Security

Data Mining Techniques for Crime/Terror Databases

Download Now Free registration required

Executive Summary

There have been several developments in data mining and the technology is being used for a wide variety of applications. It is also becoming a useful tool for detecting and preventing crime and terrorism. This paper will begin with an overview of the application field or the crime types with levels of concern and then gradually narrow down to the field of terrorism. The authors shall figuratively bring out potential areas for applying data mining for counter-terrorism and bring out certain examples of application of various data mining techniques. They shall then discuss some technical challenges for data mining as applied for counter-terrorism applications.

  • Format: PDF
  • Size: 633.17 KB