{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:18Z","timestamp":1738777218511,"version":"3.37.0"},"reference-count":17,"publisher":"Academy Publisher","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.4.1005-1011","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T12:49:14Z","timestamp":1396356554000},"source":"Crossref","is-referenced-by-count":2,"title":["Computer Crime Forensics Based on Improved Decision Tree Algorithm"],"prefix":"10.4304","volume":"9","author":[{"given":"Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xinguang","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Bian","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,4,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219052"},{"issue":"no. 2","key":"ref2","first-page":"147","article-title":"Data mining and crime analysis","volume":"1","author":"Giles","year":"2011","unstructured":"[2] Oatley Giles, Ewart Brian, \"Data mining and crime analysis\", Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol. 1, no. 2, pp. 147-153, 2011.","journal-title":"Wiley Interdisciplinary Reviews"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1360\/jos160260"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.10.1493-1504"},{"issue":"no. 2","key":"ref5","first-page":"383","article-title":"Crime data mining based on extension classification","volume":"115","author":"Weidong","year":"2012","unstructured":"[5] Tao Weidong, \"Crime data mining based on extension classification\", Advances in Intelligent and Soft Computing, vol. 115 no. 2, pp. 383-390, 2012.","journal-title":"Advances in Intelligent and Soft Computing"},{"issue":"no. 8","key":"ref6","first-page":"213","article-title":"The Analysis of User Forensics Based on Web Usage Mining","volume":"33","author":"Bo","year":"2006","unstructured":"[6] ZHANG Bo, WU Lili, ZHOU Min, \"The Analysis of User Forensics Based on Web Usage Mining\", Computer Science, vol. 33, no. 8, pp. 213-215, 2006.","journal-title":"Computer Science"},{"issue":"no. 1","key":"ref7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10462-008-9079-0","article-title":"Mixed-initiative problem solving with decision trees","volume":"23","author":"McSherry","year":"2008","unstructured":"[7] David McSherry, \"Mixed-initiative problem solving with decision trees\", Artificial Intelligence Review, vol. 23, no. 1, pp. 17-33, 2008.","journal-title":"Artif Intell Rev","ISSN":"https:\/\/id.crossref.org\/issn\/0269-2821","issn-type":"print"},{"issue":"no. 5","key":"ref8","first-page":"56","article-title":"The Algorithm of users forensics associate rules mining Based on Specific Pattern Tree","volume":"13","author":"Zhen","year":"2007","unstructured":"[8] Dai Zhen, Fei Hongxiao, Xie Wenbiao, \"The Algorithm of users forensics associate rules mining Based on Specific Pattern Tree\", Computer Systems Applications, vol. 13, no. 5, pp. 56-59, 2007.","journal-title":"Computer Systems Applications"},{"issue":"no. 6","key":"ref9","first-page":"109","article-title":"CHEN Xiang-tao, \"An Improved ID3 Algorithm of Decision Trees","volume":"31","author":"Kaise","year":"2009","unstructured":"[9] Qu Kaise, CHEN Xiang-tao, \"An Improved ID3 Algorithm of Decision Trees\", Computer Engineering & Science, vol. 31, no. 6, pp. 109-111, 2009.","journal-title":"Computer Engineering & Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.11.1610-1617"},{"issue":"no. 6","key":"ref11","first-page":"109","article-title":"An Improved ID3 Algorithm of Decision Trees","volume":"31","author":"Ai-hui","year":"2009","unstructured":"[11] HUANG Ai-hui, CHEN Xiang-tao, \"An Improved ID3 Algorithm of Decision Trees\", Computer Engineering&Science, vol. 31, no. 6, pp. 109-111, 2009.","journal-title":"Computer Engineering&Science"},{"issue":"no. 39","key":"ref12","first-page":"104","article-title":"Improved Algorithm Based on ID3","volume":"25","author":"Kai-she","year":"2003","unstructured":"[12] QU Kai-she, CHENG Wen-li, WANG Jun-hong, \"Improved Algorithm Based on ID3\", Computer Engineering and Applications, vol. 25, no. 39, pp. 104-107, 2003.","journal-title":"Computer Engineering and Applications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.apor.2008.11.001"},{"issue":"no. 2","key":"ref14","first-page":"54","article-title":"ID3 Algorithm and C4. 5 Algorithm Based on Decision Tree","volume":"26","author":"Yang","year":"2011","unstructured":"[15] GAO Yang, LIAO Jia-ping, WU Wei, \"ID3 Algorithm and C4. 5 Algorithm Based on Decision Tree\", Journal of Hubei University of Technology, vol. 26, no. 2, pp. 54-56, 2011.","journal-title":"Journal of Hubei University of Technology"},{"issue":"no. 5","key":"ref15","first-page":"9","article-title":"Optimization of ID3 algorithm","volume":"38","author":"Haodong","year":"2010","unstructured":"[16] Zhu Haodong, Zhong Yong, \"Optimization of ID3 algorithm\", Huazhong Keji Daxue Xuebao, vol. 38, no. 5, pp. 9-12, 2010.","journal-title":"Huazhong Keji Daxue Xuebao"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.415-419"},{"issue":"no. 2","key":"ref17","first-page":"5243","article-title":"Offset stream technology - Comparison of results from UCI and GRC Experiments","volume":"8","author":"Zaman","year":"2007","unstructured":"[18] Zaman K. B. M. Q., Bridges J. E., Papamoschou, D., \"Offset stream technology - Comparison of results from UCI and GRC Experiments\", Collection of Technical Papers, vol. 8, no. 2, pp. 5243-5256, 2007.","journal-title":"Collection of Technical Papers"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:44Z","timestamp":1738775144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":17,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.4.1005-1011","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}