2013 IEEE International Conference on Industrial Engineering and Engineering Management 2013
DOI: 10.1109/ieem.2013.6962533
|View full text |Cite
|
Sign up to set email alerts
|

Modeling brain and behavior of a terrorist through fuzzy logic and ontology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…(Alami and Elbeqqali, 2015). To develop useful profiles of different cybercriminals, text mining techniques are an effective way to detect and predict criminal activities in microblog publications that consider the problems of data scarcity and semantic gap (Gerber, 2014), developing methodologies to apply complex networks in the analysis of criminality disseminated within criminal geographic areas within a city (Spadon et al, 2017), using tools such as ontologies for analyze inter-gang relationships, linking criminals to certain criminal organizations and relationships between them (Vishwakarma and Shankar, 2014).…”
Section: Related Workmentioning
confidence: 99%
“…(Alami and Elbeqqali, 2015). To develop useful profiles of different cybercriminals, text mining techniques are an effective way to detect and predict criminal activities in microblog publications that consider the problems of data scarcity and semantic gap (Gerber, 2014), developing methodologies to apply complex networks in the analysis of criminality disseminated within criminal geographic areas within a city (Spadon et al, 2017), using tools such as ontologies for analyze inter-gang relationships, linking criminals to certain criminal organizations and relationships between them (Vishwakarma and Shankar, 2014).…”
Section: Related Workmentioning
confidence: 99%
“…In the military field, it is common to study the ontological modeling of enemy tactical intentions [24,25], the construction of combat operations ontology [26] and the description of complex video content with ontology framework [27,28] etc. In the security field, the application of ontology construction can be traced back from the early network ontology construction of forensics analysis [29] to terrorist organization ontology [30,31], criminal ontology and knowledge reasoning [32,33] in recent years. However, semantic understanding of content needs specific background knowledge.…”
Section: Background and Related Workmentioning
confidence: 99%