Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
References [1] N. Lavesson, M. Boldt, P. Davidsson, and A. Jacobsson. Learning to detect spyware using end user license agreements. Knowledge and Information Systems, 2(3):285–307, 2011. [2] Anton Borg, Martin Boldt, Niklas Lavesson, Ulf Melander, and Veselka Boeva. Detecting Serial Residential Burglaries using Clustering. Expert Systems With Applications, February 2014. [3] Sean B Eom, SM Lee, and EB Kim. A survey of decision support system applications (1988-1994). Journal of the Operational Research Society, 49(2):109–120, 1998. [4] Sean B Eom and E. Kim. A survey of decision support system applications (1995-2001). Journal of the Operational Research Society, 57(11):1264–1278, 2005. [5] Hyon B. Eom and Sang M. Lee. A survey of decision support system applications (1971-april 1988). Interfaces, 20(3):65–79, 1990. [6] Giles Oatley, Brian Ewart, and John Zeleznikow. Decision support systems for police: lessons from the application of data mining techniques to "soft" forensic evidence. Artificial Intelligence and Law, 14(1), January 2006. [7] Jerry H Ratcliffe. Aoristic Signatures and the Spatio-Temporal Analysis of High Volume Crime Patterns. Journal of Quantitative Criminology, 18(1):23–43, 2002. 173 References [8] Daniel J Power. A brief history of decision support systems. DSSResourcescom, World Wide Web, http://DSSResources.COM/history/dsshistory.html, version 4.0, March 2007. [9] Daniel J Power. Supporting decision-makers: An expanded framework. In Proceedings of Informing Science Conference, pages 431–436, June 2001. [10] Tom M. Mitchell. Machine learning. McGraw-Hill, March 1997. [11] Ian H Witten and Eibe Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann Publications, January 2005. [12] Satu Elisa Schaeffer. Graph clustering. Computer Science Review, 1(1):27–64, August 2007. [13] S M Kamruzzaman, Farhana Haider, and Ahmed Ryadh Hasan. Text classification using data mining. In Proceddings of International Conference on Information and Communication Technology in Management (ICTM-2005), May 2005. [14] Thiago S Guzella and Walmir M Caminhas. A review of machine learning approaches to spam filtering. Expert Systems With Applications, 36(7):10206–10222, 2009. [15] C Bennell and D V Canter. Linking commercial burglaries by modus operandi: tests using regression and ROC analysis. Science & justice: journal of the Forensic Science Society, 42(3):153, 2002. [16] Sean B Eom. Decision support systems research: current state and trends. Industrial Management & Data Systems, 99(5):213–221, 1999. [17] J.P. Shim, Merrill Warkentin, James F Courtney, Daniel J Power, Ramesh Sharda, and Christer Carlsson. Past, present, and future of decision support technology. Decision Support Systems, 33(2):111– 126, 2002. [18] Ren Jieh Kuo, C.H. Chen, and Y.C. Hwang. An intelligent stock trading decision support system through integration of genetic algorithm based fuzzy neural network and artificial neural network. Fuzzy Sets and Systems, 118(1):21–45, February 2001. 174 References [19] Cong Tran, Lakhmi Jain, and Ajith Abraham. Adaptation of mamdani fuzzy inference system using neuro - genetic approach for tactical air combat decision support system. In Proceedings of 15th Australian Joint Conference on Artificial Intelligence (AI’02), pages 672–679, 2002. [20] Jaroslav Mysiak, Carlo Giupponi, and Paolo Rosato. Towards the development of a decision support system for water resource management. Environmental Modelling & Software, 20(2):203–214, 2003. [21] Sean B Eom and Sandy Butters. Decision support systems in the healthcare industry. Journal of Systems Management, 43(6):28–31, 1992. [22] Rosmayati Mohemad, Abdul Razak Hamdan, Zulaiha Ali Othman, and Noor Maizura Mohamad Noor. Decision support systems (dss) in construction tendering processes. International Journal of Computer Science Issues, 7(2):35–45, March 2010. [23] Vipul Ved Prakash and Adam O’Donnell. Fighting spam with reputation systems. Queue, 3(9):36–41, November 2005. [24] Kevin Walsh and Emin Gün Sirer. Fighting peer-to-peer spam and decoys with object reputation. In Proceedings of 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pages 138– 143, New York, NY, USA, August 2005. ACM Press. [25] Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. Ipgrouprep: A novel reputation based system for anti-spam. In Proceedings of Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pages 513–518. IEEE, 2009. [26] Dongmei Jia. Cost-effective spam detection in p2p file-sharing systems. In Proceedings of 2008 ACM workshop on Large-Scale distributed systems for information retrieval (LSDS-IR ’08), pages 19–26. ACM Request Permissions, October 2008. [27] William W Cohen. Learning rules that classify e-mail. In Proceedings of AAAI Spring Symposium on Machine Learning in Information Access, pages 18–25, 1996. 175 References [28] Ray Hunt and James Carpinter. Current and new developments in spam filtering. In Proceedings of 14th IEEE International Conference on Networks, January 2006. [29] M Tariq Banday and Tariq R Jan. Effectiveness and limitations of statistical spam filters. In Proceedings of International Conference on New Trends in Statistics and Optimization, 2008. [30] Giles Oatley, Brian Ewart, and John Zeleznikow. Decision support systems for police: Lessons from the application of data mining techniques to “soft” forensic evidence. Artificial Intelligence and Law, 14(1-2):35–100, July 2006. [31] Yifei Xue and D E Brown. A decision model for spatial site selection by criminals: a foundation for law enforcement decision support. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 33(1):78–85, 2003. [32] Shuai Wang, Xiaojuan Li, Ying Cai, and Jie Tian. Spatial and temporal distribution and statistic method applied in crime events analysis. In Geoinformatics, 2011 19th International Conference on, pages 1–6, 2011. [33] Guiyun Zhou, Jiayuan Lin, and Wenfeng Zheng. A web-based geographical information system for crime mapping and decision support. In Computational Problem-Solving (ICCP), 2012 International Conference on, pages 147–150, 2012. [34] Peter Phillips and Ickjai Lee. Crime analysis through spatial areal aggregated density patterns. Geoinformatica, 15(1), January 2011. [35] S Chainey and J Ratcliffe. GIS and Crime Mapping. John Wiley & Sons, Ltd, December 2005. [36] Jameson L Toole, Nathan Eagle, and Joshua B Plotkin. Spatiotemporal correlations in criminal offense records. Transactions on Intelligent Systems and Technology (TIST, 2(4), July 2011. [37] Jessica Woodhams, Clive R Hollin, and Ray Bull. The psychology of linking crimes: A review of the evidence. Legal and Criminological Psychology, 12(2):233–249, December 2010. 176 References [38] Craig Bennell, Natalie J Jones, and Tamara Melnyk. Addressing problems with traditional crime linking methods using receiver operating characteristic analysis. Legal and Criminological Psychology, 14(2):293–310, December 2010. [39] Craig Bennell, Donna Gauthier, Donald Gauthier, Tamara Melnyk, and Evanya Musolino. The impact of data degradation and sample size on the performance of two similarity coefficients used in behavioural linkage analysis. Forensic Science International, 199(13):85–92, June 2010. [40] Craig Bennell, Sarah Bloomfield, Brent Snook, Paul Taylor, and Carolyn Barnes. Linkage analysis in cases of serial burglary: comparing the performance of university students, police professionals, and a logistic regression model. Psychology, Crime & Law, 16(6):507–524, July 2010. [41] Lucy Markson, Jessica Woodhams, and John W Bond. Linking serial residential burglary: comparing the utility of modus operandi behaviours, geographical proximity, and temporal proximity. Journal of Investigative Psychology and Offender Profiling, pages n/a–n/a, 2010. [42] M Tonkin, J Woodhams, R Bull, J W Bond, and E J Palmer. Linking Different Types of Crime Using Geographical and Temporal Proximity. Criminal Justice and Behavior, 38(11):1069–1088, September 2011. [43] Craig Bennell and Natalie J Jones. Between a ROC and a hard place: a method for linking serial burglaries bymodus operandi. Journal of Investigative Psychology and Offender Profiling, 2(1):23–41, 2005. [44] John W. Creswell. Research design: qualitative, quantitative, and mixed methods approaches. Sage Publications, 2009. [45] Claes Wohlin, Martin Höst, and Kennet Henningsson. Empirical Research Methods in Software Engineering, volume 2765 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, 2003. 177 References [46] Vigdis By Kampenes, Tore Dybå, Jo E Hannay, and Dag I K Sjøberg. A systematic review of quasi-experiments in software engineering. Information and Software Technology, 51(1):71–82, 2009. [47] Colin Robson. Real world research. a resource for social scientists and practitioner-researchers. Wiley-Blackwell, second edition, 2002. [48] Martin Boldt, Andreas Jacobsson, Niklas Lavesson, and Paul Davidsson. Automated spyware detection using end user license agreements. In Proceedings of the Second International Conference on Information Security and Assurance, Busan, Korea, April 2008. [49] M Simeon and R Hilderman. Categorical proportional difference: A feature selection method for text categorization. In Proceedings of the Seventh Australasian Data Mining Conference, Glenelg, Australia, Jan 2008. [50] S Yoo, Y Yang, Frank Lin, and Il-Chul Moon. Mining social networks for personalized email prioritization. 15th ACM SIGKDD international conference on Knowledge discovery and data mining, January 2009. [51] C.Y. Tseng, J.W. Huang, and M.S. Chen. Promail: Using progressive email social network for spam detection. Advances in Knowledge Discovery and Data Mining, pages 833–840, 2007. [52] C. Bird, A. Gourley, P. Devanbu, M. Gertz, and A. Swaminathan. Mining email social networks. 2006 international workshop on Mining software repositories, pages 137–143, 2006. [53] P O Boykin and V P Roychowdhury. Leveraging social networks to fight spam. Computer, 38(4):61–68, January 2005. [54] John Quackenbush. Computational analysis of microarray data. Nature Reviews Genetics, 2(6):418–427, 2001. [55] Yanhua Chen, Ming Dong, and M Rege. Gene Expression Clustering: a Novel Graph Partitioning Approach. In Neural Networks, 2007. IJCNN 2007. International Joint Conference on, pages 1542– 1547, 2007. 178 References [56] S Datta and S Datta. Comparisons and validation of statistical clustering techniques for microarray gene expression data. Bioinformatics, 19(4):459–466, March 2003. [57] Daxin Jiang, Chun Tang, and Aidong Zhang. Cluster analysis for gene expression data: a survey. Knowledge and Data Engineering, IEEE Transactions on, 16(11):1370–1386, 2004. [58] Ping Guo and Xiao-yan Deng. Gene Expression Data Cluster Analysis. In Information Engineering, 2009. ICIE ’09. WASE International Conference on, pages 99–102, 2009. [59] C Bennell, B Snook, S Macdonald, J C House, and P J Taylor. Computerized Crime Linkage Systems: A Critical Review and Research Agenda. Criminal Justice and Behavior, 39(5):620–634, April 2012. [60] Hsinchun Chen, Daniel Zeng, Homa Atabakhsh, Wojciech Wyzga, and Jenny Schroeder. COPLINK: managing law enforcement data and knowledge. Communications of the ACM, 46(1), January 2003. [61] R Polikar. Ensemble based systems in decision making. Circuits and Systems Magazine, IEEE, 6(3):21–45, 2006. [62] Ed Skoudis. Malware - Fighting Malicious Code. Prentice Hall PTR, Upper Saddle River NJ, 2004. [63] Peter Szor. The Art of Computer Virus Research and Defence. Pearson Education, Upper Saddle River NJ, 2005. [64] T. Okamoto and Y. Ishida. A distributed approach to computer virus detection and neutralization by autonomous heterogeneous agents. In Proceedings of the 4th International Symposium on Autonomous Decentralized Systems, Tokyo, Japan, March 1999. [65] W. Arnold and G. Tesauro. Automatically generated win32 heuristic virus detection. In Proceedings of the 10th International Virus Bulletin Conference, Orlando, USA, September 2000. [66] J. O. Kephart. Biologically inspired defenses against computer viruses. In Proceedings of the 14th International Joint Conference on Artificial Intelligence, MontrÈal, Canada, January 1995. 179 References [67] G. Jacob, H. Debar, and E. Filiol. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology, 4(3), 2007. [68] Niklas Lavesson and Paul Davidsson. Evaluating learning algorithms and classifiers. Intelligent Information & Database Systems, 1(1):37–52, 2007. [69] N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge University Press, West Nyack, NY, 2000. [70] A. M. Kibriya, E. Frank, B. Pfahringer, and G. Holmes. Multinomial naive bayes for text categorization revisited. In Proceedings of the 17th Australian joint conference on artificial intelligence, Cairns, Australia, December 2004. [71] I.H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Elsevier, San Francisco, USA, 2005. [72] L. Larkey. Automatic essay grading using text categorization techniques. In Proceedings of the 21st International Conference on Research and Development in Information Retrieval, Melbourne, Australia, Jan 1998. [73] S Scott and S Matwin. Feature engineering for text classification. In Proceedings of the Sixteenth International Conference on Machine Learning, Seattle, USA, Jan 1999. [74] W Cavnar and J Trenkle. N-gram-based text categorization. In Proceedings of the 3rd Annual Symposium on Document Analysis and Information Retrieval, Hong Kong, China, Jan 1994. [75] M Rogati and Y Yang. High-performing feature selection for text classification. In Proceedings of the Eleventh International Conference on Information and Knowledge Management, McLean, USA, Jan 2002. [76] Y Yang and J Pedersen. A comparative study on feature selection in text categorization. In Proceedings of the Fourteenth International Conference on Machine Learning, San Francisco, USA, Jan 1997. 180 References [77] Fabrizio Sebastiani. Classification of text, automatic. In The Encyclopedia of Language and Linguistics, pages 457–463. Elsevier Science Publishers, 2006. [78] L Breiman. Random forests. Machine learning, 45(1):5–32, Jan 2001. [79] L Breiman. Bagging predictors. Machine learning, 24(2):123–140, Jan 1996. [80] T Fawcett. An introduction to roc analysis. Pattern Recognition Letters, Jan 2006. [81] Steve Hedley. A brief history of spam. Information & Communications Technology Law, 15(3):223–238, 2006. [82] G Grimes, M Hough, and M Signorella. Email end users and spam: relations of gender and age group to attitudes and actions. Computers in Human Behavior, 23(1):318–332, 2007. [83] Zhenhai Duan, K Gopalan, and Xin Yuan;. Behavioral characteristics of spammers and their network reachability properties. IEEE International Conference on Communications, pages 164 – 171, 2007. [84] T. Tran, J. Rowe, and S. Wu. Social email: a framework and application for more socially-aware communications. Second International Conference on Social Informatics, pages 203–215, 2010. [85] Shaliz Rezaee, Niklas Lavesson, and Henric Johnsson. E-mail prioritization using online social network profile distance. Computer Science & Applications, TMRF, January 2011. [86] D Woods, E S Patterson, and E M Roth. Can we ever escape from data overload? A cognitive systems diagnosis. Cognition, Technology & Work, 4:22–36, January 2002. [87] S Weil, D Tinapple, and D Woods. New Approaches to Overcoming E-mail Overload. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, January 2004. [88] T Guzella and W Caminhas. A review of machine learning approaches to spam filtering. Expert Systems With Applications, 2009. [89] E Blanzieri and A Bryl. A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review, 29(1):63–92, 2008. 181 References [90] Seongwook Youn and Dennis McLeod. Efficient Spam Email Filtering using Adaptive Ontology. ITNG ’07. Fourth International Conference on Information Technology, pages 249–254, March 2007. [91] Seongwook Youn and Dennis McLeod. Spam Email Classification using an Adaptive Ontology. Journal of Software, 2(3):43–55, September 2007. [92] W Li, S Hershkop, and S Stolfo. Email archive analysis through graphical visualization. Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004. [93] Meizhen Wang, Zhitang Li, Ling Xiao, and Yunhe Zhang. Research on behavior statistic based spam filter. Education Technology and Computer Science, 2009. ETCS ’09. First International Workshop on, 2:687 – 691, 2009. [94] R Nussbaum, A Esfahanian, and Pang-Ning Tan;. History-based email prioritization. ASONAM ’09: Social Network Analysis and Mining, 2009., pages 364 – 365, 2009. [95] M Hall, E Frank, G Holmes, and B Pfahringer. The weka data mining software: An update. ACM SIGKDD Explorations Paper, Jan 2009. [96] Fabrizio Sebastiani. Classification of text, automatic. The Encyclopedia of Language and Linguistics, 14:457–462, January 2006. [97] Tom Fawcett. ROC graphs: Notes and practical considerations for data mining representation. HP Laboratories, 2003. [98] Ying Xu, Victor Olman, and Dong Xu. Clustering gene expression data using a graph-theoretic approach: an application of minimum spanning trees. Bioinformatics, 18(4):536–545, 2002. [99] Viet-Anh Nguyen and Pietro Lió. Measuring similarity between gene expression profiles: a Bayesian approach. BMC Genomics, 10(Suppl 3):S14, 2009. [100] Ghazi Al-Naymat, Sanjay Chawla, and Javid Taheri. SparseDTW: a novel approach to speed up dynamic time warping. In AusDM ’09: Proceedings of the Eighth Australasian Data Mining Conference. Australian Computer Society, Inc, December 2009. 182 References [101] G W Flake, R E Tarjan, and K Tsioutsiouliklis. Graph Clustering and Minimum Cut Trees. Internet Mathematics, 1(4):385–408, 2004. [102] Robert Görke, Tanja Hartmann, and Dorothea Wagner. Dynamic Graph Clustering Using Minimum-Cut Trees. pages 339–350. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009. [103] Jaime Cohen, Luiz A Rodrigues, Fabiano Silva, Renato Carmo, André L P Guedes, and Elias P Duarte. Parallel Implementations of Gusfield’s Cut Tree Algorithm. pages 258–269. 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2011), Berlin, Heidelberg, 2011. [104] J B MacQueen. Some methods for classification and analysis of multivariate observations. In Proc. Fifth Berkeley Symp. Math. Stat. Prob., 1967. [105] M Hall, E Frank, G Holmes, and B Pfahringer. The weka data mining software: An update. ACM SIGKDD Explorations Paper, January 2009. [106] Jianbo Shi and J Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):888–905, 2000. [107] R Xu and D Wunsch. IEEE Xplore Download. Neural Networks, 2005. [108] G Rustici, J Mata, K Kivinen, P Lió, and C J Penkett. Periodic gene expression program of the fission yeast cell cycle. Nat. Genetics, 2004. [109] Elena Tsiporkova and Veselka Boeva. TWO-PASS IMPUTATION ALGORITHM FOR MISSING VALUE ESTIMATION IN GENE EXPRESSION TIME SERIES. Journal of Bioinformatics and Computational Biology, 05(05):1005–1022, October 2007. [110] Veselka Boeva and Elena Tsiporkova. A Multi-purpose Time Series Data Standardization Method. In Intelligent Systems: From Theory to Practice, pages 445–460. Springer Berlin Heidelberg, Berlin, Heidelberg, 2010. 183 References [111] J Handl, J Knowles, and D B Kell. Computational cluster validation in post-genomic data analysis. Bioinformatics, 2005. [112] P J Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. 1987. [113] P Jaccard. The distribution of the flora in the alpine zone. New phytologist, 1912. [114] William M Rand. Objective Criteria for the Evaluation of Clustering Methods. Journal of the American Statistical Association, 66(336):846–850, December 1971. [115] David Sheskin. Handbook of parametric and nonparametric statistical procedures. Chapman & Hall, January 2007. [116] Janez Demšar. Statistical Comparisons of Classifiers over Multiple Data Sets. The Journal of Machine Learning Research, 7:1–30, December 2006. [117] Santo Fortunato. Community detection in graphs. arXiv.org, (35):75–174, June 2009. [118] Gary William Flake, Steve Lawrence, and C Lee Giles. Efficient identification of Web communities. In KDD ’00: Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM Request Permissions, August 2000. [119] M E J Newman. Modularit and community structure in networks. Proceedings of the National Academy of Sciences, 103(23):8573–8574, June 2006. [120] M Hamann. Complete Hierarchical Cut-Clustering: An Analysis of Guarantee and Quality. Karlsruhe Institute of Technology. [121] Ned Levine. CrimeStat III: A Spatial Statistics Program for the Analysis of Crime Incident Locations (version 3.3), 2010. [122] Jorge M Santos and Mark Embrechts. On the Use of the Adjusted Rand Index as a Metric for Evaluating Supervised Classification. In Artificial Neural Networks–ICANN 2009, pages 175–184. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009. 184 References [123] M Newman. Mixing patterns in networks. 67(2):026126, February 2003. Phys. Rev. E, [124] Ulrik Brandes, Daniel Delling, Marco Gaertler, Robert Görke, Martin Hoefer, Zoran Nikoloski, and Dorothea Wagner. On Finding Graph Clusterings with Maximum Modularity. In Lecture Notes in Computer Science, pages 121–132. Graph-theoretic concepts in computer science, Berlin, Heidelberg, 2007. [125] William R Shadish, Thomas D Cook, and Donald Thomas Campbell. Experimental and quasi-experimental designs for generalized causal inference. Wadsworth Pub Co, 2002. [126] Colleen McCue. Data Mining and Predictive Analysis. Intelligence Gathering and Crime Analysis. Butterworth-Heinemann, 1 edition, October 2006. [127] Frank E Harrell. Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis. Springer, 2001. [128] Ewout W Steyerberg, Frank E Harrell Jr, Gerard J J M Borsboom, M J C Eijkemans, Yvonne Vergouwe, and J Dik F Habbema. Internal validation of predictive models: efficiency of some procedures for logistic regression analysis. Journal of Clinical Epidemiology, pages 774–781, 2001. 185