Designing a Data Warehouse for Cyber Crimes
نویسندگان
چکیده
منابع مشابه
Designing a Data Warehouse for Cyber Crimes
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore de...
متن کاملDesigning a Data Warehouse
Creating the Data Warehouse Data Model Moral: A good data warehouse model is a synthesis of diverse non-traditional factors. A data warehouse model must be comprehensive, current and dynamic, and provide a complete picture of the physical reality of the warehouse as it evolves. The data warehouse database schema should be generated and maintained directly from the model. The model not just a de...
متن کاملA framework for designing a healthcare outcome data warehouse.
Many healthcare processes involve a series of patient visits or a series of outcomes. The modeling of outcomes associated with these types of healthcare processes is different from and not as well understood as the modeling of standard industry environments. For this reason, the typical multidimensional data warehouse designs that are frequently seen in other industries are often not a good mat...
متن کاملHeuristic Algorithms for Designing a Data Warehouse with SPJ Views
A Data Warehouse (DW) can be abstractly seen as a set of materialized views de ned over relations that are stored in distributed heterogeneous databases. The selection of views for materialization in a DW is thus an important decision problem. The objective is the minimization of the combination of the query evaluation and view maintenance costs. In this paper we expand on our previous work by ...
متن کاملDesigning the Data Warehouse for Effective Data Mining
Data mining is slowly gaining acceptance as a method for obtaining business intelligence from corporate data banks. This market has largely been driven by the development of desktop tools, such as IBM’s Intelligent Miner, SGI’s MineSet and ISL’s Clementine. These tools offer a variety of techniques for automatically extracting potentially useful patterns from large data sets (Frawley, Piatetsky...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Digital Forensics, Security and Law
سال: 2006
ISSN: 1558-7223
DOI: 10.15394/jdfsl.2006.1007