From Digital Library to Digital Government: A Case Study in Crime Data Mapping and Mining
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
dg.o '05 Proceedings of the 2005 national conference on Digital government research
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Distributed higher order association rule mining using information extracted from textual data
ACM SIGKDD Explorations Newsletter - Natural language processing and text mining
Guest Editors' Introduction: Artificial Intelligence for Homeland Security
IEEE Intelligent Systems
Crime data mining: an overview and case studies
dg.o '03 Proceedings of the 2003 annual national conference on Digital government research
A probabilistic model for approximate identity matching
dg.o '06 Proceedings of the 2006 international conference on Digital government research
Using importance flooding to identify interesting networks of criminal activity
Journal of the American Society for Information Science and Technology
Names: a new frontier in text mining
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Designing Agent99 trainer: a learner-centered, web-based training system for deception detection
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Disclosing false identity through hybrid link analysis
Artificial Intelligence and Law
Identity matching using personal and social identity features
Information Systems Frontiers
A hierarchical Naïve Bayes model for approximate identity matching
Decision Support Systems
A dictionary-based approach to fast and accurate name matching in large law enforcement databases
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A multi-layer Naïve bayes model for approximate identity matching
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Collusion set detection through outlier discovery
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Discovering identity problems: a case study
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Detecting deception in synchronous computer-mediated communication using speech act profiling
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Mining co-distribution patterns for large crime datasets
Expert Systems with Applications: An International Journal
A taxonomy of privacy-preserving record linkage techniques
Information Systems
Hi-index | 0.00 |
The criminal mind is no match for some of the latest technology designed to determine fact from fiction in suspect identities.