VisFlowConnect: netflow visualizations of link relationships for security situational awareness
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Use of data mining techniques to model crime scene investigator performance
Knowledge-Based Systems
Automated criminal link analysis based on domain knowledge: Research Articles
Journal of the American Society for Information Science and Technology
Artificial Intelligence and Law
The privacy of k-NN retrieval for horizontal partitioned data: new methods and applications
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Privacy-preserving regression algorithms
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
Investigative data mining and its application in counterterrorism
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Forensic analysis of database tampering
ACM Transactions on Database Systems (TODS)
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Computational Forensics: An Overview
IWCF '08 Proceedings of the 2nd international workshop on Computational Forensics
Investigative data mining for counterterrorism
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Crime statistics online: potentials and challenges
Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities
Preserving privacy whilst integrating data: Applied to criminal justice
Information Polity - Government 2.0: Making Connections between citizens, data and government
Biomedical informatics and security informatics research in digital library
ICADL'04 Proceedings of the 7th international Conference on Digital Libraries: international collaboration and cross-fertilization
Privacy preserving DBSCAN for vertically partitioned data
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A framework for exploring gray web forums: analysis of forum-based communities in taiwan
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Activity mining: challenges and prospects
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
A cost-sensitive decision tree approach for fraud detection
Expert Systems with Applications: An International Journal
Solving credit card fraud detection problem by the new metaheuristics migrating birds optimization
IWANN'13 Proceedings of the 12th international conference on Artificial Neural Networks: advences in computational intelligence - Volume Part II
Hi-index | 0.00 |
From the Publisher:Coverage of specific technologies available that represent the cutting-edge in evidence gathering and collection through established information networks- Introduces professionals to case studies illustrating real-world applications of data mining to law enforcement and investigators- Illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science- Includes numerous diagrams and screen captures to illustrate the use of these technologies