A Visual Analytics Approach for Crime Signature Generation and Exploration

نویسندگان

  • Wolfgang Jentner
  • Geoffrey Ellis
  • Florian Stoffel
  • Dominik Sacha
  • Daniel Keim
چکیده

The exploration of volumes of crime reports is a tedious task in crime intelligence analysis, given the largely unstructured nature of the crime descriptions. This paper describes a Visual Analytics approach for crime signature exploration that tightly integrates automated event sequence extraction and signature mining with interactive visualization. We describe the major components of our analysis pipeline — crime concept/event extraction, crime sequence mining, and interactive visualization. We illustrate its applicability with a real world use case. Finally, we discuss current problems, future plans, and open challenges in our development of a solution that incorporates automated event pattern mining with human expert feedback.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spherical Similarity Explorer for Comparative Case Analysis

Comparative Case Analysis (CCA) is an important tool for criminal investigation and crime theory extraction. It analyzes the commonalities and differences between a collection of crime reports in order to understand crime patterns and identify abnormal cases. A big challenge of CCA is the data processing and exploration. Traditional manual approach can no longer cope with the increasing volume ...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

A Novel Patch-Based Digital Signature

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

متن کامل

Support the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems

We present a vision of next-generation visual analytics services. We argue that these services should have three related capabilities: support visual and interactive data exploration as they do today, but also suggest relevant data to enrich visualizations, and facilitate the integration and cleaning of that data. Most importantly, they should provide all these capabilities seamlessly in the co...

متن کامل

Toward Supporting the Data Enthusiast: Unlocking the Potential of Data for Analysis

We present a vision for the next-generation of visual analytics services. We argue that these services should provide three related capabilities: (1) support visual and interactive data exploration as they do today, but also (2) suggest relevant data to enrich visualizations, and (3) facilitate the integration and cleaning of that data. Most importantly, they should provide all these capabiliti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016