Data mining: concepts and techniques
Data mining: concepts and techniques
Evolving data into mining solutions for insights
Communications of the ACM - Evolving data mining into solutions for insights
Mining e-mail content for author identification forensics
ACM SIGMOD Record
Automatically detecting deceptive criminal identities
Communications of the ACM - Homeland security
Extracting meaningful entities from police narrative reports
dg.o '02 Proceedings of the 2002 annual national conference on Digital government research
Privacy sensitive distributed data mining from multi-party data
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
An international perspective on fighting cybercrime
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer
International Journal of Human-Computer Studies
Crime Pattern Detection Using Data Mining
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
ACM Transactions on Database Systems (TODS)
Mapping the contemporary terrorism research domain
International Journal of Human-Computer Studies
Mining communities and their relationships in blogs: A study of online hate groups
International Journal of Human-Computer Studies
Use of data mining techniques to model crime scene investigator performance
Knowledge-Based Systems
Automated criminal link analysis based on domain knowledge: Research Articles
Journal of the American Society for Information Science and Technology
Artificial Intelligence and Law
Understanding the structure of terrorist networks
International Journal of Business Intelligence and Data Mining
dg.o '08 Proceedings of the 2008 international conference on Digital government research
Mining for offender group detection and story of a police operation
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
A Language Modelling Approach to Linking Criminal Styles with Offender Characteristics
NLDB '08 Proceedings of the 13th international conference on Natural Language and Information Systems: Applications of Natural Language to Information Systems
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Criminal Cross Correlation Mining and Visualization
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Using an edge-dual graph and k-connectivity to identify strong connections in social networks
Proceedings of the 46th Annual Southeast Regional Conference on XX
Mining top-k and Bottom-k correlative crime patternsthrough graph representations
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
PerpSearch: an integrated crime detection system
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
A Language Modelling approach to linking criminal styles with offender characteristics
Data & Knowledge Engineering
Mining the core member of terrorist crime group based on social network analysis
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Visualizing social network concepts
Decision Support Systems
Investigative data mining for counterterrorism
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
An intelligent decision-support model using FSOM and rule extraction for crime prevention
Expert Systems with Applications: An International Journal
In-depth behavior understanding and use: The behavior informatics approach
Information Sciences: an International Journal
Visualization of Network Concepts: The Impact of Working Memory Capacity Differences
Information Systems Research
PutMode: prediction of uncertain trajectories in moving objects databases
Applied Intelligence
Data clustering by minimizing disconnectivity
Information Sciences: an International Journal
Wireless Personal Communications: An International Journal
Formally analysing the concepts of domestic violence
Expert Systems with Applications: An International Journal
A computational model for financial reporting fraud detection
Decision Support Systems
Fuzzy association rule mining for community crime pattern discovery
ACM SIGKDD Workshop on Intelligence and Security Informatics
Towards discovering criminal communities from textual data
Proceedings of the 2011 ACM Symposium on Applied Computing
Spatio-temporal similarity of web user session trajectories and applications in dark web research
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
Reputation inflation detection in a Chinese C2C market
Electronic Commerce Research and Applications
Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches
International Journal of Electronic Commerce
A platform for discovering and sharing confidential ballistic crime data
International Journal of Knowledge and Web Intelligence
On the topology of the dark web of terrorist groups
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
A methodology for constructing decision support systems for crime detection
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Mining criminal databases to finding investigation clues—by example of stolen automobiles database
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Mining co-distribution patterns for large crime datasets
Expert Systems with Applications: An International Journal
Unsupervised discovery of relations for analysis of textual data
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Discovering business intelligence from online product reviews: A rule-induction framework
Expert Systems with Applications: An International Journal
Idea discovery: A scenario-based systematic approach for decision making in market innovation
Expert Systems with Applications: An International Journal
Mining Criminal Networks from Chat Log
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Named entities in judicial transcriptions: extended conditional random fields
CICLing'13 Proceedings of the 14th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part I
Using lexicometry and vocabulary analysis techniques to detect a signature for web profile
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Crime profiling for the Arabic language using computational linguistic techniques
Information Processing and Management: an International Journal
Hi-index | 4.11 |
The volume of crime data is increasing along with the incidence and complexity of crimes. Data mining is a powerful tool that criminal investigators who may lack extensive training as data analysts can use to explore large databases quickly and efficiently. The collaborative Coplink project between University of Arizona researchers and the Tucson and Phoenix police departments correlates data mining techniques applied in criminal and intelligence analysis with eight crime types. The framework has general applicability to crime and intelligence analysis because it encompasses all major crime types as well as both traditional and new intelligence-specific data mining techniques. Three case studies demonstrate the framework's effectiveness.