Introduction to algorithms
IEEE Intelligent Systems
Stochastic link and group detection
Eighteenth national conference on Artificial intelligence
Link mining: a new data mining challenge
ACM SIGKDD Explorations Newsletter
CrimeNet explorer: a framework for criminal network knowledge discovery
ACM Transactions on Information Systems (TOIS)
ACM SIGKDD Explorations Newsletter
Link mining applications: progress and challenges
ACM SIGKDD Explorations Newsletter
KDD-2005 workshop report: Link Discovery: issues, approaches and application (LinkKDD-2005)
ACM SIGKDD Explorations Newsletter
The KOJAK group finder: connecting the dots via integrated knowledge-based and statistical reasoning
IAAI'04 Proceedings of the 16th conference on Innovative applications of artifical intelligence
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Prediction of past unsolved terrorist attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Hiding in plain sight: criminal network analysis
Computational & Mathematical Organization Theory
Combined detection model for criminal network detection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Detecting Criminal Networks Using Social Similarity
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
STONE: shaping terrorist organizational network efficiency
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
PREVE: a policy recommendation engine based on vector equilibria applied to reducing LeT's attacks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Hi-index | 0.00 |
Since discovery of an underlying organisational structure from crime data leads the investigation to terrorist cells or organised crime groups, detecting covert networks are important to crime investigation. As shown in application of Offender Group Detection Model (OGDM), which is developed and tested on a theft network in Bursa, Turkey, use of effective data mining methods can reveal offender groups. OGDM detected seven ruling members of twenty network members. Based on initial findings of OGDM; thirty-four offenders are considered to be in a single offender group where seven of them were ruling members. After Operation Cash was launched, the police arrested the seven detected ruling members, and confirmed that the real crime network was consisting of 20 members of which 3 whom had never been previously identified or arrested. The police arrested 17 people, recovered worth U.S. $ 200,000 of stolen goods, and cash worth U.S. $ 180,000.