2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) 2017
DOI: 10.1109/icicict1.2017.8342639
|View full text |Cite
|
Sign up to set email alerts
|

A supervised learning approach for criminal identification using similarity measures and K-Medoids clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…With the proliferation of freely available crime data, there have been many AI and statistical algorithms applied to these datasets (Bharathi et al, 2018;Isafiade et al, 2015;Joshi et al, 2018;Keyvanpour et al, 2011;Shermila et al, 2018). The areas that offer the most promise are applications of big data and data mining to "traditional" problems of profiling, segmentation and prediction, for instance, for: real time crime forecasting; profiling (offender, threats/crime risk, gang membership, recidivism); predictive policing threats and opportunities; producing real-time accurate results from big data streams, and drift detection techniques to cope with changing environments.…”
Section: Theme 1 Profiling Segmentation Forecasting and Predictionmentioning
confidence: 99%
“…With the proliferation of freely available crime data, there have been many AI and statistical algorithms applied to these datasets (Bharathi et al, 2018;Isafiade et al, 2015;Joshi et al, 2018;Keyvanpour et al, 2011;Shermila et al, 2018). The areas that offer the most promise are applications of big data and data mining to "traditional" problems of profiling, segmentation and prediction, for instance, for: real time crime forecasting; profiling (offender, threats/crime risk, gang membership, recidivism); predictive policing threats and opportunities; producing real-time accurate results from big data streams, and drift detection techniques to cope with changing environments.…”
Section: Theme 1 Profiling Segmentation Forecasting and Predictionmentioning
confidence: 99%
“…Despite its success in cyber defense, machine learning is becoming a growing concern in data security [3]. Cloud computing, networking, and evolutionary computation have grown rapidly as a result of remarkable advances in computing, storage, and computational technologies [4]. As the world becomes more digitalized, there is a growing requirement for comprehensive and advanced privacy and security issues, as well as tactics to combat security threats that are getting more complex [5].…”
Section: Introductionmentioning
confidence: 99%
“…Other applications include detecting spam and network attacks [10], detecting phishing attempts against banks [11], and increasing sexual crimes on social media [12] Stock prediction [13], risk mapping [14], and www.ijacsa.thesai.org cyber profiling [15] are some of the sectors where these technologies have been used. Implementation areas include predicting crime trends and patterns [16], criminal identity detection [17], and crime prevention [18].…”
Section: Introductionmentioning
confidence: 99%