116
click to vote
ISI
15 years 6 months ago
2003 Springer
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
118
click to vote
ISI
15 years 6 months ago
2003 Springer
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
ISI
15 years 6 months ago
2003 Springer
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
ISI
15 years 6 months ago
2003 Springer
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
ISI
15 years 6 months ago
2003 Springer |