{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:08:07Z","timestamp":1773796087081,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04319-0","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T12:25:55Z","timestamp":1756988755000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Crime Analysis and Management System"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5002-3787","authenticated-orcid":false,"given":"Kaushan","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Shouvik","family":"Parui","sequence":"additional","affiliation":[]},{"given":"Subhadra","family":"Shaw","sequence":"additional","affiliation":[]},{"given":"Sougata","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Shirsak","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"key":"4319_CR1","doi-asserted-by":"crossref","unstructured":"Ambhika C, Amirthayogam G, Gupta R, Sharma P. Investigation of online crime management and delivery of public services. In: 2024 1st International conference on advances in computing, communication and networking (ICAC2N). IEEE; 2024. pp. 1652\u20131657.","DOI":"10.1109\/ICAC2N63387.2024.10895027"},{"key":"4319_CR2","doi-asserted-by":"crossref","unstructured":"Bhargavi G, Chopra P. Automated crime reporting and incident management system. In: 2024 International conference on system, computation, automation and networking (ICSCAN). IEEE; 2024, pp. 1\u20135.","DOI":"10.1109\/ICSCAN62807.2024.10894271"},{"issue":"2","key":"4319_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1108\/JFC-01-2023-0006","volume":"31","author":"M Smith","year":"2024","unstructured":"Smith M, Tiwari M. The implications of national blockchain infrastructure for financial crime. J Financ Crime. 2024;31(2):236\u201348.","journal-title":"J Financ Crime"},{"key":"4319_CR4","doi-asserted-by":"crossref","unstructured":"Jain A, Das S, Kushwah AS, Rajora T, Saboo S. Blockchain-based criminal record database management. In: 2021 Asian conference on innovation in technology (ASIANCON). IEEE; 2021. pp. 1\u20135.","DOI":"10.1109\/ASIANCON51346.2021.9544655"},{"key":"4319_CR5","doi-asserted-by":"crossref","unstructured":"Rahman A, Gupta P. Adaptive DL models for urban crime. IEEE Trans Comput Soc Syst. 2025;12(1).","DOI":"10.1109\/TCSS.2025.3590188"},{"key":"4319_CR6","unstructured":"Sugania SS, Jason Daniel Raj D, Jagath Ratchagan S, Dinesh Pandi C. Online crime management system. Int J Sci Res Eng Trends 2021;7(2)."},{"key":"4319_CR7","unstructured":"Rana J, Aggarwal M. Active learning for crime classification. Comput Syst Sci Eng. 2021;39."},{"issue":"1","key":"4319_CR8","first-page":"20220223","volume":"32","author":"RM Saeed","year":"2023","unstructured":"Saeed RM, Abdulmohsin HA. A study on predicting crime rates through machine learning and data mining using text. J Intell Syst. 2023;32(1):20220223.","journal-title":"J Intell Syst"},{"key":"4319_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi12060209","author":"Y Du","year":"2023","unstructured":"Du Y, Ding N. A systematic review of multi-scale spatio-temporal crime prediction methods. ISPRS Int J Geo-Inf. 2023. https:\/\/doi.org\/10.3390\/ijgi12060209.","journal-title":"ISPRS Int J Geo-Inf"},{"key":"4319_CR10","doi-asserted-by":"publisher","first-page":"3569","DOI":"10.1007\/s10462-021-10098-w","volume":"55","author":"A Qammar","year":"2021","unstructured":"Qammar A, Ding J, Ning H. Federated learning attack surface: taxonomy, cyber defences, challenges, and future directions. Artif Intell Rev. 2021;55:3569\u2013606.","journal-title":"Artif Intell Rev"},{"key":"4319_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2025.3590190","author":"A Rahman","year":"2025","unstructured":"Rahman A, Gupta P. Transactions on computational social systems. IEEE Trans Comput Soc Syst. 2025. https:\/\/doi.org\/10.1109\/TCSS.2025.3590190.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"4319_CR12","first-page":"17","volume":"9","author":"M Manengadan","year":"2022","unstructured":"Manengadan M, Nandanan S, Subash N. Crime data analysis, visualization and prediction using LSTM. Int J Data Sci Anal. 2022;9:17.","journal-title":"Int J Data Sci Anal"},{"key":"4319_CR13","doi-asserted-by":"crossref","unstructured":"Saha R et al. crime type classification using XGBoost. SN Comput Sci. 2022;3(2).","DOI":"10.1007\/s42979-022-01372-x"},{"key":"4319_CR14","doi-asserted-by":"crossref","unstructured":"Zhang Y, Cheng T. Graph deep learning model for network-based predictive hotspot mapping of sparse spatio-temporal events. Comput Environ Urban Syst. 2020;9.","DOI":"10.1016\/j.compenvurbsys.2019.101403"},{"key":"4319_CR15","doi-asserted-by":"crossref","unstructured":"Ali A, Noah SAM, Zakaria LQ. A BERT-based model: improving crime news documents classification through adopting pre-trained language models. 2023.","DOI":"10.21203\/rs.3.rs-2582775\/v1"},{"key":"4319_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/s10462-025-11129-6","volume":"58","author":"M Reda","year":"2025","unstructured":"Reda M, Onsy A, Haikal AY, Ghanbari A. A novel reinforcement learning-based multi-operator differential evolution with cubic spline for the path planning problem. Artif Intell Rev. 2025;58:142.","journal-title":"Artif Intell Rev"},{"key":"4319_CR17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0296486","author":"U Butt","year":"2024","unstructured":"Butt U, Letchmunan S, Hassan FH, Koh TW. Leveraging transfer learning with deep learning for crime prediction. PLoS ONE. 2024. https:\/\/doi.org\/10.1371\/journal.pone.0296486.","journal-title":"PLoS ONE"},{"key":"4319_CR18","volume":"8","author":"R Tiwari","year":"2023","unstructured":"Tiwari R, Maheshwari H, Agarwal AK. Hybrid CNN-LSTM model for crime prediction. J Big Data. 2023;8:202.","journal-title":"J Big Data"},{"key":"4319_CR19","unstructured":"Ghosh B, Chatterjee M. Time series crime prediction using a federated machine learning model. 2021."},{"key":"4319_CR20","unstructured":"Patil S, Anandhi RJ. Determining crime pattern based on clusters using guided population with dominancy supported genetic algorithm. 2021;14."},{"key":"4319_CR21","doi-asserted-by":"publisher","DOI":"10.38124\/ijisrt\/25apr1316","author":"A Maurya","year":"2025","unstructured":"Maurya A, Jaiswal A, Kumar A, Kumar A, Pippal S. AI-powered local crime prediction. Int J Innov Sci Res Technol. 2025. https:\/\/doi.org\/10.38124\/ijisrt\/25apr1316.","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"key":"4319_CR22","unstructured":"Salam MA, Taha S, Ramadan M (2022) Time series crime prediction using a federated machine learning model"},{"issue":"3","key":"4319_CR23","doi-asserted-by":"publisher","first-page":"2887","DOI":"10.1007\/s12652-023-04530-y","volume":"14","author":"K Jenga","year":"2023","unstructured":"Jenga K, Catal C, Kar G. Machine learning in crime prediction. J Ambient Intell Human Comput. 2023;14(3):2887\u2013913.","journal-title":"J Ambient Intell Human Comput"},{"key":"4319_CR24","unstructured":"Gopi S, Vijay Ganesh B, Pradeeshwar UG. Crime prediction and analysis using data mining and machine learning: an approach that helps Predictive policing. 2023."},{"key":"4319_CR25","doi-asserted-by":"publisher","DOI":"10.4324\/9780203083451","volume-title":"Criminal recidivism: explanation, prediction and prevention","author":"G Zara","year":"2015","unstructured":"Zara G, Farrington D. Criminal recidivism: explanation, prediction and prevention. New York: Willan; 2015."},{"key":"4319_CR26","doi-asserted-by":"crossref","unstructured":"Monawar T, Mahmud SB, Hira A. Anti-theft vehicle tracking and regaining system with automatic police notifying using Haversine formula. In: 2017 4th international conference on advances in electrical engineering (ICAEE). IEEE; 2017. pp. 775\u2013779.","DOI":"10.1109\/ICAEE.2017.8255459"},{"issue":"04","key":"4319_CR27","first-page":"2115","volume":"6","author":"A Khan","year":"2019","unstructured":"Khan A, Singh A, Chauhan A, Gupta A. Crime management system. Int Res J Eng Technol (IRJET). 2019;6(04):2115.","journal-title":"Int Res J Eng Technol (IRJET)"},{"key":"4319_CR28","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Tian Z, Li M, Qiu M, Sun Y, Su S. Block-DEF: a secure digital evidence framework using blockchain. Inf Sci. 2019;491:151\u201365.","journal-title":"Inf Sci"},{"issue":"3","key":"4319_CR29","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1093\/socpro\/spaa004","volume":"68","author":"S Brayne","year":"2021","unstructured":"Brayne S, Christin A. Technologies of crime prediction: the reception of algorithms in policing and criminal courts. Soc Probl. 2021;68(3):608\u201324.","journal-title":"Soc Probl"},{"key":"4319_CR30","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2013.00021","volume":"7","author":"A Natekin","year":"2013","unstructured":"Natekin A, Knoll A. Gradient boosting machines, a tutorial. Front Neurorobot. 2013;7:21.","journal-title":"Front Neurorobot"},{"issue":"6","key":"4319_CR31","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1002\/wics.1278","volume":"5","author":"B De Ville","year":"2013","unstructured":"De Ville B. Decision trees. WIREs Comput Stat. 2013;5(6):448\u201355.","journal-title":"WIREs Comput Stat"},{"issue":"1","key":"4319_CR32","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s44163-025-00234-8","volume":"5","author":"DK Kadali","year":"2025","unstructured":"Kadali DK, Mohan RJ, Naik MC. Uncertain crime data analysis using hybrid approach. Discov Artif Intell. 2025;5(1):15.","journal-title":"Discov Artif Intell"},{"key":"4319_CR33","first-page":"1","volume-title":"Encyclopedia of mathematical geosciences","author":"PA Dowd","year":"2023","unstructured":"Dowd PA. Accuracy and precision. In: Encyclopedia of mathematical geosciences. Cham: Springer International Publishing; 2023. p. 1\u20134."},{"key":"4319_CR34","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-38652-7_2","volume-title":"Dimensionality reduction with unsupervised nearest neighbors","author":"O Kramer","year":"2013","unstructured":"Kramer O, Kramer O. K-nearest neighbors. In: Dimensionality reduction with unsupervised nearest neighbors. Berlin: Springer; 2013. p. 13\u201323."},{"key":"4319_CR35","doi-asserted-by":"crossref","unstructured":"Vishwanathan SVM, Murty MN. SSVM: a simple SVM algorithm. In: Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No. 02CH37290), vol. 3. IEEE;2002. pp. 2393\u20132398.","DOI":"10.1109\/IJCNN.2002.1007516"},{"issue":"1","key":"4319_CR36","doi-asserted-by":"publisher","first-page":"31","DOI":"10.17849\/insm-47-01-31-39.1","volume":"47","author":"SJ Rigatti","year":"2017","unstructured":"Rigatti SJ. Random forest. J Insur Med. 2017;47(1):31\u20139.","journal-title":"J Insur Med"},{"key":"4319_CR37","unstructured":"Dutta R, Bera P. Semi-supervised crime detection. Expert Syst Appl. 2021;185."},{"key":"4319_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2024.112133","volume":"362","author":"L Klas\u00e9n","year":"2024","unstructured":"Klas\u00e9n L, Fock N, Forchheimer R. The invisible evidence: digital forensics as key to solving crimes in the digital age. Forensic Sci Int. 2024;362:112133.","journal-title":"Forensic Sci Int"},{"issue":"Suppl 1","key":"4319_CR39","first-page":"15","volume":"88","author":"HK Sharma","year":"2023","unstructured":"Sharma HK, Choudhury T, Kandwal A. Machine learning based analytical approach for geographical analysis and prediction of Boston City crime using geospatial dataset. GeoJournal. 2023;88(Suppl 1):15\u201327.","journal-title":"GeoJournal"},{"key":"4319_CR40","doi-asserted-by":"publisher","first-page":"60153","DOI":"10.1109\/ACCESS.2023.3286344","volume":"11","author":"V Mandalapu","year":"2023","unstructured":"Mandalapu V, Elluri L, Vyas P, Roy N. Crime prediction using machine learning and deep learning: a systematic review and future directions. IEEE Access. 2023;11:60153\u201370.","journal-title":"IEEE Access"},{"key":"4319_CR41","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130293","author":"HA Razak","year":"2022","unstructured":"Razak HA, Tahir NM, Abd Almisreb A, Zakaria NK, Zamri NFM. Detection of criminal behavior at the residential unit based on deep convolutional neural network. Int J Adv Comput Sci Appl. 2022. https:\/\/doi.org\/10.14569\/IJACSA.2022.0130293.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"4319_CR42","volume-title":"Machine intelligence","author":"Z Li","year":"2025","unstructured":"Li Z, et al. Federated graph learning for urban crime prediction. In: Machine intelligence. Switzerland: Springer; 2025."},{"issue":"1","key":"4319_CR43","volume":"6","author":"F Dakalbab","year":"2022","unstructured":"Dakalbab F, Talib MA, Waraga OA, Nassif AB, Abbas S, Nasir Q. Artificial intelligence & crime prediction: a systematic literature review. Soc Sci Human Open. 2022;6(1):100342.","journal-title":"Soc Sci Human Open"},{"issue":"8","key":"4319_CR44","doi-asserted-by":"publisher","first-page":"22663","DOI":"10.1007\/s11042-023-16371-0","volume":"83","author":"RM Aziz","year":"2024","unstructured":"Aziz RM, Hussain A, Sharma P. Cognizable crime rate prediction and analysis under Indian penal code using deep learning with novel optimization approach. Multimedia Tools Appl. 2024;83(8):22663\u2013700.","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"4319_CR45","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1177\/00195561241271533","volume":"70","author":"A Singh","year":"2024","unstructured":"Singh A, Anusha. The Digital Personal Data Protection Act, 2023: an ambitious government step towards ensuring its wide reach. Indian J Public Admin. 2024;70(3):502\u201315.","journal-title":"Indian J Public Admin"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04319-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04319-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04319-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T01:02:24Z","timestamp":1757034144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04319-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,4]]},"references-count":45,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["4319"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04319-0","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,4]]},"assertion":[{"value":"25 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no personal or financial relationships that could potentially influence the research or interpretation of results.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not contain any studies with human or animal participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and\/or animals"}},{"value":"The Crime Analysis and Management System (CAMS) ensures ethical, legal, and secure handling of sensitive crime data. It emphasizes fairness, transparency, human oversight, strong encryption, role-based access, and compliance with Indian laws like the IT Act and DPDP Act, 2023, supported by audits, training, and ethical assessments. The above-mentioned attributes have been explained in detail in \u201c\u201d.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical considerations"}}],"article-number":"799"}}