AC2, 222–23
Alice d'Isoft 6.0, 222–23
Example Editor, 222
See also Decision tree tools
ACORN database, 43
Acxiom
analytic services, 42–43
data, 42
InfoBase data profile, 42–46
list of type of information/companies provided by, 44
neighborhood profiles, 43–45
sample profile, 43
Address verification system (AVS), 271
Agents. See Intelligent agents
AI
EVS and, 337–38
functions, 3
technologies, 2
AIRA, 230
Alien intelligence, 376–78
for combating crime/terrorism, 378
defined, 377
techniques, 377
Amadea, 68–69
Analyst's Notebook, 89–97
Case Notebook, 90
chart clarity, 92–93
confirmed/unconfirmed lines, 91
high volume data, 95
legend, 94
Link Notebook tool, 89–90
link types, 93
organizations shown inside boxes, 91–92
telephone toll analysis, 94
Timeline Analysis, 95–97
See also Link analysis tools
ANGOSS KnowledgeSTUDIO, 233–37
analyses, 234–35
code export formats, 236
decision trees, 234–35
defined, 233
in fraud detection, 265–66
Megaputer PolyAnalyst, 238–41
Nearest Neighbor algorithm, 237
Neural Net Wizard interface, 237
rules generated in Java, 237
user flexibility, 233–34
See also Machine-learning software
Anomaly detection, 309–10
Anomaly IDSs, 319–20
defined, 319
measure selection, 320
profiles, 319
rules, 320
See also Intrusion detection systems (IDSs)
Anti-Drug Network (ADNET), 210–12
ADNETLINK servers, 212
control center, 210
mining assistance for, 211
SIPRNET connection, 212
Artificial neural networks (ANNs), 365, 366
Association
Crime Link matrix, 87–88
link analysis representation, 6, 83
networks, 82
patterns, 290
Attar XperRule, 223
Attrasoft system, 165–67, 196
database search, 165
DecisionMaker, 196
defined, 165
functioning of, 167
ImageFinder, 166
training, 166
See also Neural networks
Auction fraud, 254–56
feedback mechanism, 255
identity disguise and, 256
victims, 255
Auto data, 46
Automated Tactical Analysis of Crime (ATAC), 89
Automatic learning, 150
Autonomy, 141–42
defined, 141
users, 141–42
See also Text mining tools
Aviation Safety Reporting System (ASRS), 129