Proceedings of the 2010 SIAM International Conference on Data Mining 2010
DOI: 10.1137/1.9781611972801.36
|View full text |Cite
|
Sign up to set email alerts
|

The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity

Abstract: We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news articles and court records which are carefully annotated with a variety of variables, including categorical and continuous fields. Manual analysis of this data can help inform decision makers seeking to curb violent activity within a region. We use this data to build relational models from historical data to predict attributes of groups… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In [3] statistical relational learning is applied to a database of criminal and terrorist activity to predict attributes and event outcomes. These methods could be useful to predict outcomes of radicalization processes of possible lone wolves as well.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…In [3] statistical relational learning is applied to a database of criminal and terrorist activity to predict attributes and event outcomes. These methods could be useful to predict outcomes of radicalization processes of possible lone wolves as well.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…The initial seed for this iterative procedure is selected by identifying communities in the network, and then selecting a representative from each community. Delaney et al (2010) applied SRL algorithms to predict leadership roles of individuals in a group based on patterns of activity, communication, and individual attributes. The authors focused on data collection on criminal and terror networks whose straightforward use includes manual analysis of groups and individuals involved in nefarious activity to inform key decision makers tasked with preventing future bombings or other violent attacks.…”
Section: Information Diffusion and Role Analysismentioning
confidence: 99%