shackelford, T., Wright, E., et al. (2004). Detecting threatening behaviour using bayesian networks. BRIMS 04. Retrieved January 2005, from http://ite.gmu.edu/~klaskey/papers/BRIMS04_Insider%20Threat.pdf
-
(2004)
Detecting Threatening Behaviour Using Bayesian Networks
-
-
Laskey, K.1
Alghamdi, G.2
Wang, X.3
Barbara, D.4
Shackelford, T.5
Wright, E.6
-
29
-
-
0004102297
-
Concept-based knowledge discovery in text extracted from the Web
-
Loh, S., Wives, I., & Oliveira, J. P. d. (2000). Concept-based knowledge discovery in text extracted from the Web. ACM SIGKDD Explorations Newsletter, 2(1), 29-39.
-
(2000)
ACM SIGKDD Explorations Newsletter
, vol.2
, Issue.1
, pp. 29-39
-
-
Loh, S.1
Wives, I.2
Oliveira, J.P.3
-
30
-
-
84900261102
-
-
Retrieved May 5, 2005, from
-
Marakami, A., Nagao, K., & Takeda, K. (2001). Discussion mining: Knowledge discovery from online discussion records. Retrieved May 5, 2005, from http://hal2001.itakura.toyo.ac.jp/~chiekon/nlpxml/murakami.pdf
-
(2001)
Discussion Mining: Knowledge Discovery From Online Discussion Records
-
-
Marakami, A.1
Nagao, K.2
Takeda, K.3
-
32
-
-
0141487837
-
-
Monograph 28, Retrieved July 7, 2004, from
-
Organised Crime in South Africa. (1998). Monograph 28, Retrieved July 7, 2004, from http://www.iss.org.za/Pubs/Monographs/No28/Definitions.html
-
(1998)
Organised Crime In South Africa
-
-
-
33
-
-
0003891710
-
-
Retrieved July 7, 2004, from
-
Patterns of Global Terrorism-2003 (2004). Retrieved July 7, 2004, from http://www.globalsecurity.org/
-
(2004)
Patterns of Global Terrorism-2003
-
-
-
34
-
-
4243116398
-
Countering terrorism through information technology
-
Popp, R., Armour, T., Senator, T., & Numrych, K. (2004). Countering terrorism through information technology. ACM, 47(3), 36-43.
-
(2004)
ACM
, vol.47
, Issue.3
, pp. 36-43
-
-
Popp, R.1
Armour, T.2
Senator, T.3
Numrych, K.4
-
37
-
-
84910032411
-
Tracker: A framework to support reducing rework through decision management
-
April 23-26, Angers, France
-
Rayson, P., Sharp, B., Alderson, A., Cartmell, J., Chibelushi, C., Clarke, R., et al. (2003, April 23-26). Tracker: A framework to support reducing rework through decision management. In Proceedings of 5th International Conference on Enterprise Information Systems ICEIS2003 (pp. 344-351). Angers, France.
-
(2003)
Proceedings of 5th International Conference On Enterprise Information Systems ICEIS2003
, pp. 344-351
-
-
Rayson, P.1
Sharp, B.2
Alderson, A.3
Cartmell, J.4
Chibelushi, C.5
Clarke, R.6
-
42
-
-
84900090358
-
-
Retrieved February 2, 2005, from
-
WordStat 4.0. (2004). Retrieved February 2, 2005, from http://www.kovcomp.co.uk/wordstart/
-
(2004)
WordStat 4.0
-
-
|