Advancing Crime Linkage Analysis with Machine Learning: A Comprehensive Review and Framework for Data-Driven Approaches
- URL: http://arxiv.org/abs/2411.00864v1
- Date: Wed, 30 Oct 2024 18:22:45 GMT
- Title: Advancing Crime Linkage Analysis with Machine Learning: A Comprehensive Review and Framework for Data-Driven Approaches
- Authors: Vinicius Lima, Umit Karabiyik,
- Abstract summary: Crime linkage is the process of analyzing criminal behavior data to determine whether a pair or group of crime cases are connected or belong to a series of offenses.
This study aims to understand the challenges faced by machine learning approaches in crime linkage and to support foundational knowledge for future data-driven methods.
- Score: 0.0
- License:
- Abstract: Crime linkage is the process of analyzing criminal behavior data to determine whether a pair or group of crime cases are connected or belong to a series of offenses. This domain has been extensively studied by researchers in sociology, psychology, and statistics. More recently, it has drawn interest from computer scientists, especially with advances in artificial intelligence. Despite this, the literature indicates that work in this latter discipline is still in its early stages. This study aims to understand the challenges faced by machine learning approaches in crime linkage and to support foundational knowledge for future data-driven methods. To achieve this goal, we conducted a comprehensive survey of the main literature on the topic and developed a general framework for crime linkage processes, thoroughly describing each step. Our goal was to unify insights from diverse fields into a shared terminology to enhance the research landscape for those intrigued by this subject.
Related papers
- Model Inversion Attacks: A Survey of Approaches and Countermeasures [59.986922963781]
Recently, a new type of privacy attack, the model inversion attacks (MIAs), aims to extract sensitive features of private data for training.
Despite the significance, there is a lack of systematic studies that provide a comprehensive overview and deeper insights into MIAs.
This survey aims to summarize up-to-date MIA methods in both attacks and defenses.
arXiv Detail & Related papers (2024-11-15T08:09:28Z) - Ontology Embedding: A Survey of Methods, Applications and Resources [54.3453925775069]
Ontologies are widely used for representing domain knowledge and meta data.
One straightforward solution is to integrate statistical analysis and machine learning.
Numerous papers have been published on embedding, but a lack of systematic reviews hinders researchers from gaining a comprehensive understanding of this field.
arXiv Detail & Related papers (2024-06-16T14:49:19Z) - A Comprehensive Analysis of the Role of Artificial Intelligence and
Machine Learning in Modern Digital Forensics and Incident Response [0.0]
The goal is to look closely at how AI and ML techniques are used in digital forensics and incident response.
This endeavour digs far beneath the surface to unearth the intricate ways AI-driven methodologies are shaping these crucial facets of digital forensics practice.
Ultimately, this paper underscores the significance of AI and ML integration in digital forensics, offering insights into their benefits, drawbacks, and broader implications for tackling modern cyber threats.
arXiv Detail & Related papers (2023-09-13T16:23:53Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Crime Prediction Using Machine Learning and Deep Learning: A Systematic
Review and Future Directions [2.624902795082451]
This review paper examines over 150 articles to explore the various machine learning and deep learning algorithms applied to predict crime.
The study provides access to the datasets used for crime prediction by researchers.
The paper highlights potential gaps and future directions that can enhance the accuracy of crime prediction.
arXiv Detail & Related papers (2023-03-28T21:07:42Z) - Research Trends and Applications of Data Augmentation Algorithms [77.34726150561087]
We identify the main areas of application of data augmentation algorithms, the types of algorithms used, significant research trends, their progression over time and research gaps in data augmentation literature.
We expect readers to understand the potential of data augmentation, as well as identify future research directions and open questions within data augmentation research.
arXiv Detail & Related papers (2022-07-18T11:38:32Z) - Human-Robot Collaboration and Machine Learning: A Systematic Review of
Recent Research [69.48907856390834]
Human-robot collaboration (HRC) is the approach that explores the interaction between a human and a robot.
This paper proposes a thorough literature review of the use of machine learning techniques in the context of HRC.
arXiv Detail & Related papers (2021-10-14T15:14:33Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z) - Visilant: Visual Support for the Exploration and Analytical Process
Tracking in Criminal Investigations [1.8594711725515676]
Visilant is a web-based tool for the exploration and analysis of criminal data guided by the proposed design.
The tool was evaluated by senior criminology experts within two sessions and their feedback is summarized in the paper.
arXiv Detail & Related papers (2020-09-21T09:24:20Z) - Extracting Entities and Topics from News and Connecting Criminal Records [6.685013315842082]
This paper summarizes methodologies used in extracting entities and topics from a database of criminal records and from a database of newspapers.
Statistical models had successfully been used in studying the topics of roughly 300,000 New York Times articles.
analytical approaches, especially in hotspot mapping, were used in some researches with an aim to predict crime locations and circumstances in the future.
arXiv Detail & Related papers (2020-05-03T00:06:01Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.