Ranking chat logs for crime investigation
نویسندگان
چکیده
منابع مشابه
Detection of Topic Change in IRC Chat Logs
We attack the problem of topic segmentation in the domain of Internet Relay Chat logs. In this process, we examine the previous work in text segmentation using a variety of methods. After considering the pros and cons of the methods, we employ Text Tiling, pause detection, and latent semantic analysis because they did not require the usage of large pre-tagged corpora. With these systems in plac...
متن کاملRanking Entities Using Web Search Query Logs
Searching for entities is an emerging task in Information Retrieval for which the goal is finding well defined entities instead of documents matching the query terms. In this paper we propose a novel approach to Entity Retrieval by using Web search engine query logs. We use Markov random walks on (1) Click Graphs – built from clickthrough data – and on (2) Session Graphs – built from user sessi...
متن کاملBayesian Inferential Reasoning Model for Crime Investigation
Forensic inferential reasoning is a “fact-finding” journey for crime investigation and evidence presentation. In complex legal practices involving various forms of evidence, conventional decision making processes based on human intuition and piece-to-piece evidence explanation often fail to reconstruct meaningful and convincing legal hypothesis. It is necessary to develop logical system for evi...
متن کاملNew Model for Cyber Crime Investigation Procedure
In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...
متن کاملThe Roadmap for Cyber Crime Investigation
As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. This paper i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: MATEC Web of Conferences
سال: 2020
ISSN: 2261-236X
DOI: 10.1051/matecconf/202030902007