2019
DOI: 10.1109/access.2019.2958873
|View full text |Cite
|
Sign up to set email alerts
|

Link Prediction in Time-Evolving Criminal Network With Deep Reinforcement Learning Technique

Abstract: The prediction of hidden or missing links in a criminal network, which represent possible interactions between individuals, is a significant problem. The criminal network prediction models commonly rely on Social Network Analysis (SNA) metrics. These models leverage on machine learning (ML) techniques to enhance the predictive accuracy of the models and processing speed. The problem with the use of classical ML techniques such as support vector machine (SVM), is the dependency on the availability of large data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 50 publications
(25 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Applying machine learning in botnet detection for smart factories can become useful to enhance performance of the honeypot model in term of speeding up the processing time or detection time [21]. Interestingly, it is notified that very limited studies making attempts to mount both honeypot and machine learning on IoT device networks to target attack on the IoT traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Applying machine learning in botnet detection for smart factories can become useful to enhance performance of the honeypot model in term of speeding up the processing time or detection time [21]. Interestingly, it is notified that very limited studies making attempts to mount both honeypot and machine learning on IoT device networks to target attack on the IoT traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Lim et al [81] utilized deep reinforcement learning (DRL) techniques to predict the missing and hidden relationship between the criminal in criminal network due to the lack of criminal databases. Only small criminal databases are available.…”
Section: Cybercrime Detection Using Deep Learningmentioning
confidence: 99%
“…[20] have proposed a data privacy-aware protocol to secure video reporting services used for roadside accident monitoring. Other solutions include authentication schemes [21]- [24], evaluation of available authentication techniques such as those proposed for healthcare domain which are highly sensitive [25], proposing secure routing protocols for wireless sensor network such as [26], energy efficient protocols which may play crucial role in energy security [27]- [29], highlighting the challenges of protocols for secure communication to address them [30], attack detection techniques [31], link prediction in criminal networks using techniques like deep reinforcement learning [32], phishing detection techniques [33]. Despite many efforts, networks are still prone to attacks, both internally and externally.…”
Section: Importance Of Wireless Network Securitymentioning
confidence: 99%