Index_D


D

Daisy, 100–101

defined, 100

display, 100

menu, 101

See also Link analysis tools

Data

ambiguous, 353

auto, 46

balancing, 296

cleaning, 62

concatenating, 62

converting, 62

credit, 46–47

criminal, 47–55

criminal, standardizing, 72–74

demographic, 42–46

encoding, 187, 354–55

flow schematic, 191

in fraud detection, 259–60

government, 55

Internet, 55–59

interrogation, 63

missing, 186–87, 354

money as, 276–77

overlaying, 42

preferences, 45

privacy, 65–66

real estate, 46

relevant, 39–40

residential, 45

rotating, 297

security, 65–66

socioeconomic, 45

splitting, 296–97

structure, 63

testing, 40

transactional, 253

Data-Audit, 70

Database agents, 114

Database visualization, 370–73

Datagration, 70

Data integration, 64–65

data connection and, 64

defined, 64

issues, 64

multimedia formats, 65

multiple operating systems and, 64–65

DataManager, 69

Data mining, 3–4

agents, 120–21

for behavioral profiling, 19

crime detection methodology, 220–21, 293–96

criminal analysis and, 15–19

as deductive method of profiling, 20–21

defined, 3

development, 3

forensic, 375–76

IDSs, 321–23

model value, 39

precrime, 1–38

signatures in, 22

text mining vs., 126–27

ultimate goal, 4

DataMite, 230

Data preparation, 61–63

ambiguous data, 353

cleaning, 62

concatenating, 62

converting, 62

CRISP-DM, 294–95

data encoding, 354–55

government financial transaction detection case study, 217

missing data, 354

model building, 355–56

sexual assault offender behavior modeling case study, 353–60

variable selection, 355

verification, 356–60

Data preparation tools, 68–72

Amadea, 68–69

BioComp iManageData, 69

Data-Audit, 70

Datagration, 70

DataManager, 69

Dataskope, 70

Datawash, 70–71

Digital Excavator, 71

GritBot, 71

IBM Datajoiner, 71

Princeton Relational Tools, 72

Sagent, 72

SyncSort, 72

DataQuick, 46

Dataskope, 70

Data warehousing, 40–42

concept, 40–41

defined, 4, 40

investigative, 4–5, 39–74

Datawash, 70–71

Death claims case study, 287–88

Deception, text mining for, 132–38

DecisionMaker, 196

Decision trees, 207–8

defined, 207

example, 207–8

fraud and, 268–69

illustrated, 207

terminal nodes, 208

See also Machine-learning algorithms

Decision tree tools, 221–29

AC2, 222–23

Attar XperRule, 223

Business Miner, 223–24

C4.5, 229

C5.0, 224

CART, 224–27

Cognos Scenario, 227–28

EC4.5, 229

free trees, 229

IND, 229

LMDT, 229

Neusciences aXi Decision Tree, 228

OC1, 229

PC4.5, 229

PLUS, 229

SPSS Answer Tree, 228

Defense Advanced Research Projects Agency (DARPA), 4, 338

Delay patterns, 290

Demographic data, 42–46

Acxiom InfoBased data profile, 42–46

neighborhood, 43–45

private firms, 42

Dendrogram, 34, 35

Digital Excavator, 71

Disambiguation, 78

Distraction burglary. See Bogus official crime

"DOCSHOW" Security Papers Archive, 326

Document clustering, 140

Document summarization, 140

DolphinSearch, 145

Domain Name Service (DNS), 305

Doppelgaenger, 116

Drug trafficking case study, 81–82

DRUGX, 53

DShield.org, 326

dtSearch, 145–46

defined, 145

Forensic Toolkit (FTK), 146

Know File Filer (KFF) feature, 146

search options, 145–46

DumpSEC, 306




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net