{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T19:44:35Z","timestamp":1743795875887,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551797"},{"type":"electronic","value":"9783030551803"}],"license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55180-3_39","type":"book-chapter","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:04:00Z","timestamp":1598310240000},"page":"528-539","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Cognitive Computing Technique Using Convolutional Networks for Automating the Criminal Investigation Process in Policing"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Schiliro","sequence":"first","affiliation":[]},{"given":"Amin","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Nour","family":"Moustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"39_CR1","first-page":"1","volume":"539","author":"A Higginson","year":"2017","unstructured":"Higginson, A., Eggins, E., Mazerolle, L.: Police techniques for investigating serious violent crime: a systematic review. Trends Issues Crime Crim. Justice 539, 1\u201313 (2017)","journal-title":"Trends Issues Crime Crim. Justice"},{"issue":"3","key":"39_CR2","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/10345329.2009.12035823","volume":"20","author":"A Loughnan","year":"2009","unstructured":"Loughnan, A.: The legislation we had to have?: the crimes (criminal organisations control) act 2009 (NSW). Curr. Issues Crim. Justice 20(3), 457\u2013465 (2009)","journal-title":"Curr. Issues Crim. Justice"},{"unstructured":"Police Investigation process, October 2019. https:\/\/www.victimsofcrime.vic.gov.au\/police-investigation\/the-investigation","key":"39_CR3"},{"doi-asserted-by":"crossref","unstructured":"Connor, M.A.: Professionalism in forensic archaeology: transitioning from \u201cCowboy of Science\u201d to \u201cOfficer of the Court\u201d. In: Forensic Archaeology, pp. 33\u201342. Springer, Cham (2019)","key":"39_CR4","DOI":"10.1007\/978-3-030-03291-3_3"},{"unstructured":"Cronin, J.M., Murphy, G.R., Spahr, L.L., Toliver, J.I., Weger, R.E.: Promoting Effective Homicide Investigation (2007) (2019)","key":"39_CR5"},{"doi-asserted-by":"crossref","unstructured":"Stelfox, P.: Criminal investigation: an introduction to principles and practice. Willan (2013)","key":"39_CR6","DOI":"10.4324\/9781315880730"},{"unstructured":"Scalia, V.: Martin O\u2019Neill-Key (2018). Challenges in Criminal Investigation. Policing: J. Policy Pract. (2018)","key":"39_CR7"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Crime scene investigation image retrieval with fusion CNN features based on transfer learning. In: Proceedings of the 3rd International Conference on Multimedia and Image Processing. ACM (2018)","key":"39_CR8","DOI":"10.1145\/3195588.3195605"},{"doi-asserted-by":"crossref","unstructured":"Hu, Y., et al.: Short text classification with a convolutional neural networks based method. In: 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV). IEEE (2018)","key":"39_CR9","DOI":"10.1109\/ICARCV.2018.8581332"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1016\/j.neucom.2017.11.022","volume":"275","author":"M Tzelepi","year":"2018","unstructured":"Tzelepi, M., Tefas, A.: Deep convolutional learning for content based image retrieval. Neurocomputing 275, 2467\u20132478 (2018)","journal-title":"Neurocomputing"},{"key":"39_CR11","first-page":"107","volume":"1","author":"A Conneau","year":"2017","unstructured":"Conneau, A., Schwenk, H., Barraul, L., et al.: Very deep convolutional networks for text classification. Assoc. Comput. Linguist. 1, 107\u20131116 (2017)","journal-title":"Assoc. Comput. Linguist."},{"key":"39_CR12","first-page":"655","volume":"1","author":"N Kalchbrenner","year":"2014","unstructured":"Kalchbrenner, N., Grefenstette, E., Blunsom, P.A.: Convolutional neural network for modelling sentences. Assoc. Comput. Linguist. 1, 655\u2013665 (2014)","journal-title":"Assoc. Comput. Linguist."},{"doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pp. 1746\u20131751 (2014)","key":"39_CR13","DOI":"10.3115\/v1\/D14-1181"},{"doi-asserted-by":"crossref","unstructured":"Lai, S., Xu, L., Liu, K., Zhao, J.: Recurrent convolutional neural networks for text classification. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2267\u20132273 (2015)","key":"39_CR14","DOI":"10.1609\/aaai.v29i1.9513"},{"doi-asserted-by":"crossref","unstructured":"Lee, J.Y., Dernoncourt, F.: Sequential short-text classification with recurrent and convolutional neural networks. In: The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 515\u2013520 (2016)","key":"39_CR15","DOI":"10.18653\/v1\/N16-1062"},{"unstructured":"Sentiment Polarity datasets, October 2019. http:\/\/www.cs.cornell.edu\/people\/pabo\/movie-review-data\/","key":"39_CR16"},{"unstructured":"Rong, X.: word2vec parameter learning explained. arXiv preprint arXiv:1411.2738 (2014)","key":"39_CR17"},{"unstructured":"CNN text classification TensorFlow, October 2019. http:\/\/www.wildml.com\/2015\/12\/implementing-a-cnn-for-text-classification-in-tensorflow\/","key":"39_CR18"},{"unstructured":"Fleming, J.: The pursuit of professionalism: lessons from Australasia. The future of policing, pp. 385\u2013398. Routledge (2013)","key":"39_CR19"},{"doi-asserted-by":"crossref","unstructured":"Koper, C.S., Lum, C., Willis, J.J.: Optimizing the use of technology in policing: results and implications from a multi-site study of the social, organizational, and behavioural aspects of implementing police technologies. Policing: J. Policy Pract. 8(2), 212\u2013221 (2014)","key":"39_CR20","DOI":"10.1093\/police\/pau015"},{"unstructured":"Gehl, R., Plecas, D.: Introduction to criminal investigation: processes, practices and thinking. Justice Institute of British Columbia (2017)","key":"39_CR21"},{"issue":"2","key":"39_CR22","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1075\/pc.14.2.14bab","volume":"14","author":"C Baber","year":"2006","unstructured":"Baber, C., Smith, P., Cross, J., Hunter, J.E., McMaster, R.: Crime scene investigation as distributed cognition. Pragmat. Cogn. 14(2), 357\u2013385 (2006)","journal-title":"Pragmat. Cogn."},{"unstructured":"Braga, A.A.: Moving the work of criminal investigators towards crime control. Harvard Kennedy School Program in Criminal Justice Policy and Management (2011)","key":"39_CR23"},{"issue":"3","key":"39_CR24","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s11292-016-9261-3","volume":"12","author":"B Ariel","year":"2016","unstructured":"Ariel, B., et al.: Report: increases in police use of force in the presence of body-worn cameras are driven by officer discretion: a protocol-based subgroup analysis of ten randomized experiments. J. Exp. Criminol. 12(3), 453\u2013463 (2016). https:\/\/doi.org\/10.1007\/s11292-016-9261-3","journal-title":"J. Exp. Criminol."},{"doi-asserted-by":"crossref","unstructured":"Parris, H.: The home office and the provincial police in England and Wales\u20141856\u20131870. In: The New Police in the Nineteenth Century, pp. 117\u2013142. Routledge (2017)","key":"39_CR25","DOI":"10.4324\/9781315085685-7"},{"unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)","key":"39_CR26"},{"doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015)","key":"39_CR27","DOI":"10.1109\/CVPR.2015.7298594"},{"unstructured":"Saikia, M., Baruah, B.: Chaotic map based image encryption in Spatial domain: a brief survey. In: Proceedings of the First International Conference on Intelligent Computing and Communication. Springer, Singapore (2017)","key":"39_CR28"},{"doi-asserted-by":"crossref","unstructured":"Schiliro, F., Beheshti, A., Ghodratnama, S., Amouzgar, F., Benatallah, B., Yang, J., Sheng, Q.Z., Casati, F., Motahari-Nezhad, H.R.: iCOP: IoT-enabled policing processes. In: International Conference on Service-Oriented Computing, pp. 447\u2013452. Springer, Cham, November 2018","key":"39_CR29","DOI":"10.1007\/978-3-030-17642-6_42"},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Creech, G., Sitnikova, E., Keshk, M.: Collaborative anomaly detection framework for handling big data of cloud computing. In: 2017 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE, November 2017","key":"39_CR30","DOI":"10.1109\/MilCIS.2017.8190421"},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Creech, G., Slay, J.: Anomaly detection system using beta mixture models and outlier detection. In: Progress in Computing, Analytics and Networking, pp. 125\u2013135. Springer, Singapore (2018)","key":"39_CR31","DOI":"10.1007\/978-981-10-7871-2_13"},{"doi-asserted-by":"crossref","unstructured":"Keshk, M., Moustafa, N., Sitnikova, E., Creech, G.: Privacy preservation intrusion detection technique for SCADA systems. In: 2017 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE, November 2017","key":"39_CR32","DOI":"10.1109\/MilCIS.2017.8190422"},{"doi-asserted-by":"crossref","unstructured":"Beheshti, A., Schiliro, F., Ghodratnama, S., Amouzgar, F., Benatallah, B., Yang, J., Motahari-Nezhad, H.R.: iProcess: enabling IoT platforms in data-driven knowledge-intensive processes. In: International Conference on Business Process Management, pp. 108\u2013126. Springer, Cham, September 2018","key":"39_CR33","DOI":"10.1007\/978-3-319-98651-7_7"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55180-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T19:20:29Z","timestamp":1668021629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55180-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"ISBN":["9783030551797","9783030551803"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55180-3_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"25 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}