Using data mining to discover the preferences of computer criminals

被引:2
|
作者
Brown, DE [1 ]
Gunderson, LF [1 ]
机构
[1] Univ Virginia, Dept Syst & Informat Eng, Charlottesville, VA 22904 USA
来源
关键词
D O I
10.1016/S0065-2458(02)80010-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:343 / 373
页数:31
相关论文
共 50 条
  • [1] Using clustering to discover the preferences of computer criminals
    Brown, DE
    Gunderson, LF
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 311 - 318
  • [2] Using data-mining to allow robots to discover the preferences of humans
    Gunderson, LF
    Gunderson, JP
    [J]. INTERNATIONAL CONFERENCE ON INTEGRATION OF KNOWLEDGE INTENSIVE MULTI-AGENT SYSTEMS: KIMAS'03: MODELING, EXPLORATION, AND ENGINEERING, 2003, : 438 - 443
  • [3] Automatic Tracking of Criminals using Data Mining Techniques
    G. W. Jiji
    S. Anantharadha
    [J]. Journal of The Institution of Engineers (India): Series B, 2012, 93 (4) : 217 - 221
  • [4] Data mining to discover enterprise networks
    Hajlaoui, Kafil
    Boucher, Xavier
    Mathieu, Mihaela
    [J]. PERVASIVE COLLABORATIVE NETWORKS, 2008, 283 : 137 - 144
  • [5] Data mining to discover learning styles
    Duran, Elena
    Costaguta, Rosanna
    [J]. REVISTA IBEROAMERICANA DE EDUCACION, 2007, 42 (02):
  • [6] Pharmaceutics Data mining to discover secondary effects
    Deroin, Philippe
    [J]. BIOFUTUR, 2012, (332) : 9 - 9
  • [7] Using data mining to discover signatures in network-based intrusion detection
    Han, H
    Lu, XL
    Ren, LY
    [J]. 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 13 - 17
  • [8] Using Data Mining to Discover the Correlation between Web Learning Portfolios and Achievements
    Chen, Chien-Ming
    Ma, Cheng-Hao
    Jong, Bin-Shyan
    Hsia, Yen-Teh
    Lin, Tsong-Wuu
    [J]. FIE: 2008 IEEE FRONTIERS IN EDUCATION CONFERENCE, VOLS 1-3, 2008, : 752 - +
  • [9] COMPUTER CRIMINALS
    KOHN, AA
    [J]. JOURNAL OF CRIMINAL LAW CRIMINOLOGY AND POLICE STUDIES, 1969, 60 (01): : 1 - 2
  • [10] COMPUTER CRIMINALS
    不详
    [J]. INTELLECT, 1977, 106 (2390): : 187 - 187