Investigative Data Mining for Security and Criminal DetectionButterworth-Heinemann, 2003 - 452 Seiten Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur. The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention. Investigative Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities. Key Features: * Covers cutting-edge data mining technologies available to use in evidence gathering and collection * Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining * Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science * Introduces cutting-edge technologies in evidence gathering and collection, using clear non-technical language * Illustrates current and future applications of data mining tools in preventative law enforcement, homeland security, and other areas of crime detection and prevention * Shows how to construct predictive models for detecting criminal activity and for behavioral profiling of perpetrators * Features numerous Web links, vendor resources, case studies, and screen captures illustrating the use of artificial intelligence (AI) technologies |
Inhalt
II | 1 |
III | 2 |
IV | 3 |
V | 4 |
VI | 5 |
VII | 6 |
VIII | 8 |
IX | 9 |
XCIX | 206 |
C | 207 |
CI | 208 |
CII | 209 |
CIII | 210 |
CIV | 211 |
CV | 217 |
CVI | 219 |
X | 11 |
XI | 14 |
XII | 15 |
XIV | 19 |
XV | 22 |
XVI | 24 |
XVII | 37 |
XVIII | 38 |
XIX | 39 |
XXII | 40 |
XXIV | 42 |
XXV | 46 |
XXVII | 47 |
XXVIII | 55 |
XXX | 59 |
XXXI | 61 |
XXXII | 63 |
XXXIII | 64 |
XXXIV | 65 |
XXXV | 66 |
XXXVI | 68 |
XXXVII | 72 |
XXXVIII | 74 |
XXXIX | 75 |
XLIII | 76 |
XLIV | 77 |
XLV | 78 |
XLVI | 80 |
XLVII | 81 |
XLVIII | 82 |
XLIX | 84 |
L | 85 |
LI | 88 |
LII | 104 |
LIII | 107 |
LVI | 108 |
LVII | 109 |
LVIII | 111 |
LIX | 112 |
LX | 113 |
LXII | 114 |
LXIII | 116 |
LXIV | 117 |
LXV | 120 |
LXVI | 121 |
LXVII | 123 |
LXVIII | 125 |
LXXI | 126 |
LXXII | 127 |
LXXIII | 128 |
LXXIV | 130 |
LXXV | 132 |
LXXVI | 138 |
LXXVII | 141 |
LXXVIII | 157 |
LXXIX | 159 |
LXXXI | 160 |
LXXXII | 161 |
LXXXIII | 162 |
LXXXIV | 163 |
LXXXV | 164 |
LXXXVI | 165 |
LXXXVII | 167 |
LXXXIX | 169 |
XC | 172 |
XCI | 178 |
XCII | 179 |
XCIII | 195 |
XCIV | 196 |
XCV | 204 |
XCVI | 205 |
CVII | 227 |
CVIII | 231 |
CIX | 246 |
CX | 247 |
CXII | 248 |
CXIV | 249 |
CXV | 250 |
CXVI | 251 |
CXVII | 252 |
CXVIII | 254 |
CXIX | 255 |
CXX | 256 |
CXXI | 257 |
CXXII | 259 |
CXXIV | 260 |
CXXV | 262 |
CXXVI | 264 |
CXXVII | 265 |
CXXVIII | 268 |
CXXIX | 269 |
CXXX | 270 |
CXXXI | 271 |
CXXXII | 273 |
CXXXIII | 275 |
CXXXIV | 277 |
CXXXV | 279 |
CXXXVI | 285 |
CXXXVII | 286 |
CXXXVIII | 289 |
CXXXIX | 291 |
CXL | 294 |
CXLI | 297 |
CXLII | 299 |
CXLV | 307 |
CXLVI | 308 |
CXLVII | 311 |
CXLVIII | 316 |
CXLIX | 317 |
CL | 319 |
CLI | 321 |
CLII | 322 |
CLIII | 323 |
CLIV | 324 |
CLVI | 325 |
CLIX | 326 |
CLXI | 327 |
CLXII | 328 |
CLXIII | 329 |
CLXIV | 331 |
CLXV | 332 |
CLXVI | 334 |
CLXVII | 335 |
CLXVIII | 336 |
CLXIX | 338 |
CLXX | 339 |
CLXXI | 341 |
CLXXIII | 343 |
CLXXIV | 344 |
CLXXV | 346 |
CLXXVII | 361 |
CLXXVIII | 362 |
CLXXX | 373 |
CLXXXI | 374 |
CLXXXII | 376 |
CLXXXIII | 377 |
CLXXXV | 413 |
CLXXXVI | 417 |
CLXXXVIII | 429 |
CXC | 433 |
Andere Ausgaben - Alle anzeigen
Investigative Data Mining for Security and Criminal Detection Jesus Mena Eingeschränkte Leseprobe - 2003 |
Häufige Begriffe und Wortgruppen
activity Acxiom agents alerts analyze applications associated attack automated behavior classification clusters credit-card crime maps crimes criminal CRISP-DM data mining data set database of unclaimed decision tree developed documents e-mail encoding entities example extract Figure files Florida forensic fraud detection fraudulent government information identify IDSs individuals information and links information and services input Integrator intelligence Internet Intrusion Detection intrusion detection systems law enforcement License Database link analysis machine-learning algorithms money laundering monitoring multiple neural network Online searchable database patterns perpetrators police predictive Property Records Public Record Links Public records information reports retrieval rules samples Searchable by name self-organizing map servers Sex Offenders SPSS statistical Teradata terrorist text mining Text Mining Software tion transactions Unclaimed Property Database unclaimed property listings variables visualization Web bugs Web services West Midlands Police
Verweise auf dieses Buch
Intelligence and Security Informatics for International Security ... Hsinchun Chen Keine Leseprobe verfügbar - 2006 |