Xu et al., 2005 - Google Patents
Criminal network analysis and visualizationXu et al., 2005
View HTML- Document ID
- 11036504976602706274
- Author
- Xu J
- Chen H
- Publication year
- Publication venue
- Communications of the ACM
External Links
Snippet
Criminal network analysis and visualization Page 1 100 June 2005/Vol. 48, No. 6
COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM June 2005/Vol.
48, No. 6 101 A great deal has been written over the last four years regarding how academics …
- 238000003012 network analysis 0 title description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
- G06F17/30595—Relational databases
- G06F17/30598—Clustering or classification
- G06F17/30601—Clustering or classification including cluster or class visualization or browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30994—Browsing or visualization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Criminal network analysis and visualization | |
Xu et al. | CrimeNet explorer: a framework for criminal network knowledge discovery | |
Chen et al. | Crime data mining: a general framework and some examples | |
Pramanik et al. | Big data analytics for security and criminal investigations | |
US8135740B2 (en) | Deriving a hierarchical event based database having action triggers based on inferred probabilities | |
US7752154B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information | |
US7970759B2 (en) | System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis | |
US7792774B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of chaotic events | |
US7805390B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of complex accidents | |
US7788202B2 (en) | System and method for deriving a hierarchical event based database optimized for clinical applications | |
US7788203B2 (en) | System and method of accident investigation for complex situations involving numerous known and unknown factors along with their probabilistic weightings | |
US7783586B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of biological systems | |
US7702605B2 (en) | System and method for deriving a hierarchical event based database optimized for privacy and security filtering | |
Xu et al. | Untangling criminal networks: A case study | |
US20080208813A1 (en) | System and method for quality control in healthcare settings to continuously monitor outcomes and undesirable outcomes such as infections, re-operations, excess mortality, and readmissions | |
Usha et al. | A complete survey on application of frequent pattern mining and association rule mining on crime pattern mining | |
Saidi et al. | Approaches to analyze cyber terrorist communities: Survey and challenges | |
Bose | A comparative study of social networking approaches in identifying the covert nodes | |
Choi et al. | An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring | |
Oatley et al. | Measuring UK crime gangs: a social network problem | |
Legg | Human-machine decision support systems for insider threat detection | |
Nasrullah | Detecting terrorist activity patterns using investigative data mining tool | |
Memon et al. | Harvesting covert networks: a case study of the iMiner database | |
Memon et al. | Investigative data mining and its application in counterterrorism | |
Xu et al. | Criminal Network Analysis and Visualization A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data. |