Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Precrime Data Mining
Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison
Previous page
Table of content
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
The Art of Using Animated Sprites for 2D Games
Playing Some Tunes CD Audio, MIDI and MP3 Music
Loading and Saving Information Using Files
Fundamentals of 3D Graphics Programming
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Procedures
Floating-Point Arithmetic
Appendix D 80x86 Instructions (by Mnemonic)
Appendix E 80x86 Instructions (by Opcode)
Cisco CallManager Fundamentals (2nd Edition)
Call Hunting Constructs
SCCP Station Devices
MGCP Gateways
SIP
Infrastructure Solutions
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 61. Unwire Your Pistol Mouse
Hack 96. Establish Line of Sight
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
Section A.10. 802.1x: Port Security for Network Communications
Appendix B. Wireless Hardware Guide
File System Forensic Analysis
Volume Analysis
Directory Entries
Symbolic Link
Cylinder Group Summary
UFS2 Group Descriptor
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Ensuring High Availability in an IPsec VPN
Summary
Understanding IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies