Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Precrime Data Mining
Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison
Previous page
Table of content
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Summary
Directory Synchronization Queries
Dealing with Attributes with Many Values
Managing Passwords for Active Directory Users
The Reflection Method
VBScript Programmers Reference
A Quick Introduction to Programming
Error Handling and Debugging
The Scripting Runtime Objects
Regular Expressions
Appendix B Variable Naming Convention
Network Security Architectures
Attack Results
IPsec VPN Design Considerations
High-End Resilient Edge Security Design
Network Design Considerations
Small Network Campus Security Design
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
Dispelling the Confusion
Choosing a Deficient Measure
Cluttering the Display with Useless Decoration
A Final Word
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 374 Cellular Metal Floor Raceways
Article 406: Receptacles, Cord Connectors, and Attachment Plugs (Caps)
Article 504 Intrinsically Safe Systems
Notes to Tables
Example D3(a) Industrial Feeders in a Common Raceway
VBScript in a Nutshell, 2nd Edition
What VBScript Is Used For: Gluing Together Objects
Why Use WSH?
The Script Component Wizard
Section A.10. Information Functions
Section B.7. Message Box Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies