Investigative data mining for security and criminal detection /:
Data mining has traditionally been used to predict consumer behaviour, but in the wake of 9/11, the same tools and techniques can also be used to detect and validate the identity of threatening and criminal entities for security purposes.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston, MA :
Butterworth-Heinemann,
©2003.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Data mining has traditionally been used to predict consumer behaviour, but in the wake of 9/11, the same tools and techniques can also be used to detect and validate the identity of threatening and criminal entities for security purposes. |
Beschreibung: | 1 online resource (xvi, 452 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080509389 008050938X 9780750676137 0750676132 1281022462 9781281022462 9786611022464 6611022465 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn172989411 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070918s2003 ne a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d NLGGC |d WSU |d EBLCP |d E7B |d DEBSZ |d OCLCQ |d AGLDB |d MERUC |d OCLCA |d YDX |d OCLCO |d OCLCQ |d VTS |d OCLCQ |d STF |d M8D |d OCLCQ |d VLY |d OCLCA |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 226377299 |a 648243382 |a 1033477209 |a 1033617584 |a 1035051964 |a 1162065210 |a 1241796002 | ||
020 | |a 9780080509389 |q (electronic bk.) | ||
020 | |a 008050938X |q (electronic bk.) | ||
020 | |a 9780750676137 | ||
020 | |a 0750676132 | ||
020 | |a 1281022462 | ||
020 | |a 9781281022462 | ||
020 | |a 9786611022464 | ||
020 | |a 6611022465 | ||
020 | |z 0750676132 |q (pbk. ; |q alk. paper) | ||
024 | 3 | |a 9780750676137 | |
035 | |a (OCoLC)172989411 |z (OCoLC)226377299 |z (OCoLC)648243382 |z (OCoLC)1033477209 |z (OCoLC)1033617584 |z (OCoLC)1035051964 |z (OCoLC)1162065210 |z (OCoLC)1241796002 | ||
050 | 4 | |a QA76.9.D343 |b M44 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Mena, Jesus. |0 http://id.loc.gov/authorities/names/n99021630 | |
245 | 1 | 0 | |a Investigative data mining for security and criminal detection / |c Jesús Mena. |
260 | |a Amsterdam ; |a Boston, MA : |b Butterworth-Heinemann, |c ©2003. | ||
300 | |a 1 online resource (xvi, 452 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Pre-Crime Data Mining -- Investigative Data Warehousing -- Link Analysis: Visualizing Associations -- Intelligent Agents: Software Detectives -- Text Mining: Clustering Concepts -- Neural Networks: Classifying Patterns -- Machine Learning: Developing Profiles -- NetFraud: A Case Study -- Criminal Patterns: Detection Techniques -- Intrusion Detection: Techniques and Systems -- An Entity Validation System (EVS): A Conceptual Architecture -- Mapping Crime: Clustering CaseWork -- Appendix A: 1,000 Online Sources for the Forensic Data Miner 00 Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects. | |
588 | 0 | |a Print version record. | |
520 | |a Data mining has traditionally been used to predict consumer behaviour, but in the wake of 9/11, the same tools and techniques can also be used to detect and validate the identity of threatening and criminal entities for security purposes. | ||
546 | |a English. | ||
650 | 0 | |a Data mining. |0 http://id.loc.gov/authorities/subjects/sh97002073 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Crime prevention. |0 http://id.loc.gov/authorities/subjects/sh85034011 | |
650 | 2 | |a Data Mining |0 https://id.nlm.nih.gov/mesh/D057225 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 2 | |a Crime |x prevention & control |0 https://id.nlm.nih.gov/mesh/D003415Q000517 | |
650 | 6 | |a Exploration de données (Informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Criminalité |x Prévention. | |
650 | 7 | |a crime prevention. |2 aat | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Intelligence artificielle. |2 eclas | |
650 | 7 | |a Rassemblement des données. |2 eclas | |
650 | 7 | |a Restitution des données. |2 eclas | |
650 | 7 | |a Sécurité informatique. |2 eclas | |
650 | 7 | |a Prévention du crime. |2 eclas | |
650 | 7 | |a Systèmes experts. |2 eclas | |
651 | 7 | |a Etats-Unis d'Amérique. |2 eclas | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Crime prevention |2 fast | |
650 | 7 | |a Data mining |2 fast | |
650 | 7 | |a Data Mining |2 gnd |0 http://d-nb.info/gnd/4428654-5 | |
650 | 7 | |a Innere Sicherheit |2 gnd | |
758 | |i has work: |a Investigative data mining for security and criminal detection (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGtWQ4kmHHmPkX9Gg7jCjP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Mena, Jesus. |t Investigative data mining for security and criminal detection. |d Amsterdam ; Boston, MA : Butterworth-Heinemann, ©2003 |z 0750676132 |z 9780750676137 |w (DLC) 2002043619 |w (OCoLC)51171911 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=204203 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL298033 | ||
938 | |a ebrary |b EBRY |n ebr10175519 | ||
938 | |a EBSCOhost |b EBSC |n 204203 | ||
938 | |a YBP Library Services |b YANK |n 2613949 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn172989411 |
---|---|
_version_ | 1816881653304262657 |
adam_text | |
any_adam_object | |
author | Mena, Jesus |
author_GND | http://id.loc.gov/authorities/names/n99021630 |
author_facet | Mena, Jesus |
author_role | |
author_sort | Mena, Jesus |
author_variant | j m jm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 M44 2003eb |
callnumber-search | QA76.9.D343 M44 2003eb |
callnumber-sort | QA 276.9 D343 M44 42003EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Pre-Crime Data Mining -- Investigative Data Warehousing -- Link Analysis: Visualizing Associations -- Intelligent Agents: Software Detectives -- Text Mining: Clustering Concepts -- Neural Networks: Classifying Patterns -- Machine Learning: Developing Profiles -- NetFraud: A Case Study -- Criminal Patterns: Detection Techniques -- Intrusion Detection: Techniques and Systems -- An Entity Validation System (EVS): A Conceptual Architecture -- Mapping Crime: Clustering CaseWork -- Appendix A: 1,000 Online Sources for the Forensic Data Miner 00 Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects. |
ctrlnum | (OCoLC)172989411 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04772cam a2200865 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn172989411</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070918s2003 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">WSU</subfield><subfield code="d">EBLCP</subfield><subfield code="d">E7B</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCA</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCA</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">226377299</subfield><subfield code="a">648243382</subfield><subfield code="a">1033477209</subfield><subfield code="a">1033617584</subfield><subfield code="a">1035051964</subfield><subfield code="a">1162065210</subfield><subfield code="a">1241796002</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509389</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050938X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750676137</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750676132</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281022462</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281022462</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611022464</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611022465</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0750676132</subfield><subfield code="q">(pbk. ;</subfield><subfield code="q">alk. paper)</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780750676137</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)172989411</subfield><subfield code="z">(OCoLC)226377299</subfield><subfield code="z">(OCoLC)648243382</subfield><subfield code="z">(OCoLC)1033477209</subfield><subfield code="z">(OCoLC)1033617584</subfield><subfield code="z">(OCoLC)1035051964</subfield><subfield code="z">(OCoLC)1162065210</subfield><subfield code="z">(OCoLC)1241796002</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D343</subfield><subfield code="b">M44 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mena, Jesus.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n99021630</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Investigative data mining for security and criminal detection /</subfield><subfield code="c">Jesús Mena.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston, MA :</subfield><subfield code="b">Butterworth-Heinemann,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 452 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Pre-Crime Data Mining -- Investigative Data Warehousing -- Link Analysis: Visualizing Associations -- Intelligent Agents: Software Detectives -- Text Mining: Clustering Concepts -- Neural Networks: Classifying Patterns -- Machine Learning: Developing Profiles -- NetFraud: A Case Study -- Criminal Patterns: Detection Techniques -- Intrusion Detection: Techniques and Systems -- An Entity Validation System (EVS): A Conceptual Architecture -- Mapping Crime: Clustering CaseWork -- Appendix A: 1,000 Online Sources for the Forensic Data Miner 00 Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Data mining has traditionally been used to predict consumer behaviour, but in the wake of 9/11, the same tools and techniques can also be used to detect and validate the identity of threatening and criminal entities for security purposes.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh97002073</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Crime prevention.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034011</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D057225</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Crime</subfield><subfield code="x">prevention & control</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D003415Q000517</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité</subfield><subfield code="x">Prévention.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">crime prevention.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligence artificielle.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rassemblement des données.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Restitution des données.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Prévention du crime.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes experts.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Etats-Unis d'Amérique.</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Crime prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data Mining</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4428654-5</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Investigative data mining for security and criminal detection (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGtWQ4kmHHmPkX9Gg7jCjP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Mena, Jesus.</subfield><subfield code="t">Investigative data mining for security and criminal detection.</subfield><subfield code="d">Amsterdam ; Boston, MA : Butterworth-Heinemann, ©2003</subfield><subfield code="z">0750676132</subfield><subfield code="z">9780750676137</subfield><subfield code="w">(DLC) 2002043619</subfield><subfield code="w">(OCoLC)51171911</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=204203</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL298033</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10175519</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">204203</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613949</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | Etats-Unis d'Amérique. eclas |
geographic_facet | Etats-Unis d'Amérique. |
id | ZDB-4-EBA-ocn172989411 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:08Z |
institution | BVB |
isbn | 9780080509389 008050938X 9780750676137 0750676132 1281022462 9781281022462 9786611022464 6611022465 |
language | English |
oclc_num | 172989411 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 452 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Butterworth-Heinemann, |
record_format | marc |
spelling | Mena, Jesus. http://id.loc.gov/authorities/names/n99021630 Investigative data mining for security and criminal detection / Jesús Mena. Amsterdam ; Boston, MA : Butterworth-Heinemann, ©2003. 1 online resource (xvi, 452 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Pre-Crime Data Mining -- Investigative Data Warehousing -- Link Analysis: Visualizing Associations -- Intelligent Agents: Software Detectives -- Text Mining: Clustering Concepts -- Neural Networks: Classifying Patterns -- Machine Learning: Developing Profiles -- NetFraud: A Case Study -- Criminal Patterns: Detection Techniques -- Intrusion Detection: Techniques and Systems -- An Entity Validation System (EVS): A Conceptual Architecture -- Mapping Crime: Clustering CaseWork -- Appendix A: 1,000 Online Sources for the Forensic Data Miner 00 Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects. Print version record. Data mining has traditionally been used to predict consumer behaviour, but in the wake of 9/11, the same tools and techniques can also be used to detect and validate the identity of threatening and criminal entities for security purposes. English. Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Computer security. Crime prevention. http://id.loc.gov/authorities/subjects/sh85034011 Data Mining https://id.nlm.nih.gov/mesh/D057225 Computer Security https://id.nlm.nih.gov/mesh/D016494 Crime prevention & control https://id.nlm.nih.gov/mesh/D003415Q000517 Exploration de données (Informatique) Sécurité informatique. Criminalité Prévention. crime prevention. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligence artificielle. eclas Rassemblement des données. eclas Restitution des données. eclas Sécurité informatique. eclas Prévention du crime. eclas Systèmes experts. eclas Etats-Unis d'Amérique. eclas Computer security fast Crime prevention fast Data mining fast Data Mining gnd http://d-nb.info/gnd/4428654-5 Innere Sicherheit gnd has work: Investigative data mining for security and criminal detection (Text) https://id.oclc.org/worldcat/entity/E39PCGtWQ4kmHHmPkX9Gg7jCjP https://id.oclc.org/worldcat/ontology/hasWork Print version: Mena, Jesus. Investigative data mining for security and criminal detection. Amsterdam ; Boston, MA : Butterworth-Heinemann, ©2003 0750676132 9780750676137 (DLC) 2002043619 (OCoLC)51171911 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=204203 Volltext |
spellingShingle | Mena, Jesus Investigative data mining for security and criminal detection / Pre-Crime Data Mining -- Investigative Data Warehousing -- Link Analysis: Visualizing Associations -- Intelligent Agents: Software Detectives -- Text Mining: Clustering Concepts -- Neural Networks: Classifying Patterns -- Machine Learning: Developing Profiles -- NetFraud: A Case Study -- Criminal Patterns: Detection Techniques -- Intrusion Detection: Techniques and Systems -- An Entity Validation System (EVS): A Conceptual Architecture -- Mapping Crime: Clustering CaseWork -- Appendix A: 1,000 Online Sources for the Forensic Data Miner 00 Appendix B: Intrusion Detection Systems (IDS) Products, Services, Freeware and Projects. Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Computer security. Crime prevention. http://id.loc.gov/authorities/subjects/sh85034011 Data Mining https://id.nlm.nih.gov/mesh/D057225 Computer Security https://id.nlm.nih.gov/mesh/D016494 Crime prevention & control https://id.nlm.nih.gov/mesh/D003415Q000517 Exploration de données (Informatique) Sécurité informatique. Criminalité Prévention. crime prevention. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligence artificielle. eclas Rassemblement des données. eclas Restitution des données. eclas Sécurité informatique. eclas Prévention du crime. eclas Systèmes experts. eclas Computer security fast Crime prevention fast Data mining fast Data Mining gnd http://d-nb.info/gnd/4428654-5 Innere Sicherheit gnd |
subject_GND | http://id.loc.gov/authorities/subjects/sh97002073 http://id.loc.gov/authorities/subjects/sh85034011 https://id.nlm.nih.gov/mesh/D057225 https://id.nlm.nih.gov/mesh/D016494 https://id.nlm.nih.gov/mesh/D003415Q000517 http://d-nb.info/gnd/4428654-5 |
title | Investigative data mining for security and criminal detection / |
title_auth | Investigative data mining for security and criminal detection / |
title_exact_search | Investigative data mining for security and criminal detection / |
title_full | Investigative data mining for security and criminal detection / Jesús Mena. |
title_fullStr | Investigative data mining for security and criminal detection / Jesús Mena. |
title_full_unstemmed | Investigative data mining for security and criminal detection / Jesús Mena. |
title_short | Investigative data mining for security and criminal detection / |
title_sort | investigative data mining for security and criminal detection |
topic | Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Computer security. Crime prevention. http://id.loc.gov/authorities/subjects/sh85034011 Data Mining https://id.nlm.nih.gov/mesh/D057225 Computer Security https://id.nlm.nih.gov/mesh/D016494 Crime prevention & control https://id.nlm.nih.gov/mesh/D003415Q000517 Exploration de données (Informatique) Sécurité informatique. Criminalité Prévention. crime prevention. aat COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Intelligence artificielle. eclas Rassemblement des données. eclas Restitution des données. eclas Sécurité informatique. eclas Prévention du crime. eclas Systèmes experts. eclas Computer security fast Crime prevention fast Data mining fast Data Mining gnd http://d-nb.info/gnd/4428654-5 Innere Sicherheit gnd |
topic_facet | Data mining. Computer security. Crime prevention. Data Mining Computer Security Crime prevention & control Exploration de données (Informatique) Sécurité informatique. Criminalité Prévention. crime prevention. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Intelligence artificielle. Rassemblement des données. Restitution des données. Prévention du crime. Systèmes experts. Etats-Unis d'Amérique. Computer security Crime prevention Data mining Innere Sicherheit |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=204203 |
work_keys_str_mv | AT menajesus investigativedataminingforsecurityandcriminaldetection |