[go: up one dir, main page]

Xu et al., 2005 - Google Patents

Criminal network analysis and visualization

Xu et al., 2005

View HTML @Full View
Document ID
11036504976602706274
Author
Xu J
Chen H
Publication year
Publication venue
Communications of the ACM

External Links

Snippet

Criminal network analysis and visualization Page 1 100 June 2005/Vol. 48, No. 6 COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM June 2005/Vol. 48, No. 6 101 A great deal has been written over the last four years regarding how academics …
Continue reading at dl.acm.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • G06F17/30601Clustering or classification including cluster or class visualization or browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30994Browsing or visualization
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Xu et al. Criminal network analysis and visualization
Xu et al. CrimeNet explorer: a framework for criminal network knowledge discovery
Chen et al. Crime data mining: a general framework and some examples
Pramanik et al. Big data analytics for security and criminal investigations
US8135740B2 (en) Deriving a hierarchical event based database having action triggers based on inferred probabilities
US7752154B2 (en) System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information
US7970759B2 (en) System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis
US7792774B2 (en) System and method for deriving a hierarchical event based database optimized for analysis of chaotic events
US7805390B2 (en) System and method for deriving a hierarchical event based database optimized for analysis of complex accidents
US7788202B2 (en) System and method for deriving a hierarchical event based database optimized for clinical applications
US7788203B2 (en) System and method of accident investigation for complex situations involving numerous known and unknown factors along with their probabilistic weightings
US7783586B2 (en) System and method for deriving a hierarchical event based database optimized for analysis of biological systems
US7702605B2 (en) System and method for deriving a hierarchical event based database optimized for privacy and security filtering
Xu et al. Untangling criminal networks: A case study
US20080208813A1 (en) System and method for quality control in healthcare settings to continuously monitor outcomes and undesirable outcomes such as infections, re-operations, excess mortality, and readmissions
Usha et al. A complete survey on application of frequent pattern mining and association rule mining on crime pattern mining
Saidi et al. Approaches to analyze cyber terrorist communities: Survey and challenges
Bose A comparative study of social networking approaches in identifying the covert nodes
Choi et al. An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring
Oatley et al. Measuring UK crime gangs: a social network problem
Legg Human-machine decision support systems for insider threat detection
Nasrullah Detecting terrorist activity patterns using investigative data mining tool
Memon et al. Harvesting covert networks: a case study of the iMiner database
Memon et al. Investigative data mining and its application in counterterrorism
Xu et al. Criminal Network Analysis and Visualization A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data.