58,242 Hits in 2.8 sec

Neuromonitoring and neuroclassification of crime events in distributed network

Le Trung Kien
2020 Revista Amazonía investiga  
monitoring of the entire criminal environment have been proposed.  ...  In the investigation of each the crime requires speed, as well as completeness, accuracy and low uncertainty of the event.  ...  If feedback is not implemented in time (cannot be monitored) or distorted, there is significant harm to criminal policy and public confidence in it.  ... 
doi:10.34069/ai/2020.29.05.54 fatcat:jvyt2otyfvhnzieet6iktlaro4


2014 Issues in Information Systems  
This content analysis evaluates the evolution of information management supporting law enforcement, culminating in a review of the literature supporting the digital case file.  ...  Until recently, leveraging this vast collection of data was a laborious and time consuming task.  ...  In essence it tracks how people think and presents the data automatically as visual data in real time.  ... 
doi:10.48009/1_iis_2014_257-266 fatcat:2ahxoacqcjeaxfbtp36h4yutsi

A Real-time Crime Detection System Based on Lawful Interception - A Case Study of MSN Messenger

Chi-Hua Chen, Wan-Jia Chen, Ya-Fen Wang, Chi-Chun Lo
2011 Procedia Engineering  
Server (NIS) to establish a legally sanctioned lawful interception process which can collect and store evidence for criminal detection in real time.  ...  This study proposes an effective lawful interception system, Real-time Crime Detection System (RCDS), which includes Criminal Investigation Bureau (CIB), Internet Service Providers (ISP), and Network Interception  ...  and store evidence for criminal detection in real time.  ... 
doi:10.1016/j.proeng.2011.08.304 fatcat:xrf6i72lr5hdnizrkf4wta45pu

Challenges of Cryptocurrencies Forensics

S. Naqvi
2018 Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018  
A set of best practices is discussed to tackle these challenges in real world investigations.  ...  We have also presented our return of experience for various stages of digital forensics analysis of devices used in Bitcoin transactions.  ...  ACKNOWLEDGMENTS This work is partially supported by the Higher Education Funding Council for England (HEFCE) through their Catalyst Grant for N8 Policing Research Partnership Project.  ... 
doi:10.1145/3230833.3233290 dblp:conf/IEEEares/Naqvi18 fatcat:gnqqbibfajbd5foqii7di47f3i

Analysis on Fraud Detection for Internet Service

Tae Kyung Kim, Hyung Jin Lim, Jae Hoon Nah
2013 International Journal of Security and Its Applications  
In this paper, we proposed the model which can support fraud detection in ICT application service.  ...  It also analyzes behavior among related users, accounts or other entities, looking for organized criminal activity, corruption or misuse.  ...  • Real time monitoring It is to monitor all transactions (e.g., http) in real time using a web server filter.  ... 
doi:10.14257/ijsia.2013.7.6.28 fatcat:emnzc5gdprg2fft3lcbkz4wzt4

COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement [chapter]

Daniel Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin
2003 Lecture Notes in Computer Science  
This system also supports knowledge sharing by proactively identifying officers who are working on the same or similar cases on a real-time basis.  ...  Overall, COPLINK Agent was shown to be an effective tool for improving the effectiveness and efficiency of criminal investigations in crimes such as gang, theft, and fraud.  ...  Acknowledgement The work described in this report was substantially supported by the following grants: We also would like to thank all of the personnel from TPD who participated in this study.  ... 
doi:10.1007/3-540-44853-5_21 fatcat:4y3yjhj6irdqpcgioaallpyyce

Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement

Jyri Rajamaki, Juha Knuuttila
2013 2013 European Intelligence and Security Informatics Conference  
When carrying out criminal investigations, Law Enforcement Agencies (LEAs) apply new technology in very effective ways.  ...  When investigating the identity of criminals LEAs may apply totally different technical tools than when gathering evidences for charge, because the data provided by investigating may not be valid in court  ...  The real time information will be sent on demand to the end-user where ever he or she is. In many cases, the users of information are not in the office but in the field using portable devices.  ... 
doi:10.1109/eisic.2013.44 dblp:conf/eisic/RajamakiK13 fatcat:2clv274f3zdelnucetdpdqo35e

Deep Learning-based New Methods of Images Processing for Criminal Investigation

Min TU, Fang-qiang ZHONG
2018 DEStech Transactions on Computer Science and Engineering  
Image processing has been widely used in criminal investigation. However, the robustness and real-time is contradictory for image processing of criminal investigation.  ...  Based on these advantages, we propose the applications of deep learning in face recognition and pedestrian detection for criminal investigation.  ...  Acknowledgement The research is supported by Research and Development Emphasis Plan Projects of Science and Technology in Jiangxi Province, the electronic data trajectory analysis in Cloud computing environment  ... 
doi:10.12783/dtcse/iece2018/26640 fatcat:f4bm3rvhi5ephmydytpsoqeaku

How Analysts Think: Sense-making Strategies in the Analysis of Temporal Evolution and Criminal Network Structures and Activities

Johanna Doppler Haider, Patrick Seidler, Margit Pohl, Neesha Kodagoda, Rick Adderley, B. L. William Wong
2017 Proceedings of the Human Factors and Ergonomics Society Annual Meeting  
Analysis of criminal activity based on offenders' social networks is an established procedure in intelligence analysis.  ...  We also provide some examples how these strategies can be supported through appropriate visualizations.  ...  ACKNOWLEDGMENTS The research reported in this paper has received funding from the European Union 7th Framework Programme  ... 
doi:10.1177/1541931213601532 fatcat:cnrv3p2usbbeho3mtrlqegtwbe

Electronic and informatization of the judiciary as a tool for innovation

Jaroslav Klátik, Martin Orviský, T. Kliestik
2021 SHS Web of Conferences  
Research background: The computerization and computerization of the judiciary are important support tools with great potential in addressing key issues in the judiciary.  ...  The authors also analyzes whether a change in legislation that allowed the use of electronic monitoring in more serious crimes contributed to more frequent use of electronic monitoring, or this change  ...  Due to the fact that they entered into force on 1 January 2016, the real deployment of electronic monitoring could only take place with a certain time lag, of course, due to the time needed for court decisions  ... 
doi:10.1051/shsconf/20219204013 fatcat:2es6tqbuercpzflu4fezwnpjim

Automated Analysis of Underground Marketplaces [chapter]

Aleksandar Hudic, Katharina Krombholz, Thomas Otterbein, Christian Platzer, Edgar Weippl
2014 IFIP Advances in Information and Communication Technology  
Cyber criminals usually attack Internet services to steal sensitive data and operate in crowded online underground marketplaces.  ...  This is a complex and time-consuming task that is associated with high financial costs.  ...  As any real-world implementation of such a system will have limited computing and networking resources, it is clearly beneficial to be able to automatically focus on monitoring interesting channels.  ... 
doi:10.1007/978-3-662-44952-3_3 fatcat:fbdtqhyuebd4xh2rqxzkrperjq

Special investigative actions in the criminal procedural law of Bosnia and Herzegovina, and their purposefulness in law

V Rodic
2017 IOP Conference Series: Materials Science and Engineering  
Special investigative actions are a novelty in the criminal procedure legislation BiH. In our legislation this has been introduced only in 2003.  ...  Special investigative measures are listed in the Penal Code.  ...  This special investigative action is done by intercepting communications at a time when communication is still going on (so-called, real-time or on-line control).  ... 
doi:10.1088/1757-899x/200/1/012062 fatcat:ptzczv3kbjftlem6un3hkynpgq

Innovating Responses to Managing Risk: Exploring the Potential of a Victim-Focused Policing Strategy

C. Paterson, K. Clamp
2013 Policing: A Journal of Policy and Practice  
Integrated surveillance systems supported by human contact have the potential to enhance trust and confidence in the police, particularly with young people for whom virtual visualisation and active real-time  ...  Despite this, we argue that there is indeed an important part that electronic monitoring can play in the criminal justice landscape and one that can assist with the re-invention of policing in a climate  ... 
doi:10.1093/police/pat028 fatcat:jozcv6lrvfhtzhtqpvw27ht56y

Design of intelligent camera-based security system with image enhancement support

P Chyan
2019 Journal of Physics, Conference Series  
The developed security system is the type of active security system that has the advantage of intercepting or providing real-time information on potential criminal acts that occur and this is done through  ...  Security issues are often related to efforts to prevent and detect criminal acts in the community and along with technological developments various methods and devices are created and implemented to support  ...  In addition to having the same benefits as a passive security system, this model's security system provides additional benefits in intercepting or providing real time information on potential act of crime  ... 
doi:10.1088/1742-6596/1341/4/042009 fatcat:atcrqe4un5gb7ntgdemklw4fue

A Study on Improving Support for Victims of Cyber-Violence
사이버 폭력의 피해자 지원에 대한 개선방안

Jong-Ryeol Park
2012 Journal of the Korea Society of Computer and Information  
As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal  ...  Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation  ...  Synchronicity and Immediacy Internet communication is done very quickly in real time. Due to this synchronicity in cyber space, shake off fetters from existing physical space and time.  ... 
doi:10.9708/jksci.2012.17.1.227 fatcat:xfnyhrc4lfetnl4otiemvbcycu
« Previous Showing results 1 — 15 out of 58,242 results