Implementing agglomerative hierarchic clustering algorithms for use in document retrieval
Information Processing and Management: an International Journal
Algorithms for clustering data
Algorithms for clustering data
Numerical recipes in C (2nd ed.): the art of scientific computing
Numerical recipes in C (2nd ed.): the art of scientific computing
Drawing graphs nicely using simulated annealing
ACM Transactions on Graphics (TOG)
Inferring Web communities from link topology
Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems: links, objects, time and space---structure in hypermedia systems
SONIA: a service for organizing networked information autonomously
Proceedings of the third ACM conference on Digital libraries
Authoritative sources in a hyperlinked environment
Journal of the ACM (JACM)
ACM Computing Surveys (CSUR)
Document clustering for electronic meetings: an experimental comparison of two techniques
Decision Support Systems - From information retrieval to knowledge management: enabling technologies and best practices
Communications of the ACM
COPLINK: managing law enforcement data and knowledge
Communications of the ACM
Social, ethical and legal issues of data mining
Data mining
Criminal network analysis and visualization
Communications of the ACM - 3d hard copy
US Domestic Extremist Groups on the Web: Link and Content Analysis
IEEE Intelligent Systems
Mining communities and their relationships in blogs: A study of online hate groups
International Journal of Human-Computer Studies
Efficient algorithms for mining maximal valid groups
The VLDB Journal — The International Journal on Very Large Data Bases
Mining for offender group detection and story of a police operation
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Graph Structural Mining in Terrorist Networks
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Network structure mining: locating and isolating core members in covert terrorist networks
WSEAS Transactions on Information Science and Applications
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Analysis of terrorist social networks with fractal views
Journal of Information Science
Social networks identification and analysis using call detail records
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Community detection in scale-free networks based on hypergraph model
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A proposed data mining approach for internet auction fraud detection
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
STEvent: Spatio-temporal event model for social network discovery
ACM Transactions on Information Systems (TOIS)
Hiding in plain sight: criminal network analysis
Computational & Mathematical Organization Theory
Constructing tree-based knowledge structures from text corpus
Applied Intelligence
PutMode: prediction of uncertain trajectories in moving objects databases
Applied Intelligence
WebRank: a hybrid page scoring approach based on social network analysis
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
Topic-based social network analysis for virtual communities of interests in the Dark Web
ACM SIGKDD Workshop on Intelligence and Security Informatics
Topic-based social network analysis for virtual communities of interests in the dark web
ACM SIGKDD Explorations Newsletter
OntoStarFish: visualization of collaboration networks using starfields, ontologies and fisheye views
Proceedings of the 3rd Mexican Workshop on Human Computer Interaction
Visualizing collaboration networks implicit in digital libraries using OntoStarFish
Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries
CrimeWalker: a recommendation model for suspect investigation
Proceedings of the fifth ACM conference on Recommender systems
Analyzing the terrorist social networks with visualization tools
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A new blockmodeling based hierarchical clustering algorithm for web social networks
Engineering Applications of Artificial Intelligence
Combined detection model for criminal network detection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Hybrid model of content extraction
Journal of Computer and System Sciences
A framework for exploring organizational structure in dynamic social networks
Decision Support Systems
Electronic Commerce Research and Applications
Modeling collaborative knowledge of publishing activities for research recommendation
ICCCI'12 Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I
Anytime algorithms for mining groups with maximum coverage
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Hi-index | 0.00 |
Knowledge about the structure and organization of criminal networks is important for both crime investigation and the development of effective strategies to prevent crimes. However, except for network visualization, criminal network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of network knowledge from large volumes of criminal-justice data. To help law enforcement and intelligence agencies discover criminal network knowledge efficiently and effectively, in this research we proposed a framework for automated network analysis and visualization. The framework included four stages: network creation, network partition, structural analysis, and network visualization. Based upon it, we have developed a system called CrimeNet Explorer that incorporates several advanced techniques: a concept space approach, hierarchical clustering, social network analysis methods, and multidimensional scaling. Results from controlled experiments involving student subjects demonstrated that our system could achieve higher clustering recall and precision than did untrained subjects when detecting subgroups from criminal networks. Moreover, subjects identified central members and interaction patterns between groups significantly faster with the help of structural analysis functionality than with only visualization functionality. No significant gain in effectiveness was present, however. Our domain experts also reported that they believed CrimeNet Explorer could be very useful in crime investigation.