Sciweavers

ISI
2003
Springer
13 years 9 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
ISI
2003
Springer
13 years 9 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...
ISI
2003
Springer
13 years 9 months ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King
ISI
2003
Springer
13 years 9 months ago
Locating Hidden Groups in Communication Networks Using Hidden Markov Models
Malik Magdon-Ismail, Mark K. Goldberg, William A. ...
ISI
2003
Springer
13 years 9 months ago
PROGENIE: Biographical Descriptions for Intelligence Analysis
Intelligence analysts face the need for immediate, up-to-date information about individuals of interest. While biographies can be written and stored in text databases, we argue tha...
Pablo Ariel Duboué, Kathleen McKeown, Vasil...
ISI
2003
Springer
13 years 9 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia
ISI
2003
Springer
13 years 9 months ago
Scalable Knowledge Extraction from Legacy Sources with SEEK
Joachim Hammer, William J. O'Brien, Mark S. Schmal...