Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Precrime Data Mining
Table 1.1: Illustrative Examples of the Modus Operandi Free-Text Field.
Chapter 2: Investigative Data Warehousing
Table 2.1: Acxiom Infobase Basic Data Profile
Table 2.2: Partial List of Type of Information or Companies Provided by Acxiom
Table 2.3: Type of Information Provided by Data Quick
Table 2.4: Criminalfiles.info available jurisdictions.
Table 2.5: Anatomy of a Cookie
Chapter 5: Text Mining: Clustering Concepts
Table 5.1: LIWC 2001 Dimensions and Sample Words
Chapter 6: Neural Networks: Classifying Patterns
Table 6.1: Model with Three Inputs, a Set of Formula Weights, and One Output
Table 6.2: Classification of Burglary Offense
Table 6.3: Modus Operandi Text
Chapter 8: NetFraud: A Case Study
Table 8.1: On-Line Auction Fraud Statistics
Table 8.2: Top Three Payment Methods
Table 8.3: Fraud Statistics Reported by fraud.org
Table 8.4: Transactional Data Variables
Chapter 9: Criminal Patterns: Detection Techniques
Table 9.1: Methods of Insurance Fraud Detection
Chapter 12: Mapping Crime: Clustering Case Work
Table 12.1: Classification of Sexual Crimes
Table 12.2: Number of Crimes Attributed to Known Offenders
Table 12.3: Data Encoding Examples (3 Yes and 3 No)
Table 12.4: Cluster Comparison
Previous page
Table of content
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
CISSP Exam Cram 2
A Note from Series Editor Ed Tittel
Single Sign-On
Exam Prep Questions
Exam Prep Questions
Practice Exam 2
Cisco IOS Cookbook (Cookbooks (OReilly))
Changing the Number of VTYs
Debugging DSLw
LPD Printer Support
Clearing the Routers Log
Configuring MPLS over ATM
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Customizing the Visio Environment
Getting Visio and Diagram Help
Key Points
Tracking Project Details with Gantt Charts
Key Points
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Job scheduling Versus Workflow
Thread Usage in Quartz
Creating New JobStores
How Clustering Works in Quartz
Configuring a TriggerListener
Comparing, Designing, and Deploying VPNs
A Detailed Examination of MPLS Layer 3 VPNs
Scaling and Optimizing IPsec VPNs
Ensuring High Availability in an IPsec VPN
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Multithreading
Windows Controls
ASP.NET Web Applications
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies