Social network analysis in predictive policing: concepts, models and methods
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Schriftenreihe: | Lecture notes in social networks
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XI, 133 Seiten, 43 illus. in color) |
ISBN: | 9783319414928 |
ISSN: | 2190-5428 |
DOI: | 10.1007/978-3-319-41492-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043857527 | ||
003 | DE-604 | ||
005 | 20161209 | ||
007 | cr|uuu---uuuuu | ||
008 | 161103s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319414928 |c Online |9 978-3-319-41492-8 | ||
024 | 7 | |a 10.1007/978-3-319-41492-8 |2 doi | |
035 | |a (ZDB-2-SCS)9783319414928 | ||
035 | |a (OCoLC)962092085 | ||
035 | |a (DE-599)BVBBV043857527 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 | ||
082 | 0 | |a 006.312 |2 23 | |
100 | 1 | |a Tayebi, Mohammad A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Social network analysis in predictive policing |b concepts, models and methods |c Mohammad A. Tayebi, Uwe Glässer |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
300 | |a 1 Online-Ressource (XI, 133 Seiten, 43 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture notes in social networks |x 2190-5428 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data mining | |
650 | 4 | |a Police | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Policing | |
650 | 4 | |a Applications of Graph Theory and Complex Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Informatik | |
700 | 1 | |a Glässer, Uwe |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-41491-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-41492-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029267703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029267703 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-41492-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176735277678592 |
---|---|
adam_text | CONTENTS
1 INTRODUCTION 1
REFERENCES 5
2 SOCIAL NETWORK ANALYSIS IN PREDICTIVE POLICING 7
2.1 CONVENTIONAL CRIME ANALYSIS 7
2.2 PREDICTIVE POLICING 9
2.3 SOCIAL NETWORK ANALYSIS 9
2.4 CO-OFFENDING NETWORKS 10
2.5 CO-OFFENDING NETWORK ANALYSIS IN PRACTICE 12
REFERENCES 13
3 STRUCTURE OF CO-OFFENDING NETWORKS 15
3.1 CRIME DATA 15
3.1.1 CRIME DATA MODEL 16
3.1.2 CO-OFFENDING NETWORK MODEL 17
3.1.3 BC CRIME DATASET 18
3.2 CO-OFFENDING NETWORK STRUCTURAL PROPERTIES 19
3.2.1 DEGREE DISTRIBUTION 20
3.2.2 CO-OFFENDING STRENGTH DISTRIBUTION 20
3.2.3 CONNECTING PATHS 22
3.2.4 CLUSTERING COEFFICIENT 23
3.2.5 CONNECTED COMPONENTS ANALYSIS 23
3.2.6 NETWORK EVOLUTION ANALYSIS 25
3.3 KEY PLAYERS IN CO-OFFENDING NETWORKS 28
3.3.1 CENTRALITY MEASURES 28
3.3.2 KEY PLAYERS REMOVAL EFFECTS 30
3.3.3 EXPERIMENTS AND RESULTS 31
3.4 CONCLUSIONS 35
REFERENCES 37
IX
X
CONTENTS
4 ORGANIZED CRIME GROUP DETECTION 3 9
4.1
BACKGROUND 40
4.1.1
COMMUNITY DETECTION IN SOCIAL NETWORKS 42
4.2
CONCEPTS AND DEFINITIONS 44
4.2.1
PROBLEM DEFINITION 45
4.3
PROPOSED APPROACH 45
4.3.1
ORGANIZED CRIME GROUP DETECTION 46
4.3.2
ORGANIZED CRIME GROUP EVOLUTION MODEL 48
4.4
EXPERIMENTS AND RESULTS 49
4.4.1
OFFENDER GROUPS CHARACTERISTICS 49
4.4.2
ORGANIZED CRIME GROUPS 55
4.5
CONCLUSIONS 61
REFERENCES 62
5 SUSPECTS INVESTIGATION 6 3
5.1
BACKGROUND 64
5.2
PROBLEM DEFINITION 65
5. 3 CRIMEWALKER 65
5.3.1
A SINGLE RANDOM WALK IN
CRIMEWALKE R 66
5.3.2 CRIMEWALKER
FOR A SET OF OFFENDERS
6 7
5.3. 3
SIMILARITY MEASURE FOR OFFENDERS 68
5.3.4
FEATURE WEIGHTS COMPUTATION 69
5.4
EXPERIMENTS AND RESULTS 69
5.4.1
EXPERIMENTAL DESIGN 69
5.4.2
COMPARISON PARTNERS 70
5.4.3
EXPERIMENTS AND RESULTS 72
5.5
CONCLUSIONS 73
REFERENCES 74
6 CO-OFFENCE PREDICTION 7 7
6.1
BACKGROUND 79
6.1.1
CRIME PREDICTION 79
6.1.2
LINK PREDICTION 79
6.2
CONCEPTS AND DEFINITIONS 80
6.2.1
NOTATIONS 80
6.2.2
OFFENDERS ACTIVITY SPACE 81
6.2.3
GEOGRAPHIC AND NETWORK PROXIMITY 81
6.2.4
PROBLEM DEFINITION 83
6.3
SUPERVISED LEARNING FOR CO-OFFENCE PREDICTION 83
6.3.1
CRIMINAL COOPERATION OPPORTUNITIES 83
6.3.2
REDUCING CLASS IMBALANCE RATIO 85
6.4
PREDICTION FEATURES 87
6.4.1
SOCIAL FEATURES 87
6.4.2
GEOGRAPHIC FEATURES 87
6.4.3
GEO-SOCIAL FEATURES 87
6.4.4
SIMILARITY FEATURES 89
CONTENTS
X1
6.5 EXPERIMENTS AND RESULTS
8 9
6.5.1 EXPERIMENTAL DESIGN 89
6.5.2 SINGLE FEATURES SIGNIFICANCE 90
6.5.3 PREDICTION EVALUATION 92
6.5.4 CRIMINOLOGICAL IMPLICATIONS 94
6.6 CONCLUSIONS 95
REFERENCES 96
7 PERSONALIZE D CRIME LOCATION PREDICTION 99
7.1 BACKGROUND 101
7.1.1 SPATIAL PATTERN OF CRIME 101
7.1.2 CRIME PATTERN THEORY 102
7.1.3 ACTIVITY SPACE 102
7.1.4 DIRECTIONALITY 103
7.1.5 CRIME LOCATION PREDICTION 104
7.1.6 URBAN ENVIRONMENT 105
7.1.7 PROBLEM DEFINITION 106
7.2
CRIMETRACE R
MODE L 1
6
7.2.1 MODEL DESCRIPTION 106
7.2.2 RANDOM WALK PROCESS 107
7.2.3 STARTING PROBABILITIES 109
7.2.4 MOVEMENT DIRECTIONALITY 110
7.2.5 STOPPING CRITERIA 111
7.3 EXPERIMENTS AND RESULTS HI
7.3.1 DATA CHARACTERISTICS HI
7.3.2 EXPERIMENTAL DESIGN 113
7.3.3 COMPARISON PARTNERS 114
7.3.4 EXPERIMENTS AND RESULTS 116
7.4 CONCLUSIONS 124
REFERENCES 124
8 CONCLUDING REMARKS 127
REFERENCES 130
INDEX
13 1
|
any_adam_object | 1 |
author | Tayebi, Mohammad A. Glässer, Uwe |
author_facet | Tayebi, Mohammad A. Glässer, Uwe |
author_role | aut aut |
author_sort | Tayebi, Mohammad A. |
author_variant | m a t ma mat u g ug |
building | Verbundindex |
bvnumber | BV043857527 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783319414928 (OCoLC)962092085 (DE-599)BVBBV043857527 |
dewey-full | 006.312 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.312 |
dewey-search | 006.312 |
dewey-sort | 16.312 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-41492-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03503nmm a2200685zc 4500</leader><controlfield tag="001">BV043857527</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161209 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161103s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319414928</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-41492-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-41492-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319414928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)962092085</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043857527</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tayebi, Mohammad A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social network analysis in predictive policing</subfield><subfield code="b">concepts, models and methods</subfield><subfield code="c">Mohammad A. Tayebi, Uwe Glässer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 133 Seiten, 43 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes in social networks</subfield><subfield code="x">2190-5428</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Police</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Policing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications of Graph Theory and Complex Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Glässer, Uwe</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-41491-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029267703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029267703</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-41492-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043857527 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:36:54Z |
institution | BVB |
isbn | 9783319414928 |
issn | 2190-5428 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029267703 |
oclc_num | 962092085 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
physical | 1 Online-Ressource (XI, 133 Seiten, 43 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series2 | Lecture notes in social networks |
spelling | Tayebi, Mohammad A. Verfasser aut Social network analysis in predictive policing concepts, models and methods Mohammad A. Tayebi, Uwe Glässer [Cham] Springer [2016] 1 Online-Ressource (XI, 133 Seiten, 43 illus. in color) txt rdacontent c rdamedia cr rdacarrier Lecture notes in social networks 2190-5428 Computer science Computer security Data mining Police Computer Science Data Mining and Knowledge Discovery Policing Applications of Graph Theory and Complex Networks Systems and Data Security Informatik Glässer, Uwe Verfasser aut Erscheint auch als Druckausgabe 978-3-319-41491-1 https://doi.org/10.1007/978-3-319-41492-8 Verlag URL des Erstveröffentlichers Volltext SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029267703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Tayebi, Mohammad A. Glässer, Uwe Social network analysis in predictive policing concepts, models and methods Computer science Computer security Data mining Police Computer Science Data Mining and Knowledge Discovery Policing Applications of Graph Theory and Complex Networks Systems and Data Security Informatik |
title | Social network analysis in predictive policing concepts, models and methods |
title_auth | Social network analysis in predictive policing concepts, models and methods |
title_exact_search | Social network analysis in predictive policing concepts, models and methods |
title_full | Social network analysis in predictive policing concepts, models and methods Mohammad A. Tayebi, Uwe Glässer |
title_fullStr | Social network analysis in predictive policing concepts, models and methods Mohammad A. Tayebi, Uwe Glässer |
title_full_unstemmed | Social network analysis in predictive policing concepts, models and methods Mohammad A. Tayebi, Uwe Glässer |
title_short | Social network analysis in predictive policing |
title_sort | social network analysis in predictive policing concepts models and methods |
title_sub | concepts, models and methods |
topic | Computer science Computer security Data mining Police Computer Science Data Mining and Knowledge Discovery Policing Applications of Graph Theory and Complex Networks Systems and Data Security Informatik |
topic_facet | Computer science Computer security Data mining Police Computer Science Data Mining and Knowledge Discovery Policing Applications of Graph Theory and Complex Networks Systems and Data Security Informatik |
url | https://doi.org/10.1007/978-3-319-41492-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029267703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT tayebimohammada socialnetworkanalysisinpredictivepolicingconceptsmodelsandmethods AT glasseruwe socialnetworkanalysisinpredictivepolicingconceptsmodelsandmethods |