A Visual Analytics Approach for Crime Signature Generation and Exploration
نویسندگان
چکیده
The exploration of volumes of crime reports is a tedious task in crime intelligence analysis, given the largely unstructured nature of the crime descriptions. This paper describes a Visual Analytics approach for crime signature exploration that tightly integrates automated event sequence extraction and signature mining with interactive visualization. We describe the major components of our analysis pipeline — crime concept/event extraction, crime sequence mining, and interactive visualization. We illustrate its applicability with a real world use case. Finally, we discuss current problems, future plans, and open challenges in our development of a solution that incorporates automated event pattern mining with human expert feedback.
منابع مشابه
Spherical Similarity Explorer for Comparative Case Analysis
Comparative Case Analysis (CCA) is an important tool for criminal investigation and crime theory extraction. It analyzes the commonalities and differences between a collection of crime reports in order to understand crime patterns and identify abnormal cases. A big challenge of CCA is the data processing and exploration. Traditional manual approach can no longer cope with the increasing volume ...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کاملA Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملSupport the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems
We present a vision of next-generation visual analytics services. We argue that these services should have three related capabilities: support visual and interactive data exploration as they do today, but also suggest relevant data to enrich visualizations, and facilitate the integration and cleaning of that data. Most importantly, they should provide all these capabilities seamlessly in the co...
متن کاملToward Supporting the Data Enthusiast: Unlocking the Potential of Data for Analysis
We present a vision for the next-generation of visual analytics services. We argue that these services should provide three related capabilities: (1) support visual and interactive data exploration as they do today, but also (2) suggest relevant data to enrich visualizations, and (3) facilitate the integration and cleaning of that data. Most importantly, they should provide all these capabiliti...
متن کامل