[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1146598.1146618acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
Article

COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research

Published: 21 May 2006 Publication History

Abstract

In this paper, we describe the highlights of the COPLINK Center for law enforcement and homeland security project. Two new components of the project are described, namely, identity resolution and mutual information.

References

[1]
Chen H., D. Zeng, H. Atabakhsh, W. Wyzga, and J. Schroeder, "COPLINK managing law enforcement data and knowledge," Communications of the ACM, vol. 46, pp. 28--34, 2003.
[2]
G. Wang, "A Multi-Layer Graphical Model for Approximate Identity Matching," In Proceedings of the AIS Americas Conference on Information Systems (AMCIS 2005), Omaha, NE, USA, August 11--14, 2005.
[3]
Kaza, S., Wang, T., Gowda, H. and Chen, H. Target Vehicle Identification using Mutual Information. In Proceedings of the 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria, 2005.

Cited By

View all
  • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
  • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
  • (2019) Dynamic Ad Hoc Social Networks in Improvised Intelligence/Counter-Intelligence Exercises: A Department of Homeland Security Red-Team Blue-Team Live-Action Roleplay Journal of Homeland Security and Emergency Management10.1515/jhsem-2018-002717:1Online publication date: 13-Jun-2019
  • Show More Cited By

Index Terms

  1. COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          dg.o '06: Proceedings of the 2006 international conference on Digital government research
          May 2006
          526 pages

          Sponsors

          • NSF: National Science Foundation

          Publisher

          Digital Government Society of North America

          Publication History

          Published: 21 May 2006

          Check for updates

          Author Tags

          1. border safety
          2. data mining
          3. homeland security
          4. identity matching
          5. intelligence and security informatics
          6. law enforcement
          7. mutual information
          8. naïve bayes model
          9. semi-supervised learning

          Qualifiers

          • Article

          Conference

          dg.o '06
          Sponsor:
          • NSF
          dg.o '06: Digital government research
          May 21 - 24, 2006
          California, San Diego, USA

          Acceptance Rates

          dg.o '06 Paper Acceptance Rate 20 of 58 submissions, 34%;
          Overall Acceptance Rate 150 of 271 submissions, 55%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)1
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 02 Mar 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
          • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
          • (2019) Dynamic Ad Hoc Social Networks in Improvised Intelligence/Counter-Intelligence Exercises: A Department of Homeland Security Red-Team Blue-Team Live-Action Roleplay Journal of Homeland Security and Emergency Management10.1515/jhsem-2018-002717:1Online publication date: 13-Jun-2019
          • (2018)Immersive Visualisation of Geo-Temporal Narratives in Law Enforcement2018 International Symposium on Big Data Visual and Immersive Analytics (BDVA)10.1109/BDVA.2018.8533896(1-8)Online publication date: Oct-2018
          • (2017)Applying intelligent methods in detecting maritime smugglingMaritime Economics & Logistics10.1057/mel.2016.319:3(573-599)Online publication date: 22-Aug-2017
          • (2011)Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree ApproachesInternational Journal of Electronic Commerce10.2753/JEC1086-441515030615:3(123-147)Online publication date: 1-Apr-2011

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media