ABSTRACT

Most of the research aimed at counterterrorism, fraud detection, or other forensic applications assumes that this is a specialized application domain for mainstream knowledge discovery. Unfortunately, knowledge discovery changes completely when the datasets being used have been manipulated in order to conceal some underlying activity. Knowledge Dis

chapter 1|20 pages

Introduction

chapter 2|20 pages

Data

chapter 3|26 pages

High-Level Principles

chapter 5|30 pages

Looking for Similarity – Clustering

chapter 7|46 pages

Discovery from Public Textual Data

chapter 8|26 pages

Discovery in Private Communication

chapter 9|28 pages

Discovering Mental and Emotional State

chapter 10|16 pages

The Bottom Line