2002 IEEE International Conference on Data Mining, 2002. Proceedings.
DOI: 10.1109/icdm.2002.1183880
|View full text |Cite
|
Sign up to set email alerts
|

Investigative profiling with computer forensic log data and association rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0
1

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(14 citation statements)
references
References 12 publications
0
12
0
1
Order By: Relevance
“…[12] introduced a framework for crime trends using a new distance measure for comparing all individuals based on their profiles and then clustering them accordingly. This method also provided a visual clustering of criminal [13] proposed a method to employ computer log files as history data to search some relationships by using the frequency occurrence of incidents. Then, they analyzed the result to produce profiles, which can be used to perceive the behavior of criminal.…”
Section: Related Workmentioning
confidence: 99%
“…[12] introduced a framework for crime trends using a new distance measure for comparing all individuals based on their profiles and then clustering them accordingly. This method also provided a visual clustering of criminal [13] proposed a method to employ computer log files as history data to search some relationships by using the frequency occurrence of incidents. Then, they analyzed the result to produce profiles, which can be used to perceive the behavior of criminal.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al applied data mining techniques to study crime cases, which mainly concerned entity extraction, pattern clustering, classification and social network analysis. Abraham et al [4] proposed a method to employ log files as history data to search relationship by using the frequency occurrence of incidents.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Association mining technique has been used in many Web usage mining systems to find correlations among Web pages and interesting access patterns [1] [11]. The technique has also been used for Web pre-fetching [12] and Web personalization [10].…”
Section: Related Work and Conclusionmentioning
confidence: 99%