Catalogue canadien de recherches policières

Mining criminal networks from unstructured text documents / Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youssef, Francis Fortin.

Cette page Web a été archivée dans le Web

L’information dont il est indiqué qu’elle est archivée est fournie à des fins de référence, de recherche ou de tenue de documents. Elle n’est pas assujettie aux normes Web du gouvernement du Canada et elle n’a pas été modifiée ou mise à jour depuis son archivage. Pour obtenir cette information dans un autre format, veuillez communiquer avec nous.

Localisation

Recherches policières canadienne

Ressource

Livres électroniques

Auteurs

Publié

  • [Place of publication not identified] : [Elsevier], 2012.

Bibliographie

Includes bibliographical references.

Description

1 online resource (29 pages)

Note

"January 31, 2012".
Issued in Digital Investigation, 8 (3-4). pp. 147-160. ISSN 17422876
Author(s) affiliated with: Concordia Institute for Information Systems Engineering; Sûreté du Québec.

Résumé

"Digital data collected for forensics analysis often contain valuable information about the suspects’ social networks. However, most collected records are in the form of unstructured textual data, such as e-mails, chat messages, and text documents. An investigator often has to manually extract the useful information from the text and then enter the important pieces into a structured database for further investigation by using various criminal network analysis tools. Obviously, this information extraction process is tedious and error-prone. Moreover, the quality of the analysis varies by the experience and expertise of the investigator. In this paper, we propose a systematic method to discover criminal networks from a collection of text documents obtained from a suspect’s machine, extract useful information for investigation, and then visualize the suspect’s criminal network. Furthermore, we present a hypothesis generation approach to identify potential indirect relationships among the members in the identified networks. We evaluated the effectiveness and performance of the method on a real-life cybercrime case and some other datasets. The proposed method, together with the implemented software tool, has received positive feedback from the digital forensics team of a law enforcement unit in Canada."

Sujet

Accès en ligne

Édition

Preprint version.

Date de modification :