-
1
-
-
84866640011
-
Big data. The management revolution
-
McAfee A, Brynjolfsson E, Davenport TH, Patil DJ, Barton D. Big data. The management revolution. Harvard Bus Rev 2012, 90:61–67.
-
(2012)
Harvard Bus Rev
, vol.90
, pp. 61-67
-
-
McAfee, A.1
Brynjolfsson, E.2
Davenport, T.H.3
Patil, D.J.4
Barton, D.5
-
2
-
-
20344376408
-
Criminal network analysis and visualization
-
Xu J, Chen H. Criminal network analysis and visualization. Commun ACM 2005, 48:100–107.
-
(2005)
Commun ACM
, vol.48
, pp. 100-107
-
-
Xu, J.1
Chen, H.2
-
4
-
-
84875482216
-
Big data Issues and challenges moving forward
-
IEEE, 17 January,, –.
-
Kaisler S, Armour F, Espinosa JA, Money W. Big data: Issues and challenges moving forward. In: System sciences (HICSS), 2013 46th Hawaii International Conference, IEEE, 17 January, 2013, 995–1004.
-
(2013)
In, System sciences (HICSS), 2013 46th Hawaii International Conference
, pp. 995-1004
-
-
Kaisler, S.1
Armour, F.2
Espinosa, J.A.3
Money, W.4
-
5
-
-
80052897846
-
Introduction to social network analysis (SNA) as an investigative tool
-
Van der Hulst RC. Introduction to social network analysis (SNA) as an investigative tool. Trends Organ Crime 2009, 12:101–121.
-
(2009)
Trends Organ Crime
, vol.12
, pp. 101-121
-
-
Van der Hulst, R.C.1
-
6
-
-
84884558934
-
Social-network-sourced big data analytics
-
Tan W, Blake MB, Saleh I, Dustdar S. Social-network-sourced big data analytics. IEEE Internet Comput 2013, 17:62–69.
-
(2013)
IEEE Internet Comput
, vol.17
, pp. 62-69
-
-
Tan, W.1
Blake, M.B.2
Saleh, I.3
Dustdar, S.4
-
9
-
-
33846624589
-
Decision support systems for police: lessons from the application of data mining techniques to “soft” forensic evidence
-
Oatley G, Ewart B, Zeleznikow J. Decision support systems for police: lessons from the application of data mining techniques to “soft” forensic evidence. Artif Intell Law 2006, 14:35–100.
-
(2006)
Artif Intell Law
, vol.14
, pp. 35-100
-
-
Oatley, G.1
Ewart, B.2
Zeleznikow, J.3
-
10
-
-
13844262010
-
Link mining: a new data mining challenge
-
Getoor L. Link mining: a new data mining challenge. ACM SIGKDD Explor Newslett 2003, 5:84–89.
-
(2003)
ACM SIGKDD Explor Newslett
, vol.5
, pp. 84-89
-
-
Getoor, L.1
-
11
-
-
34247141976
-
Automated criminal link analysis based on domain knowledge
-
Schroeder J, Xu J, Chen H, Chau M. Automated criminal link analysis based on domain knowledge. J Am Soc Inf Sci Technol 2007, 58:842–855.
-
(2007)
J Am Soc Inf Sci Technol
, vol.58
, pp. 842-855
-
-
Schroeder, J.1
Xu, J.2
Chen, H.3
Chau, M.4
-
12
-
-
84892455410
-
Predicting tie strength with social media
-
ACM, 4 April,, –.
-
Gilbert E, Karahalios K. Predicting tie strength with social media. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, ACM, 4 April, 2009, 211–220.
-
(2009)
In, Proceedings of the SIGCHI conference on Human Factors in Computing Systems
, pp. 211-220
-
-
Gilbert, E.1
Karahalios, K.2
-
13
-
-
0242465495
-
The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
-
Klerks P. The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 2001, 24:53–65.
-
(2001)
Connections
, vol.24
, pp. 53-65
-
-
Klerks, P.1
-
14
-
-
34248386387
-
Crimelink explorer Using domain knowledge to facilitate automated crime association analysis
-
2 June,, –. Berlin, Heidelberg Springer.
-
Schroeder J, Xu J, Chen H. Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis. In: International Conference on Intelligence and Security Informatics, 2 June, 2003, 168–180. Berlin, Heidelberg: Springer.
-
(2003)
In, International Conference on Intelligence and Security Informatics
, pp. 168-180
-
-
Schroeder, J.1
Xu, J.2
Chen, H.3
-
15
-
-
33745899006
-
Tracing the event evolution of terror attacks from on-line news
-
23 May,, –. Berlin, Heidelberg Springer.
-
Yang CC, Shi X, Wei CP. Tracing the event evolution of terror attacks from on-line news. In: International Conference on Intelligence and Security Informatics, 23 May, 2006, 343–354. Berlin, Heidelberg: Springer.
-
(2006)
In, International Conference on Intelligence and Security Informatics
, pp. 343-354
-
-
Yang, C.C.1
Shi, X.2
Wei, C.P.3
-
16
-
-
79951581922
-
Structural investigation of supply networks: a social network analysis approach
-
Kim Y, Choi TY, Yan T, Dooley K. Structural investigation of supply networks: a social network analysis approach. J Oper Manage 2011, 29:194–211.
-
(2011)
J Oper Manage
, vol.29
, pp. 194-211
-
-
Kim, Y.1
Choi, T.Y.2
Yan, T.3
Dooley, K.4
-
17
-
-
84155181035
-
Topic oriented community detection through social objects and link analysis in social networks
-
Zhao Z, Feng S, Wang Q, Huang JZ, Williams GJ, Fan J. Topic oriented community detection through social objects and link analysis in social networks. Knowl Syst 2012, 26:164–173.
-
(2012)
Knowl Syst
, vol.26
, pp. 164-173
-
-
Zhao, Z.1
Feng, S.2
Wang, Q.3
Huang, J.Z.4
Williams, G.J.5
Fan, J.6
-
19
-
-
77955458634
-
Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service
-
Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordónez F. Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 2010, 40:267–290.
-
(2010)
Interfaces
, vol.40
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Tambe, M.6
Ordónez, F.7
-
21
-
-
34548058199
-
Protecting against biological terrorism: statistical issues in electronic biosurveillance
-
Fricker RD Jr, Rolka H. Protecting against biological terrorism: statistical issues in electronic biosurveillance. Chance 2006, 19:4–14.
-
(2006)
Chance
, vol.19
, pp. 4-14
-
-
Fricker, R.D.1
Rolka, H.2
-
22
-
-
0034885145
-
Intelligent software agents for forest fire prevention and fighting
-
Jaber A, Guarnieri F, Wybo JL. Intelligent software agents for forest fire prevention and fighting. Safety Sci 2001, 39:3–17.
-
(2001)
Safety Sci
, vol.39
, pp. 3-17
-
-
Jaber, A.1
Guarnieri, F.2
Wybo, J.L.3
-
23
-
-
84912044881
-
Forensic investigation of social networking applications
-
Taylor M, Haggerty J, Gresty D, Almond P, Berry T. Forensic investigation of social networking applications. Netw Security 2014, 2014:9–16.
-
(2014)
Netw Security
, vol.2014
, pp. 9-16
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Almond, P.4
Berry, T.5
-
25
-
-
0442322890
-
Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations
-
Lin C, Hu PJ, Chen H. Technology implementation management in law enforcement: COPLINK system usability and user acceptance evaluations. Soc Sci Comput Rev 2004, 22:24–36.
-
(2004)
Soc Sci Comput Rev
, vol.22
, pp. 24-36
-
-
Lin, C.1
Hu, P.J.2
Chen, H.3
-
26
-
-
70449107490
-
AGENTFLY towards multi-agent technology in free flight air traffic control
-
–. Basel Birkhäuser.
-
Šišlák D, Pěchouček M, Volf P, Pavlíček D, Samek J, Mařík V, Losiewicz P. AGENTFLY: towards multi-agent technology in free flight air traffic control. In: Defence Industry Applications of Autonomous Agents and Multi-Agent Systems, 2007, 73–96. Basel: Birkhäuser.
-
(2007)
In, Defence Industry Applications of Autonomous Agents and Multi-Agent Systems
, pp. 73-96
-
-
Šišlák, D.1
Pěchouček, M.2
Volf, P.3
Pavlíček, D.4
Samek, J.5
Mařík, V.6
Losiewicz, P.7
-
27
-
-
22044454357
-
A solution to open standard of PKI
-
13 July,, –. Berlin, Heidelberg Springer.
-
He Q, Sycara K, Su Z. A solution to open standard of PKI. In: Australasian Conference on Information Security and Privacy, 13 July, 1998, 99–110. Berlin, Heidelberg: Springer.
-
(1998)
In, Australasian Conference on Information Security and Privacy
, pp. 99-110
-
-
He, Q.1
Sycara, K.2
Su, Z.3
-
28
-
-
33745590283
-
A multi-agent based system for intrusion detection
-
Hegazy IM, Al-Arif T, Fayed ZT, Faheem HM. A multi-agent based system for intrusion detection. IEEE Potentials 2003, 22:28–31.
-
(2003)
IEEE Potentials
, vol.22
, pp. 28-31
-
-
Hegazy, I.M.1
Al-Arif, T.2
Fayed, Z.T.3
Faheem, H.M.4
-
29
-
-
85169834575
-
Restructuring transactional data for link analysis in the FinCEN AI system
-
January, –.
-
Goldberg HG, Wong RW. Restructuring transactional data for link analysis in the FinCEN AI system. In: AAAI Fall Symposium, January 1998, 38–46.
-
(1998)
In, AAAI Fall Symposium
, pp. 38-46
-
-
Goldberg, H.G.1
Wong, R.W.2
-
30
-
-
84873127711
-
-
eds., Berlin, Germany, Springer Science & Business Media
-
Aggarwal CC, Zhai C, eds. Mining Text Data. Berlin, Germany: Springer Science & Business Media; 2012.
-
(2012)
Mining Text Data
-
-
Aggarwal, C.C.1
Zhai, C.2
-
32
-
-
79959297930
-
Towards discovering criminal communities from textual data
-
ACM, 21 March,, –.
-
Al-Zaidy R, Fung B, Youssef AM. Towards discovering criminal communities from textual data. In: Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, 21 March, 2011, 172–177.
-
(2011)
In, Proceedings of the 2011 ACM Symposium on Applied Computing
, pp. 172-177
-
-
Al-Zaidy, R.1
Fung, B.2
Youssef, A.M.3
-
33
-
-
84862828907
-
Mining term networks from text collections for crime investigation
-
Tseng YH, Ho ZP, Yang KS, Chen CC. Mining term networks from text collections for crime investigation. Expert Syst Appl 2012, 39:10082–10090.
-
(2012)
Expert Syst Appl
, vol.39
, pp. 10082-10090
-
-
Tseng, Y.H.1
Ho, Z.P.2
Yang, K.S.3
Chen, C.C.4
-
34
-
-
79954572852
-
Text mining with emergent self organizing maps and multi-dimensional scaling: a comparative study on domestic violence
-
Poelmans J, Van Hulle MM, Viaene S, Elzinga P, Dedene G. Text mining with emergent self organizing maps and multi-dimensional scaling: a comparative study on domestic violence. Appl Soft Comput 2011, 11:3870–3876.
-
(2011)
Appl Soft Comput
, vol.11
, pp. 3870-3876
-
-
Poelmans, J.1
Van Hulle, M.M.2
Viaene, S.3
Elzinga, P.4
Dedene, G.5
-
35
-
-
4544372935
-
Automatic information extraction from documents A tool for intelligence and law enforcement analysts
-
23 October,, Menlo Park, CA AAAI Press.
-
Lee R. Automatic information extraction from documents: A tool for intelligence and law enforcement analysts. In: Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis, 23 October, 1998. Menlo Park, CA: AAAI Press.
-
(1998)
In, Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis
-
-
Lee, R.1
-
36
-
-
79952437990
-
An investigation of data and text mining methods for real world deception detection
-
Fuller CM, Biros DP, Delen D. An investigation of data and text mining methods for real world deception detection. Expert Syst Appl 2011, 38:8392–8398.
-
(2011)
Expert Syst Appl
, vol.38
, pp. 8392-8398
-
-
Fuller, C.M.1
Biros, D.P.2
Delen, D.3
-
37
-
-
84890728450
-
Detection of harassment on web 2.0
-
Yin D, Xue Z, Hong L, Davison BD, Kontostathis A, Edwards L. Detection of harassment on web 2.0. Proc Content Anal Web 2009, 2:1–7.
-
(2009)
Proc Content Anal Web
, vol.2
, pp. 1-7
-
-
Yin, D.1
Xue, Z.2
Hong, L.3
Davison, B.D.4
Kontostathis, A.5
Edwards, L.6
-
38
-
-
85021213064
-
-
Using Perilog to explore “Decision Making at NASA”.
-
McGreevy MW. Using Perilog to explore “Decision Making at NASA”.
-
-
-
McGreevy, M.W.1
-
40
-
-
79957758280
-
Personal development under market conditions: NLP and the emergence of an ethics of sensitivity based on the idea of the hidden potential of the individual
-
Bovbjerg KM. Personal development under market conditions: NLP and the emergence of an ethics of sensitivity based on the idea of the hidden potential of the individual. J Contemp Relig 2011, 26:189–205.
-
(2011)
J Contemp Relig
, vol.26
, pp. 189-205
-
-
Bovbjerg, K.M.1
-
41
-
-
84871900799
-
A comprehensive foundation
-
Haykin S, Network N. A comprehensive foundation. Neural Netw 2004, 2:41.
-
(2004)
Neural Netw
, vol.2
, pp. 41
-
-
Haykin, S.1
Network, N.2
-
42
-
-
1942500388
-
Crime data mining: a general framework and some examples
-
Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M. Crime data mining: a general framework and some examples. Computer 2004, 37:50–56.
-
(2004)
Computer
, vol.37
, pp. 50-56
-
-
Chen, H.1
Chung, W.2
Xu, J.J.3
Wang, G.4
Qin, Y.5
Chau, M.6
-
43
-
-
3142618406
-
A neural network applied to criminal psychological profiling: an Italian initiative
-
Strano M. A neural network applied to criminal psychological profiling: an Italian initiative. Int J Offender Ther Comp Criminol 2004, 48:495–503.
-
(2004)
Int J Offender Ther Comp Criminol
, vol.48
, pp. 495-503
-
-
Strano, M.1
-
44
-
-
2942671168
-
Crime data mining an overview and case studies
-
18 May
-
Chen H, Chung W, Qin Y, Chau M, Xu JJ, Wang G, Zheng R, Atabakhsh H. Crime data mining: an overview and case studies. In: Proceedings of the 2003 Annual National Conference on Digital Government Research, Digital Government Society of North America, 18 May, 2003, 1–5.
-
(2003)
In, Proceedings of the 2003 Annual National Conference on Digital Government Research, Digital Government Society of North America
, pp. 1-5
-
-
Chen, H.1
Chung, W.2
Qin, Y.3
Chau, M.4
Xu, J.J.5
Wang, G.6
Zheng, R.7
Atabakhsh, H.8
-
45
-
-
4544224894
-
Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks
-
Xu JJ, Chen H. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decis Support Syst 2004, 38:473–487.
-
(2004)
Decis Support Syst
, vol.38
, pp. 473-487
-
-
Xu, J.J.1
Chen, H.2
-
46
-
-
0032205202
-
AICAMS: artificial intelligence crime analysis and management system
-
Brahan JW, Lam KP, Chan H, Leung W. AICAMS: artificial intelligence crime analysis and management system. Knowl Syst 1998, 11:355–361.
-
(1998)
Knowl Syst
, vol.11
, pp. 355-361
-
-
Brahan, J.W.1
Lam, K.P.2
Chan, H.3
Leung, W.4
-
47
-
-
84880217681
-
Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach
-
Helbich M, Hagenauer J, Leitner M, Edwards R. Exploration of unstructured narrative crime reports: an unsupervised neural network and point pattern analysis approach. Cartogr Geogr Inf Sci 2013, 40:326–336.
-
(2013)
Cartogr Geogr Inf Sci
, vol.40
, pp. 326-336
-
-
Helbich, M.1
Hagenauer, J.2
Leitner, M.3
Edwards, R.4
-
48
-
-
0003692623
-
Handbook of Neural Computing Applications
-
Academic Press
-
Maren AJ, Harston CT. Pap RM. Handbook of Neural Computing Applications: Academic Press; 2014.
-
(2014)
Pap RM
-
-
Maren, A.J.1
Harston, C.T.2
-
50
-
-
18844436266
-
Classification system for serial criminal patterns
-
Dahbur K, Muscarello T. Classification system for serial criminal patterns. Artif Intell Law 2003, 11:251–269.
-
(2003)
Artif Intell Law
, vol.11
, pp. 251-269
-
-
Dahbur, K.1
Muscarello, T.2
-
51
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
IEEE 14 June,, –).
-
Linda O, Vollmer T, Manic M. Neural network based intrusion detection system for critical infrastructures. In: Neural Networks. IJCNN 2009. International Joint Conference, IEEE 14 June, 2009, 1827–1834).
-
(2009)
In, Neural Networks. IJCNN 2009. International Joint Conference
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
55
-
-
0003584577
-
-
Upper Saddle River, NJ, Prentice Hall
-
Russell SJ, Norvig P, Canny JF, Malik JM, Edwards DD. Artificial Intelligence: A Modern Approach, vol. 2. Upper Saddle River, NJ: Prentice Hall; 2003.
-
(2003)
Artificial Intelligence: A Modern Approach
, vol.2
-
-
Russell, S.J.1
Norvig, P.2
Canny, J.F.3
Malik, J.M.4
Edwards, D.D.5
-
56
-
-
51149091221
-
Constructing Bayesian networks for criminal profiling from limited data
-
Baumgartner K, Ferrari S, Palermo G. Constructing Bayesian networks for criminal profiling from limited data. Knowl Syst 2008, 21:563–572.
-
(2008)
Knowl Syst
, vol.21
, pp. 563-572
-
-
Baumgartner, K.1
Ferrari, S.2
Palermo, G.3
-
57
-
-
54349088329
-
Computational forensics an overview
-
7 August, Berlin, Heidelberg Springer.
-
Franke K, Srihari SN. Computational forensics: an overview. In: International Workshop on Computational Forensics, 7 August 2008, 1–10. Berlin, Heidelberg: Springer.
-
(2008)
In, International Workshop on Computational Forensics
, pp. 1-10
-
-
Franke, K.1
Srihari, S.N.2
-
58
-
-
34250782117
-
Crime pattern detection using data mining
-
WI-IAT 2006 Workshops, IEEE, December, –.
-
Nath SV. Crime pattern detection using data mining. In: 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops, WI-IAT 2006 Workshops, IEEE, December 2006, 41–44.
-
(2006)
In, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops
, pp. 41-44
-
-
Nath, S.V.1
-
59
-
-
84886580564
-
Learning to detect patterns of crime
-
23 September,, –. Berlin, Heidelberg Springer.
-
Wang T, Rudin C, Wagner D, Sevieri R. Learning to detect patterns of crime. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 23 September, 2013, 515–530. Berlin, Heidelberg: Springer.
-
(2013)
In, Joint European Conference on Machine Learning and Knowledge Discovery in Databases
, pp. 515-530
-
-
Wang, T.1
Rudin, C.2
Wagner, D.3
Sevieri, R.4
-
60
-
-
50649118132
-
Crime information extraction from police and witness narrative reports
-
In, 2008 , IEEE, 12 May,, –.
-
Ku CH, Iriberri A, Leroy G. Crime information extraction from police and witness narrative reports. In: 2008 I.E. Conference on Technologies for Homeland Security, IEEE, 12 May, 2008, 193–198.
-
(2008)
I.E. Conference on Technologies for Homeland Security
, pp. 193-198
-
-
Ku, C.H.1
Iriberri, A.2
Leroy, G.3
-
61
-
-
79951507394
-
Fuzzy methods for forensic data analysis
-
IEEE, 7 December,, –.
-
Stoffel K, Cotofrei P, Han D. Fuzzy methods for forensic data analysis. In: International Conference of Soft Computing and Pattern Recognition (SoCPaR), IEEE, 7 December, 2010, 23–28.
-
(2010)
In, International Conference of Soft Computing and Pattern Recognition (SoCPaR)
, pp. 23-28
-
-
Stoffel, K.1
Cotofrei, P.2
Han, D.3
-
62
-
-
84987704255
-
Scalable machine-learning algorithms for big data analytics: a comprehensive review
-
Gupta P, Sharma A, Jindal R. Scalable machine-learning algorithms for big data analytics: a comprehensive review. WIREs Data Min Knowl Discov 2016, 6:194–214.
-
(2016)
WIREs Data Min Knowl Discov
, vol.6
, pp. 194-214
-
-
Gupta, P.1
Sharma, A.2
Jindal, R.3
-
63
-
-
31044451593
-
New machine learning methods demonstrate the existence of a human stylome
-
Van Halteren H, Baayen H, Tweedie F, Haverkort M, Neijt A. New machine learning methods demonstrate the existence of a human stylome. J Quant Linguist 2005, 12:65–77.
-
(2005)
J Quant Linguist
, vol.12
, pp. 65-77
-
-
Van Halteren, H.1
Baayen, H.2
Tweedie, F.3
Haverkort, M.4
Neijt, A.5
-
64
-
-
1942475668
-
Extracting meaningful entities from police narrative reports
-
Digital Government Society of North America, 19 May
-
Chau M, Xu JJ, Chen H. Extracting meaningful entities from police narrative reports. In: Proceedings of the 2002 Annual National Conference on Digital Government Research, Digital Government Society of North America, 19 May, 2002, 1–5.
-
(2002)
In, Proceedings of the 2002 Annual National Conference on Digital Government Research
, pp. 1-5
-
-
Chau, M.1
Xu, J.J.2
Chen, H.3
-
65
-
-
34748814355
-
Terrorism and crime related weblog social network link, content analysis and information visualization
-
IEEE, 23 May,, May 23, –.
-
Yang CC, Ng TD. Terrorism and crime related weblog social network: link, content analysis and information visualization. In: Intelligence and Security Informatics, IEEE, 23 May, 2007 May 23, 55–58.
-
(2007)
In, Intelligence and Security Informatics
, pp. 55-58
-
-
Yang, C.C.1
Ng, T.D.2
-
66
-
-
70349244712
-
Privacy-preserving social network analysis for criminal investigations
-
ACM, 27 October,, –.
-
Kerschbaum F, Schaad A. Privacy-preserving social network analysis for criminal investigations. In: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, 27 October, 2008, 9–14.
-
(2008)
In, Proceedings of the 7th ACM workshop on Privacy in the electronic society
, pp. 9-14
-
-
Kerschbaum, F.1
Schaad, A.2
-
67
-
-
70449890247
-
Automatic vandalism detection in Wikipedia towards a machine learning approach
-
13 July,, –.
-
Smets K, Goethals B, Verdonk B. Automatic vandalism detection in Wikipedia: towards a machine learning approach. In: AAAI workshop on wikipedia and artificial intelligence: an evolving synergy, 13 July, 2008, 43–48.
-
(2008)
In, AAAI workshop on wikipedia and artificial intelligence an evolving synergy
, pp. 43-48
-
-
Smets, K.1
Goethals, B.2
Verdonk, B.3
-
68
-
-
85166484848
-
-
In, IAAI, 12 August,, –.
-
Goldberg HG, Kirkland JD, Lee D, Shyr P, Thakker D. The NASD Securities Observation, New Analysis and Regulation System (SONAR). In: IAAI, 12 August, 2003, 11–18.
-
(2003)
The NASD Securities Observation, New Analysis and Regulation System (SONAR)
, pp. 11-18
-
-
Goldberg, H.G.1
Kirkland, J.D.2
Lee, D.3
Shyr, P.4
Thakker, D.5
-
69
-
-
56349087921
-
Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering
-
Gao S, Xu D. Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. Expert Syst Appl 2009, 36:1493–1504.
-
(2009)
Expert Syst Appl
, vol.36
, pp. 1493-1504
-
-
Gao, S.1
Xu, D.2
-
70
-
-
85008018414
-
Automatically detecting criminal identity deception: an adaptive detection algorithm
-
Wang GA, Chen H, Xu JJ, Atabakhsh H. Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Trans Syst Man Cybern A Syst Hum 2006, 36:988–999.
-
(2006)
IEEE Trans Syst Man Cybern A Syst Hum
, vol.36
, pp. 988-999
-
-
Wang, G.A.1
Chen, H.2
Xu, J.J.3
Atabakhsh, H.4
-
71
-
-
0002909686
-
Adaptive detection of approximately duplicate database records and the database integration approach to information discovery
-
University of California, San Diego
-
Monge AE. Adaptive detection of approximately duplicate database records and the database integration approach to information discovery. Doctoral dissertation, University of California, San Diego, 1997.
-
(1997)
Doctoral dissertation
-
-
Monge, A.E.1
-
72
-
-
85015336184
-
Intelligent agents for intrusion detection
-
IEEE, 1 September,, –.
-
Helmer GG, Wong JS, Honavar V, Miller L. Intelligent agents for intrusion detection. In: Information Technology Conference, IEEE, 1 September, 1998, 121–124.
-
(1998)
In, Information Technology Conference
, pp. 121-124
-
-
Helmer, G.G.1
Wong, J.S.2
Honavar, V.3
Miller, L.4
-
73
-
-
0000892585
-
Detection of management fraud: a neural network approach
-
Fanning K, Cogger KO, Srivastava R. Detection of management fraud: a neural network approach. ISAFM 1995, 4:113–126.
-
(1995)
ISAFM
, vol.4
, pp. 113-126
-
-
Fanning, K.1
Cogger, K.O.2
Srivastava, R.3
-
74
-
-
33847291246
-
Use of data mining techniques to model crime scene investigator performance
-
Adderley R, Townsley M, Bond J. Use of data mining techniques to model crime scene investigator performance. Knowl Syst 2007, 20:170–176.
-
(2007)
Knowl Syst
, vol.20
, pp. 170-176
-
-
Adderley, R.1
Townsley, M.2
Bond, J.3
-
75
-
-
79951846085
-
Social network analysis of a criminal hacker community
-
Lu Y, Luo X, Polgar M, Cao Y. Social network analysis of a criminal hacker community. J Comput Inform Syst 2010, 51:31–41.
-
(2010)
J Comput Inform Syst
, vol.51
, pp. 31-41
-
-
Lu, Y.1
Luo, X.2
Polgar, M.3
Cao, Y.4
-
76
-
-
0003042363
-
Models of network structure
-
Burt RS. Models of network structure. Annu Rev Sociol 1980, 6:79–141.
-
(1980)
Annu Rev Sociol
, vol.6
, pp. 79-141
-
-
Burt, R.S.1
-
77
-
-
85013040738
-
A framework for criminal network analysis using big data
-
IEEE, 4 November,, –.
-
Pramanik MI, Zhang W, Lau RY, Li C. A framework for criminal network analysis using big data. In: 13th International Conference on e-Business Engineering (ICEBE), IEEE, 4 November, 2016, 17–23.
-
(2016)
In, 13th International Conference on e-Business Engineering (ICEBE)
, pp. 17-23
-
-
Pramanik, M.I.1
Zhang, W.2
Lau, R.Y.3
Li, C.4
-
78
-
-
4243116398
-
Countering terrorism through information technology
-
Popp R, Armour T, Numrych K. Countering terrorism through information technology. Commun ACM 2004, 47:36–43.
-
(2004)
Commun ACM
, vol.47
, pp. 36-43
-
-
Popp, R.1
Armour, T.2
Numrych, K.3
-
80
-
-
85104094046
-
Big data analytics in healthcare: promise and potential
-
Raghupathi W, Raghupathi V. Big data analytics in healthcare: promise and potential. Health Inf Sci Syst 2014, 2:3.
-
(2014)
Health Inf Sci Syst
, vol.2
, pp. 3
-
-
Raghupathi, W.1
Raghupathi, V.2
-
83
-
-
84868325513
-
Hive: a warehousing solution over a map-reduce framework
-
Thusoo A, Sarma JS, Jain N, Shao Z, Chakka P, Anthony S, Liu H, Wyckoff P, Murthy R. Hive: a warehousing solution over a map-reduce framework. Proc VLDB Endowment 2009, 2:1626–1629.
-
(2009)
Proc VLDB Endowment
, vol.2
, pp. 1626-1629
-
-
Thusoo, A.1
Sarma, J.S.2
Jain, N.3
Shao, Z.4
Chakka, P.5
Anthony, S.6
Liu, H.7
Wyckoff, P.8
Murthy, R.9
-
84
-
-
84915782633
-
Big data with cloud computing: an insight on the computing environment, MapReduce, and programming frameworks
-
Fernández A, del Río S, López V, Bawakid A, del Jesús MJ, Benítez JM, Herrera F. Big data with cloud computing: an insight on the computing environment, MapReduce, and programming frameworks. WIREs Data Min Knowl Discov 2014, 4:380–409.
-
(2014)
WIREs Data Min Knowl Discov
, vol.4
, pp. 380-409
-
-
Fernández, A.1
del Río, S.2
López, V.3
Bawakid, A.4
del Jesús, M.J.5
Benítez, J.M.6
Herrera, F.7
-
85
-
-
77955933052
-
Cassandra: a decentralized structured storage system
-
Lakshman A, Malik P. Cassandra: a decentralized structured storage system. ACM SIGOPS Operat Syst Rev 2010, 44:35–40.
-
(2010)
ACM SIGOPS Operat Syst Rev
, vol.44
, pp. 35-40
-
-
Lakshman, A.1
Malik, P.2
-
86
-
-
81055146169
-
Column-oriented storage techniques for MapReduce
-
Floratou A, Patel JM, Shekita EJ, Tata S. Column-oriented storage techniques for MapReduce. Proc VLDB Endowment 2011, 4:419–429.
-
(2011)
Proc VLDB Endowment
, vol.4
, pp. 419-429
-
-
Floratou, A.1
Patel, J.M.2
Shekita, E.J.3
Tata, S.4
-
87
-
-
85077109271
-
ZooKeeper Wait-free Coordination for Internet-scale Systems
-
23 June,, 8 9.
-
Hunt P, Konar M, Junqueira FP, Reed B. ZooKeeper: Wait-free Coordination for Internet-scale Systems. In: USENIX annual Technical Conference, 23 June, 2010; 8: 9.
-
(2010)
In, USENIX annual Technical Conference
-
-
Hunt, P.1
Konar, M.2
Junqueira, F.P.3
Reed, B.4
-
89
-
-
84875178858
-
Oozie towards a scalable workflow management system for Hadoop
-
ACM, 20 May,, 4.
-
Islam M, Huang AK, Battisha M, Chiang M, Srinivasan S, Peters C, Neumann A, Abdelnur A. Oozie: towards a scalable workflow management system for Hadoop. In: Proceedings of the 1st ACM SIGMOD Workshop on Scalable Workflow Execution Engines and Technologies, ACM, 20 May, 2012, 4.
-
(2012)
In, Proceedings of the 1st ACM SIGMOD Workshop on Scalable Workflow Execution Engines and Technologies
-
-
Islam, M.1
Huang, A.K.2
Battisha, M.3
Chiang, M.4
Srinivasan, S.5
Peters, C.6
Neumann, A.7
Abdelnur, A.8
-
90
-
-
84861200365
-
Data mining techniques and applications–a decade review from 2000 to 2011
-
Liao SH, Chu PH, Hsiao PY. Data mining techniques and applications–a decade review from 2000 to 2011. Expert Syst Appl 2012, 39:11303–11311.
-
(2012)
Expert Syst Appl
, vol.39
, pp. 11303-11311
-
-
Liao, S.H.1
Chu, P.H.2
Hsiao, P.Y.3
-
91
-
-
34249751638
-
The link-prediction problem for social networks
-
Liben-Nowell D, Kleinberg J. The link-prediction problem for social networks. J Assoc Inf Sci Technol 2007, 58:1019–1031.
-
(2007)
J Assoc Inf Sci Technol
, vol.58
, pp. 1019-1031
-
-
Liben-Nowell, D.1
Kleinberg, J.2
-
93
-
-
84925679859
-
Demystifying big data analytics for business intelligence through the lens of marketing mix
-
Fan S, Lau RY, Zhao JL. Demystifying big data analytics for business intelligence through the lens of marketing mix. Big Data Res 2015, 2:28–32.
-
(2015)
Big Data Res
, vol.2
, pp. 28-32
-
-
Fan, S.1
Lau, R.Y.2
Zhao, J.L.3
-
94
-
-
84939497405
-
Constructing and analyzing criminal networks
-
IEEE,, –.
-
Sarvari H, Abozinadah E, Mbaziira A, McCoy D. Constructing and analyzing criminal networks. In: Security and Privacy Workshops (SPW), IEEE, 2014, 84–91.
-
(2014)
In, Security and Privacy Workshops (SPW)
, pp. 84-91
-
-
Sarvari, H.1
Abozinadah, E.2
Mbaziira, A.3
McCoy, D.4
-
95
-
-
0038205937
-
The role of criminal profiling in the computer forensics process
-
Rogers M. The role of criminal profiling in the computer forensics process. Comput Secur 2003, 22:292–298.
-
(2003)
Comput Secur
, vol.22
, pp. 292-298
-
-
Rogers, M.1
-
101
-
-
85021237202
-
-
CRISP-DM 1.0 Step-by-step data mining guide.
-
Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C, Wirth R. CRISP-DM 1.0 Step-by-step data mining guide.
-
-
-
Chapman, P.1
Clinton, J.2
Kerber, R.3
Khabaza, T.4
Reinartz, T.5
Shearer, C.6
Wirth, R.7
-
103
-
-
45249112487
-
Data integration advisor: set the stage with data preparation
-
15 –.
-
Sherman R. Data integration advisor: set the stage with data preparation. DM Rev 2005, 15: 54–55.
-
(2005)
DM Rev
, pp. 54-55
-
-
Sherman, R.1
-
104
-
-
80052901780
-
Incorporating data sources and methodologies for crime data mining
-
IEEE,, –.
-
Ozgul F, Atzenbeck C, Celik A, Erdem Z. Incorporating data sources and methodologies for crime data mining. In: IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, 2011, 176–180.
-
(2011)
In, IEEE International Conference on Intelligence and Security Informatics (ISI)
, pp. 176-180
-
-
Ozgul, F.1
Atzenbeck, C.2
Celik, A.3
Erdem, Z.4
-
105
-
-
84926623018
-
-
Washington, DC Executive Office of the President. [WWW document].
-
House W. Big data: seizing opportunities, preserving values (Report for the President), 2014. Washington, DC: Executive Office of the President. [WWW document]. Available at: http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
-
(2014)
Big data seizing opportunities, preserving values (Report for the President)
-
-
House, W.1
-
106
-
-
2942664322
-
Knowledge discovery in databases: 10 years after
-
Piatetsky-Shapiro G. Knowledge discovery in databases: 10 years after. ACM SIGKDD Explor Newslett 2000, 1:59–61.
-
(2000)
ACM SIGKDD Explor Newslett
, vol.1
, pp. 59-61
-
-
Piatetsky-Shapiro, G.1
-
108
-
-
84955198976
-
Data discretization: taxonomy and big data challenge
-
Ramírez-Gallego S, García S, Mouriño-Talín H, Martínez-Rego D, Bolón-Canedo V, Alonso-Betanzos A, Benítez JM, Herrera F. Data discretization: taxonomy and big data challenge. WIREs Data Min Knowl Discov 2016, 6:5–21.
-
(2016)
WIREs Data Min Knowl Discov
, vol.6
, pp. 5-21
-
-
Ramírez-Gallego, S.1
García, S.2
Mouriño-Talín, H.3
Martínez-Rego, D.4
Bolón-Canedo, V.5
Alonso-Betanzos, A.6
Benítez, J.M.7
Herrera, F.8
-
109
-
-
84890419941
-
Data mining with big data
-
Wu X, Zhu X, Wu GQ, Ding W. Data mining with big data. IEEE Trans Knowl Data Eng 2014, 26:97–107.
-
(2014)
IEEE Trans Knowl Data Eng
, vol.26
, pp. 97-107
-
-
Wu, X.1
Zhu, X.2
Wu, G.Q.3
Ding, W.4
|