Xu et al., 2005
ViewHTML| Publication | Publication Date | Title |
|---|---|---|
| Xu et al. | Criminal network analysis and visualization | |
| Xu et al. | CrimeNet explorer: a framework for criminal network knowledge discovery | |
| Chen et al. | Crime data mining: a general framework and some examples | |
| Pramanik et al. | Big data analytics for security and criminal investigations | |
| US8135740B2 (en) | Deriving a hierarchical event based database having action triggers based on inferred probabilities | |
| US7752154B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of criminal and security information | |
| US7970759B2 (en) | System and method for deriving a hierarchical event based database optimized for pharmaceutical analysis | |
| US7792774B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of chaotic events | |
| US7805390B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of complex accidents | |
| US7788202B2 (en) | System and method for deriving a hierarchical event based database optimized for clinical applications | |
| US7788203B2 (en) | System and method of accident investigation for complex situations involving numerous known and unknown factors along with their probabilistic weightings | |
| US7783586B2 (en) | System and method for deriving a hierarchical event based database optimized for analysis of biological systems | |
| US7702605B2 (en) | System and method for deriving a hierarchical event based database optimized for privacy and security filtering | |
| US7917478B2 (en) | System and method for quality control in healthcare settings to continuously monitor outcomes and undesirable outcomes such as infections, re-operations, excess mortality, and readmissions | |
| Usha et al. | A complete survey on application of frequent pattern mining and association rule mining on crime pattern mining | |
| Suthaharan et al. | Relevance feature selection with data cleaning for intrusion detection system | |
| Saidi et al. | Approaches to analyze cyber terrorist communities: Survey and challenges | |
| Bose | A comparative study of social networking approaches in identifying the covert nodes | |
| Choi et al. | An easy-to-use framework to build and operate ai-based intrusion detection for in-situ monitoring | |
| Oatley et al. | Measuring UK crime gangs: a social network problem | |
| Legg | Human-machine decision support systems for insider threat detection | |
| Nasrullah | Detecting terrorist activity patterns using investigative data mining tool | |
| Memon et al. | Harvesting covert networks: a case study of the iMiner database | |
| Memon et al. | Investigative data mining and its application in counterterrorism | |
| Xu et al. | Criminal Network Analysis and Visualization A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data. |