2016 Eighth International Conference on Advanced Computing (ICoAC) 2017
DOI: 10.1109/icoac.2017.7951743
|View full text |Cite
|
Sign up to set email alerts
|

Crime investigation and criminal network analysis using archive call detail records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…The use of CDRs in criminal investigations has been described in technical literature, but mostly from a social networking perspective [42,43]. Despite CDR based geolocation evidence appearing more frequently in US courts, there seems to be nothing published on the topic by the scientific community.…”
Section: Call Detail Recordsmentioning
confidence: 99%
“…The use of CDRs in criminal investigations has been described in technical literature, but mostly from a social networking perspective [42,43]. Despite CDR based geolocation evidence appearing more frequently in US courts, there seems to be nothing published on the topic by the scientific community.…”
Section: Call Detail Recordsmentioning
confidence: 99%
“…This structure can be used to find associations between criminals and anti-social people. Several studies proposed to identify patterns of calls, people most often called by the suspects, and their communication with convicted criminals, see for instance [9,23].…”
Section: Related Workmentioning
confidence: 99%
“…A user-centric grid-based approach that utilizes location information retrieved from subscriber CDRs as a basis for cell parameter optimization is presented in [29]. In a different area, a CDR database which contains the CDR related to old cases and convicted criminals is used in a crime investigation in [30]. In [31], suspect tracking based on call log analysis and visualization is proposed.…”
Section: Call Detail Records Approachesmentioning
confidence: 99%
“…This first example describes a call made the day 1 by the caller #349 to the receiver #23 at a time between 00:00 and 00:59 with a duration of 1634 milliseconds. [38], communication network anomaly detection [39], tracking based on call log analysis [30,31], interactive visual analytics [40], and so on. In this research, the VAST data set has been chosen because it has been used widely in this field and, in our case, the extraction of calling patterns is proposed solely from CDR data.…”
Section: Original Datasetmentioning
confidence: 99%