{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T22:37:57Z","timestamp":1776983877030,"version":"3.51.4"},"publisher-location":"New York, NY","reference-count":22,"publisher":"Springer New York","isbn-type":[{"value":"9780387737416","type":"print"},{"value":"9780387737423","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73742-3_21","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T05:45:53Z","timestamp":1194932753000},"page":"303-315","source":"Crossref","is-referenced-by-count":9,"title":["Specializing CRISP-DM for Evidence Mining"],"prefix":"10.1007","author":[{"given":"Jacobus","family":"Venter","sequence":"first","affiliation":[]},{"given":"Alta","family":"de Waal","sequence":"additional","affiliation":[]},{"given":"Cornelius","family":"Willers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Association for Computing Machinery (ACM), ( http:\/\/www.acm.org )."},{"key":"21_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-284-5_1","volume-title":"Advanced Methods for Knowledge Discovery from Complex Data","author":"S. Bandyopadhyay","year":"2005","unstructured":"S. Bandyopadhyay, U. Maulik, L. Holder and D. Cook, Advanced Methods for Knowledge Discovery from Complex Data, Springer-Verlag, Secaucus, New Jersey, 2005."},{"key":"21_CR3","unstructured":"P. Chapman, J. Clinton, R. Kerber, T. Khabaza, T. Reinartzrysler, C. Shearer and R. Wirth, CRISP-DM 1.0: Step-by-Step Data Mining Guide, The CRISP-DM Consortium, SPSS ( http:\/\/www.crisp-dm.org\/CRISPWP-0800.pdf ), 1999."},{"issue":"4","key":"21_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H. Chen","year":"2004","unstructured":"H. Chen, W. Chung, J. Xu, G. Wang, Y. Qin and M. Chau, Crime data mining: A general framework and some examples, IEEE Computer, vol. 37(4), pp. 50\u201356, 2004.","journal-title":"IEEE Computer"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"W. Chisum and B. Turvey, Crime Reconstruction, Elsevier, Burlington, Massachusetts, 2007.","DOI":"10.1016\/B978-012369375-4\/50008-1"},{"key":"21_CR6","volume-title":"Jill Dando Institute of Crime Science","author":"R. Clarke","year":"2003","unstructured":"R. Clarke and J. Eck, Become a Problem-Solving Crime Analyst, Jill Dando Institute of Crime Science, University College London, London, United Kingdom ( http:\/\/www.jdi.ucl.ac.uk\/publications\/other_publications\/55steps ), 2003."},{"issue":"3","key":"21_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/S0920-5489(01)00072-1","volume":"23","author":"C. Clifton","year":"2001","unstructured":"C. Clifton and B. Thuraisingham, Emerging standards for data mining, Computer Standards & Interfaces, vol. 23(3), pp. 187\u2013193, 2001.","journal-title":"Computer Standards & Interfaces"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"I. Dickinson and M. Wooldridge, Towards practical reasoning agents for the semantic web, Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 827\u2013834, 2003.","DOI":"10.1145\/860575.860708"},{"issue":"S1","key":"21_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.diin.2006.06.007","volume":"3","author":"S. Garfinkel","year":"2006","unstructured":"S. Garfinkel, Forensic feature extraction and cross-drive analysis, Digital Investigation, vol. 3(S1), pp. 71\u201381, 2006.","journal-title":"Digital Investigation"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.diin.2004.03.001","volume":"1","author":"P. Gladyshev","year":"2004","unstructured":"P. Gladyshev and A. Patel, Finite state machine approach to digital event reconstruction, Digital Investigation, vol. 1(2), pp. 130\u2013149, 2004.","journal-title":"Digital Investigation"},{"key":"21_CR11","unstructured":"Institute for Electrical and Electronics Engineers (IEEE), ( http:\/\/www.ieee.org )."},{"key":"21_CR12","unstructured":"KDNuggets, Data mining methodology poll ( http:\/\/www.kdnuggets.com\/polls\/2004\/data_mining_methodology.htm ), 2004."},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.eswa.2005.07.011","volume":"30","author":"J. Keppens","year":"2006","unstructured":"J. Keppens and B. Schafer, Knowledge based crime scenario modeling, Expert Systems with Applications, vol. 30(2), pp. 203\u2013222, 2006.","journal-title":"Expert Systems with Applications"},{"key":"21_CR14","volume-title":"Bayesian Artificial Intelligence","author":"K. Korb","year":"2004","unstructured":"K. Korb and A. Nicholson, Bayesian Artificial Intelligence, Chapman and Hall\/CRC Press, Boca Raton, Florida, 2004."},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"A. Louis, A. de Waal and J. Venter, Named entity recognition in a South African context, Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, pp. 170\u2013179, 2006.","DOI":"10.1145\/1216262.1216281"},{"key":"21_CR16","volume-title":"Investigative Data Mining for Security and Criminal Detection","author":"J. Mena","year":"2003","unstructured":"J. Mena, Investigative Data Mining for Security and Criminal Detection, Elsevier, Burlington, Massachusetts, 2003."},{"key":"21_CR17","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/0-387-36891-4_6","volume-title":"Advances in Digital Forensics II","author":"M. Pollitt","year":"2006","unstructured":"M. Pollitt and A. Whitledge, Exploring big haystacks: Data mining and knowledge management, in Advances in Digital Forensics II, M. Olivier and S. Shenoi (Eds.), Springer, New York, pp. 67\u201376, 2006."},{"issue":"S1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.diin.2006.06.002","volume":"3","author":"M. Rogers","year":"2006","unstructured":"M. Rogers, K. Seigfried and K. Tidke, Self-reported computer criminal behavior: A psychological analysis, Digital Investigation, vol. 3(S1), pp. 116\u2013120, 2006.","journal-title":"Digital Investigation"},{"key":"21_CR19","unstructured":"Scopus, ( http:\/\/www.scopus.com )."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"W. van der Hoek, W. Jamroga and M. Wooldridge, A logic for strategic reasoning, Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 157\u2013164, 2005.","DOI":"10.1145\/1082473.1082497"},{"key":"21_CR21","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I. Witten","year":"2005","unstructured":"I. Witten and E. Prank, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, San Francisco, California, 2005."},{"key":"21_CR22","volume-title":"An Introduction to Multiagent Systems","author":"M. Wooldridge","year":"2002","unstructured":"M. Wooldridge, An Introduction to Multiagent Systems, John Wiley, Chichester, United Kingdom, 2002."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T05:58:52Z","timestamp":1556949532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387737416","9780387737423"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_21","relation":{},"ISSN":["1571-5736"],"issn-type":[{"value":"1571-5736","type":"print"}],"subject":[],"published":{"date-parts":[[2007]]}}}