367
Views
25
CrossRef citations to date
0
Altmetric
Original Articles

EVIDENCE DIRECTED GENERATION OF PLAUSIBLE CRIME SCENARIOS WITH IDENTITY RESOLUTION

, &
Pages 253-276 | Published online: 12 Apr 2010

REFERENCES

  • Badia , A. , and M. M. Kantardzic . 2005 . Link analysis tools for intelligence and counterterrorism . In Proceedings of IEEE International Conference on Intelligence and Security Informatics , 49 – 59 . Atlanta , Georgia : Springer Berlin .
  • Boongoen , T. , and Q. Shen . 2008 . Detecting false identity through behavioural patterns . In Proceedings of International Crime Science Conference , London , UK : Willan Publishing .
  • Boongoen , T. , Q. Shen , and C. Price . Disclosing false identity through hybrid link analysis . AI and Law , In press (DOI: 10.1007/510506-010-9085-9)
  • Branting , K. 2003 . A comparative evaluation of name matching algorithms . In Proceedings of International Conference on AI and Law , 224 – 232 . Edinburgh , Scotland : ACM .
  • Cooman , G. D. 2005 . A behavioural model for vague probability assessments . Fuzzy Sets Syst. , 154 : 305 – 358 .
  • Fu , X. , and Q. Shen . 2009. A novel framework of fuzzy complex numbers and its application to compositional modelling. In Proceedings of the 2009 IEEE International Conference on Fuzzy Systems, 536–541. ICC , Jeju Island, Korea : IEEE.
  • Fu , X. , Q. Shen , and R. Zhao . 2007 . Towards fuzzy compositional modelling . In Proceedings of the 16th International Conference on Fuzzy Systems , 1233 – 1238 . London , UK : IEEE .
  • Halliwell , J. , and Q. Shen . 2009 . Linguistic probabilities: theory and application . Soft Computing , 13 : 169 – 183 .
  • Halliwell , J. , J. Keppens , and Q. Shen . 2003 . Linguistic bayesian networks for reasoning with subjective probabilities in forensic statistics . In Proceedings of International Conference on Artificial Intelligence and Law , 42 – 50 . Edinburgh , Scotland : ACM .
  • Hsiung , P. , A. Moore , D. Neill , and J. Schneider . 2005 . Alias detection in link data sets . In Proceedings of International Conference on Intelligence Analysis , McLean , VA : International Conference on Intelligence Analysis .
  • Jeh , G. , and J. Widom . 2002 . Simrank: A measure of structural-context similarity . In Proceedings of International Conference on Knowledge Discovery and Data Mining , 538 – 543 . Edmonton , Alberta : ACM .
  • Keppens , J. , and Q. Shen . 2001 . On compositional modelling . Knowledge Engineering Review , 16 : 157 – 200 .
  • Keppens , J. , Q. Shen , and B. Schafer . 2005 . Probabilistic abductive computation of evidence collection strategies in crime investigation . In Proceedings of International Conference on Artificial Intelligence and Law , 215 – 224 . Bologna , Italy : ACM .
  • Klink , S. , P. Reuther , A. Weber , B. Walter , and M. Ley . 2006 . Analysing social networks within bibliographical data . In Proceedings of the 17th International Conference on Database and Expert Systems Applications , 234 – 243 . Krakow , Poland : Springer Verlag .
  • Liben-Nowell , D. , and J. Kleinberg . 2007 . The link-prediction problem for social networks . Journal of the American Society for Information Science and Technology , 58 : 1019 – 1031 .
  • Pantel , P. 2006 . Alias detection in malicious environments . In Proceedings of AAAI Fall Symposium on Capturing and Using Patterns for Evidence Detection , Washington , DC , 14 – 20 .
  • Shen , Q. , J. Keppens , C. Aitken , B. Schafer , and M. Lee . 2006 . A scenario-driven decision support system for serious crime investigation . Law, Probability and Risk , 5 : 87 – 117 .
  • Wang , G. A. , H. Atabakhsh , T. Petersen , and H. Chen . 2005 . Discovering identity problems: A case study . In Proceedings of IEEE International Conference on Intelligence and Security Informatics , Atlanta , 368 – 373 .
  • Wang , G. A. , H. Chen , J. J. Xu , and H. Atabakhsh . 2006 . Automatically detecting criminal identity deception: an adaptive detection algorithm . IEEE Transactions on Systems, Man and Cybernetics, Part A , 36 : 988 – 999 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.