Download References

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
References
[1]
N. Lavesson, M. Boldt, P. Davidsson, and A. Jacobsson. Learning
to detect spyware using end user license agreements. Knowledge
and Information Systems, 2(3):285–307, 2011.
[2]
Anton Borg, Martin Boldt, Niklas Lavesson, Ulf Melander, and
Veselka Boeva. Detecting Serial Residential Burglaries using Clustering. Expert Systems With Applications, February 2014.
[3]
Sean B Eom, SM Lee, and EB Kim. A survey of decision support
system applications (1988-1994). Journal of the Operational Research
Society, 49(2):109–120, 1998.
[4]
Sean B Eom and E. Kim. A survey of decision support system
applications (1995-2001). Journal of the Operational Research Society,
57(11):1264–1278, 2005.
[5]
Hyon B. Eom and Sang M. Lee. A survey of decision support
system applications (1971-april 1988). Interfaces, 20(3):65–79, 1990.
[6]
Giles Oatley, Brian Ewart, and John Zeleznikow. Decision support
systems for police: lessons from the application of data mining
techniques to "soft" forensic evidence. Artificial Intelligence and Law,
14(1), January 2006.
[7]
Jerry H Ratcliffe. Aoristic Signatures and the Spatio-Temporal
Analysis of High Volume Crime Patterns. Journal of Quantitative
Criminology, 18(1):23–43, 2002.
173
References
[8]
Daniel J Power.
A brief history of decision support systems.
DSSResourcescom,
World Wide Web,
http://DSSResources.COM/history/dsshistory.html, version 4.0, March
2007.
[9]
Daniel J Power. Supporting decision-makers: An expanded framework. In Proceedings of Informing Science Conference, pages 431–436,
June 2001.
[10]
Tom M. Mitchell. Machine learning. McGraw-Hill, March 1997.
[11]
Ian H Witten and Eibe Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann Publications, January
2005.
[12]
Satu Elisa Schaeffer. Graph clustering. Computer Science Review,
1(1):27–64, August 2007.
[13]
S M Kamruzzaman, Farhana Haider, and Ahmed Ryadh Hasan.
Text classification using data mining. In Proceddings of International
Conference on Information and Communication Technology in Management (ICTM-2005), May 2005.
[14]
Thiago S Guzella and Walmir M Caminhas. A review of machine
learning approaches to spam filtering. Expert Systems With Applications, 36(7):10206–10222, 2009.
[15]
C Bennell and D V Canter. Linking commercial burglaries by
modus operandi: tests using regression and ROC analysis. Science & justice: journal of the Forensic Science Society, 42(3):153, 2002.
[16]
Sean B Eom. Decision support systems research: current state and
trends. Industrial Management & Data Systems, 99(5):213–221, 1999.
[17]
J.P. Shim, Merrill Warkentin, James F Courtney, Daniel J Power,
Ramesh Sharda, and Christer Carlsson. Past, present, and future of
decision support technology. Decision Support Systems, 33(2):111–
126, 2002.
[18]
Ren Jieh Kuo, C.H. Chen, and Y.C. Hwang. An intelligent stock
trading decision support system through integration of genetic algorithm based fuzzy neural network and artificial neural network.
Fuzzy Sets and Systems, 118(1):21–45, February 2001.
174
References
[19] Cong Tran, Lakhmi Jain, and Ajith Abraham. Adaptation of mamdani fuzzy inference system using neuro - genetic approach for
tactical air combat decision support system. In Proceedings of 15th
Australian Joint Conference on Artificial Intelligence (AI’02), pages
672–679, 2002.
[20] Jaroslav Mysiak, Carlo Giupponi, and Paolo Rosato. Towards the
development of a decision support system for water resource management. Environmental Modelling & Software, 20(2):203–214, 2003.
[21] Sean B Eom and Sandy Butters. Decision support systems in the
healthcare industry. Journal of Systems Management, 43(6):28–31,
1992.
[22] Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, and Noor Maizura Mohamad Noor. Decision support systems (dss) in construction tendering processes. International Journal
of Computer Science Issues, 7(2):35–45, March 2010.
[23] Vipul Ved Prakash and Adam O’Donnell. Fighting spam with
reputation systems. Queue, 3(9):36–41, November 2005.
[24] Kevin Walsh and Emin Gün Sirer. Fighting peer-to-peer spam
and decoys with object reputation. In Proceedings of 2005 ACM
SIGCOMM workshop on Economics of peer-to-peer systems, pages 138–
143, New York, NY, USA, August 2005. ACM Press.
[25] Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. Ipgrouprep:
A novel reputation based system for anti-spam. In Proceedings of
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pages 513–518. IEEE, 2009.
[26] Dongmei Jia. Cost-effective spam detection in p2p file-sharing systems. In Proceedings of 2008 ACM workshop on Large-Scale distributed
systems for information retrieval (LSDS-IR ’08), pages 19–26. ACM
Request Permissions, October 2008.
[27] William W Cohen. Learning rules that classify e-mail. In Proceedings of AAAI Spring Symposium on Machine Learning in Information
Access, pages 18–25, 1996.
175
References
[28]
Ray Hunt and James Carpinter. Current and new developments in
spam filtering. In Proceedings of 14th IEEE International Conference
on Networks, January 2006.
[29]
M Tariq Banday and Tariq R Jan. Effectiveness and limitations of
statistical spam filters. In Proceedings of International Conference on
New Trends in Statistics and Optimization, 2008.
[30]
Giles Oatley, Brian Ewart, and John Zeleznikow. Decision support
systems for police: Lessons from the application of data mining
techniques to “soft” forensic evidence. Artificial Intelligence and
Law, 14(1-2):35–100, July 2006.
[31]
Yifei Xue and D E Brown. A decision model for spatial site selection by criminals: a foundation for law enforcement decision
support. Systems, Man, and Cybernetics, Part C: Applications and
Reviews, IEEE Transactions on, 33(1):78–85, 2003.
[32]
Shuai Wang, Xiaojuan Li, Ying Cai, and Jie Tian. Spatial and temporal distribution and statistic method applied in crime events
analysis. In Geoinformatics, 2011 19th International Conference on,
pages 1–6, 2011.
[33]
Guiyun Zhou, Jiayuan Lin, and Wenfeng Zheng. A web-based geographical information system for crime mapping and decision
support. In Computational Problem-Solving (ICCP), 2012 International Conference on, pages 147–150, 2012.
[34]
Peter Phillips and Ickjai Lee. Crime analysis through spatial areal
aggregated density patterns. Geoinformatica, 15(1), January 2011.
[35]
S Chainey and J Ratcliffe. GIS and Crime Mapping. John Wiley &
Sons, Ltd, December 2005.
[36]
Jameson L Toole, Nathan Eagle, and Joshua B Plotkin. Spatiotemporal correlations in criminal offense records. Transactions on Intelligent Systems and Technology (TIST, 2(4), July 2011.
[37]
Jessica Woodhams, Clive R Hollin, and Ray Bull. The psychology
of linking crimes: A review of the evidence. Legal and Criminological Psychology, 12(2):233–249, December 2010.
176
References
[38] Craig Bennell, Natalie J Jones, and Tamara Melnyk. Addressing
problems with traditional crime linking methods using receiver
operating characteristic analysis. Legal and Criminological Psychology, 14(2):293–310, December 2010.
[39] Craig Bennell, Donna Gauthier, Donald Gauthier, Tamara Melnyk,
and Evanya Musolino. The impact of data degradation and sample size on the performance of two similarity coefficients used in
behavioural linkage analysis. Forensic Science International, 199(13):85–92, June 2010.
[40] Craig Bennell, Sarah Bloomfield, Brent Snook, Paul Taylor, and
Carolyn Barnes. Linkage analysis in cases of serial burglary: comparing the performance of university students, police professionals, and a logistic regression model. Psychology, Crime & Law,
16(6):507–524, July 2010.
[41] Lucy Markson, Jessica Woodhams, and John W Bond. Linking serial residential burglary: comparing the utility of modus operandi
behaviours, geographical proximity, and temporal proximity. Journal of Investigative Psychology and Offender Profiling, pages n/a–n/a,
2010.
[42] M Tonkin, J Woodhams, R Bull, J W Bond, and E J Palmer. Linking
Different Types of Crime Using Geographical and Temporal Proximity. Criminal Justice and Behavior, 38(11):1069–1088, September
2011.
[43] Craig Bennell and Natalie J Jones. Between a ROC and a hard
place: a method for linking serial burglaries bymodus operandi.
Journal of Investigative Psychology and Offender Profiling, 2(1):23–41,
2005.
[44] John W. Creswell. Research design: qualitative, quantitative, and mixed
methods approaches. Sage Publications, 2009.
[45] Claes Wohlin, Martin Höst, and Kennet Henningsson. Empirical
Research Methods in Software Engineering, volume 2765 of Lecture
Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.
177
References
[46]
Vigdis By Kampenes, Tore Dybå, Jo E Hannay, and Dag I K
Sjøberg. A systematic review of quasi-experiments in software
engineering. Information and Software Technology, 51(1):71–82, 2009.
[47]
Colin Robson. Real world research. a resource for social scientists and practitioner-researchers. Wiley-Blackwell, second edition,
2002.
[48]
Martin Boldt, Andreas Jacobsson, Niklas Lavesson, and Paul
Davidsson. Automated spyware detection using end user license
agreements. In Proceedings of the Second International Conference on
Information Security and Assurance, Busan, Korea, April 2008.
[49]
M Simeon and R Hilderman. Categorical proportional difference:
A feature selection method for text categorization. In Proceedings of
the Seventh Australasian Data Mining Conference, Glenelg, Australia,
Jan 2008.
[50]
S Yoo, Y Yang, Frank Lin, and Il-Chul Moon. Mining social networks for personalized email prioritization. 15th ACM SIGKDD
international conference on Knowledge discovery and data mining, January 2009.
[51]
C.Y. Tseng, J.W. Huang, and M.S. Chen. Promail: Using progressive email social network for spam detection. Advances in Knowledge Discovery and Data Mining, pages 833–840, 2007.
[52]
C. Bird, A. Gourley, P. Devanbu, M. Gertz, and A. Swaminathan.
Mining email social networks. 2006 international workshop on Mining software repositories, pages 137–143, 2006.
[53]
P O Boykin and V P Roychowdhury. Leveraging social networks
to fight spam. Computer, 38(4):61–68, January 2005.
[54]
John Quackenbush. Computational analysis of microarray data.
Nature Reviews Genetics, 2(6):418–427, 2001.
[55]
Yanhua Chen, Ming Dong, and M Rege. Gene Expression Clustering: a Novel Graph Partitioning Approach. In Neural Networks,
2007. IJCNN 2007. International Joint Conference on, pages 1542–
1547, 2007.
178
References
[56] S Datta and S Datta. Comparisons and validation of statistical
clustering techniques for microarray gene expression data. Bioinformatics, 19(4):459–466, March 2003.
[57] Daxin Jiang, Chun Tang, and Aidong Zhang. Cluster analysis for
gene expression data: a survey. Knowledge and Data Engineering,
IEEE Transactions on, 16(11):1370–1386, 2004.
[58] Ping Guo and Xiao-yan Deng. Gene Expression Data Cluster Analysis. In Information Engineering, 2009. ICIE ’09. WASE International
Conference on, pages 99–102, 2009.
[59] C Bennell, B Snook, S Macdonald, J C House, and P J Taylor. Computerized Crime Linkage Systems: A Critical Review and Research
Agenda. Criminal Justice and Behavior, 39(5):620–634, April 2012.
[60] Hsinchun Chen, Daniel Zeng, Homa Atabakhsh, Wojciech Wyzga,
and Jenny Schroeder. COPLINK: managing law enforcement data
and knowledge. Communications of the ACM, 46(1), January 2003.
[61] R Polikar. Ensemble based systems in decision making. Circuits
and Systems Magazine, IEEE, 6(3):21–45, 2006.
[62] Ed Skoudis. Malware - Fighting Malicious Code. Prentice Hall PTR,
Upper Saddle River NJ, 2004.
[63] Peter Szor. The Art of Computer Virus Research and Defence. Pearson
Education, Upper Saddle River NJ, 2005.
[64] T. Okamoto and Y. Ishida. A distributed approach to computer
virus detection and neutralization by autonomous heterogeneous
agents. In Proceedings of the 4th International Symposium on Autonomous Decentralized Systems, Tokyo, Japan, March 1999.
[65] W. Arnold and G. Tesauro. Automatically generated win32 heuristic virus detection. In Proceedings of the 10th International Virus Bulletin Conference, Orlando, USA, September 2000.
[66] J. O. Kephart. Biologically inspired defenses against computer
viruses. In Proceedings of the 14th International Joint Conference on
Artificial Intelligence, MontrÈal, Canada, January 1995.
179
References
[67]
G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware:
from a survey towards an established taxonomy. Journal in Computer Virology, 4(3), 2007.
[68]
Niklas Lavesson and Paul Davidsson. Evaluating learning algorithms and classifiers. Intelligent Information & Database Systems,
1(1):37–52, 2007.
[69]
N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector
Machines and other kernel-based learning methods. Cambridge University Press, West Nyack, NY, 2000.
[70]
A. M. Kibriya, E. Frank, B. Pfahringer, and G. Holmes. Multinomial naive bayes for text categorization revisited. In Proceedings
of the 17th Australian joint conference on artificial intelligence, Cairns,
Australia, December 2004.
[71]
I.H. Witten and E. Frank. Data Mining: Practical Machine Learning
Tools and Techniques. Elsevier, San Francisco, USA, 2005.
[72]
L. Larkey. Automatic essay grading using text categorization techniques. In Proceedings of the 21st International Conference on Research
and Development in Information Retrieval, Melbourne, Australia, Jan
1998.
[73]
S Scott and S Matwin. Feature engineering for text classification.
In Proceedings of the Sixteenth International Conference on Machine
Learning, Seattle, USA, Jan 1999.
[74]
W Cavnar and J Trenkle. N-gram-based text categorization. In
Proceedings of the 3rd Annual Symposium on Document Analysis and
Information Retrieval, Hong Kong, China, Jan 1994.
[75]
M Rogati and Y Yang. High-performing feature selection for text
classification. In Proceedings of the Eleventh International Conference
on Information and Knowledge Management, McLean, USA, Jan 2002.
[76]
Y Yang and J Pedersen. A comparative study on feature selection
in text categorization. In Proceedings of the Fourteenth International
Conference on Machine Learning, San Francisco, USA, Jan 1997.
180
References
[77] Fabrizio Sebastiani. Classification of text, automatic. In The Encyclopedia of Language and Linguistics, pages 457–463. Elsevier Science
Publishers, 2006.
[78] L Breiman. Random forests. Machine learning, 45(1):5–32, Jan 2001.
[79] L Breiman. Bagging predictors. Machine learning, 24(2):123–140,
Jan 1996.
[80] T Fawcett. An introduction to roc analysis. Pattern Recognition
Letters, Jan 2006.
[81] Steve Hedley. A brief history of spam. Information & Communications Technology Law, 15(3):223–238, 2006.
[82] G Grimes, M Hough, and M Signorella. Email end users and
spam: relations of gender and age group to attitudes and actions.
Computers in Human Behavior, 23(1):318–332, 2007.
[83] Zhenhai Duan, K Gopalan, and Xin Yuan;. Behavioral characteristics of spammers and their network reachability properties. IEEE
International Conference on Communications, pages 164 – 171, 2007.
[84] T. Tran, J. Rowe, and S. Wu. Social email: a framework and application for more socially-aware communications. Second International Conference on Social Informatics, pages 203–215, 2010.
[85] Shaliz Rezaee, Niklas Lavesson, and Henric Johnsson. E-mail prioritization using online social network profile distance. Computer
Science & Applications, TMRF, January 2011.
[86] D Woods, E S Patterson, and E M Roth. Can we ever escape from
data overload? A cognitive systems diagnosis. Cognition, Technology & Work, 4:22–36, January 2002.
[87] S Weil, D Tinapple, and D Woods. New Approaches to Overcoming E-mail Overload. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, January 2004.
[88] T Guzella and W Caminhas. A review of machine learning approaches to spam filtering. Expert Systems With Applications, 2009.
[89] E Blanzieri and A Bryl. A survey of learning-based techniques of
email spam filtering. Artificial Intelligence Review, 29(1):63–92, 2008.
181
References
[90]
Seongwook Youn and Dennis McLeod. Efficient Spam Email Filtering using Adaptive Ontology. ITNG ’07. Fourth International
Conference on Information Technology, pages 249–254, March 2007.
[91]
Seongwook Youn and Dennis McLeod. Spam Email Classification using an Adaptive Ontology. Journal of Software, 2(3):43–55,
September 2007.
[92]
W Li, S Hershkop, and S Stolfo. Email archive analysis through
graphical visualization. Proceedings of the 2004 ACM workshop on
Visualization and data mining for computer security, 2004.
[93]
Meizhen Wang, Zhitang Li, Ling Xiao, and Yunhe Zhang. Research
on behavior statistic based spam filter. Education Technology and
Computer Science, 2009. ETCS ’09. First International Workshop on,
2:687 – 691, 2009.
[94]
R Nussbaum, A Esfahanian, and Pang-Ning Tan;. History-based
email prioritization. ASONAM ’09: Social Network Analysis and
Mining, 2009., pages 364 – 365, 2009.
[95]
M Hall, E Frank, G Holmes, and B Pfahringer. The weka data
mining software: An update. ACM SIGKDD Explorations Paper,
Jan 2009.
[96]
Fabrizio Sebastiani. Classification of text, automatic. The Encyclopedia of Language and Linguistics, 14:457–462, January 2006.
[97]
Tom Fawcett. ROC graphs: Notes and practical considerations for data
mining representation. HP Laboratories, 2003.
[98]
Ying Xu, Victor Olman, and Dong Xu. Clustering gene expression
data using a graph-theoretic approach: an application of minimum spanning trees. Bioinformatics, 18(4):536–545, 2002.
[99]
Viet-Anh Nguyen and Pietro Lió. Measuring similarity between
gene expression profiles: a Bayesian approach. BMC Genomics,
10(Suppl 3):S14, 2009.
[100] Ghazi Al-Naymat, Sanjay Chawla, and Javid Taheri. SparseDTW:
a novel approach to speed up dynamic time warping. In AusDM
’09: Proceedings of the Eighth Australasian Data Mining Conference.
Australian Computer Society, Inc, December 2009.
182
References
[101] G W Flake, R E Tarjan, and K Tsioutsiouliklis. Graph Clustering
and Minimum Cut Trees. Internet Mathematics, 1(4):385–408, 2004.
[102] Robert Görke, Tanja Hartmann, and Dorothea Wagner. Dynamic
Graph Clustering Using Minimum-Cut Trees. pages 339–350.
Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
[103] Jaime Cohen, Luiz A Rodrigues, Fabiano Silva, Renato Carmo, André L P Guedes, and Elias P Duarte. Parallel Implementations of
Gusfield’s Cut Tree Algorithm. pages 258–269. 11th International
Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), Berlin, Heidelberg, 2011.
[104] J B MacQueen. Some methods for classification and analysis of
multivariate observations. In Proc. Fifth Berkeley Symp. Math. Stat.
Prob., 1967.
[105] M Hall, E Frank, G Holmes, and B Pfahringer. The weka data
mining software: An update. ACM SIGKDD Explorations Paper,
January 2009.
[106] Jianbo Shi and J Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence,
22(8):888–905, 2000.
[107] R Xu and D Wunsch. IEEE Xplore Download. Neural Networks,
2005.
[108] G Rustici, J Mata, K Kivinen, P Lió, and C J Penkett. Periodic gene
expression program of the fission yeast cell cycle. Nat. Genetics,
2004.
[109] Elena Tsiporkova and Veselka Boeva. TWO-PASS IMPUTATION
ALGORITHM FOR MISSING VALUE ESTIMATION IN GENE
EXPRESSION TIME SERIES. Journal of Bioinformatics and Computational Biology, 05(05):1005–1022, October 2007.
[110] Veselka Boeva and Elena Tsiporkova. A Multi-purpose Time Series
Data Standardization Method. In Intelligent Systems: From Theory
to Practice, pages 445–460. Springer Berlin Heidelberg, Berlin, Heidelberg, 2010.
183
References
[111] J Handl, J Knowles, and D B Kell. Computational cluster validation in post-genomic data analysis. Bioinformatics, 2005.
[112] P J Rousseeuw. Silhouettes: a graphical aid to the interpretation
and validation of cluster analysis. 1987.
[113] P Jaccard. The distribution of the flora in the alpine zone. New
phytologist, 1912.
[114] William M Rand. Objective Criteria for the Evaluation of Clustering Methods. Journal of the American Statistical Association,
66(336):846–850, December 1971.
[115] David Sheskin. Handbook of parametric and nonparametric statistical
procedures. Chapman & Hall, January 2007.
[116] Janez Demšar. Statistical Comparisons of Classifiers over Multiple
Data Sets. The Journal of Machine Learning Research, 7:1–30, December 2006.
[117] Santo Fortunato. Community detection in graphs. arXiv.org, (35):75–174, June 2009.
[118] Gary William Flake, Steve Lawrence, and C Lee Giles. Efficient
identification of Web communities. In KDD ’00: Proceedings of the
sixth ACM SIGKDD international conference on Knowledge discovery
and data mining. ACM Request Permissions, August 2000.
[119] M E J Newman. Modularit and community structure in networks.
Proceedings of the National Academy of Sciences, 103(23):8573–8574,
June 2006.
[120] M Hamann. Complete Hierarchical Cut-Clustering: An Analysis
of Guarantee and Quality. Karlsruhe Institute of Technology.
[121] Ned Levine. CrimeStat III: A Spatial Statistics Program for the Analysis of Crime Incident Locations (version 3.3), 2010.
[122] Jorge M Santos and Mark Embrechts. On the Use of the Adjusted
Rand Index as a Metric for Evaluating Supervised Classification.
In Artificial Neural Networks–ICANN 2009, pages 175–184. Springer
Berlin Heidelberg, Berlin, Heidelberg, 2009.
184
References
[123] M Newman.
Mixing patterns in networks.
67(2):026126, February 2003.
Phys. Rev. E,
[124] Ulrik Brandes, Daniel Delling, Marco Gaertler, Robert Görke, Martin Hoefer, Zoran Nikoloski, and Dorothea Wagner. On Finding
Graph Clusterings with Maximum Modularity. In Lecture Notes in
Computer Science, pages 121–132. Graph-theoretic concepts in computer science, Berlin, Heidelberg, 2007.
[125] William R Shadish, Thomas D Cook, and Donald Thomas Campbell. Experimental and quasi-experimental designs for generalized causal
inference. Wadsworth Pub Co, 2002.
[126] Colleen McCue. Data Mining and Predictive Analysis. Intelligence
Gathering and Crime Analysis. Butterworth-Heinemann, 1 edition, October 2006.
[127] Frank E Harrell. Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis.
Springer, 2001.
[128] Ewout W Steyerberg, Frank E Harrell Jr, Gerard J J M Borsboom,
M J C Eijkemans, Yvonne Vergouwe, and J Dik F Habbema. Internal validation of predictive models: efficiency of some procedures for logistic regression analysis. Journal of Clinical Epidemiology, pages 774–781, 2001.
185
Related documents