<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>GRACE: Graph-based Representation and Analysis for Crime Exploration</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gianpaolo Iuliano</string-name>
          <email>giaiuliano@unisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grazia Margarella</string-name>
          <email>gmargarella@unisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Polese</string-name>
          <email>gpolese@unisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roberto Stanzione</string-name>
          <email>rstanzione@unisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Salerno</institution>
          ,
          <addr-line>via Giovanni Paolo II, 132, Fisciano (SA), 84084</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <abstract>
        <p>Criminal investigations increasingly rely on the analysis of vast amounts of unstructured textual data, such as crime reports, social media content, and open-source intelligence. While recent advances in Natural Language Processing (NLP) have shown promise in automating parts of this process, existing approaches often lack explicit, interactive knowledge representations that investigators can directly manipulate and enrich. In this paper, we envision Grace, a framework that combines automated information extraction, external data enrichment, and interactive visualization to support investigative workflows. Starting from unstructured crime reports, Grace applies named entity recognition and relation extraction to construct a structured knowledge graph, which is further augmented with contextual attributes from external sources. Investigators can explore and refine this evolving graph through an interactive interface that supports natural language querying, dynamic visualization of connections, and manual correction or enrichment of knowledge. To show the potential of Grace in supporting the investigation process, we provide a use case related to a fictional crime investigation. While still conceptual, our proposal aims to inspire the development of practical investigative tools that bridge automation and human expertise, ultimately enhancing the eficiency and efectiveness of criminal investigations.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Criminal Investigations</kwd>
        <kwd>Natural Language Processing</kwd>
        <kwd>Information Extraction</kwd>
        <kwd>Graphs</kwd>
        <kwd>Interactive Visualization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Criminal investigations require law enforcement agencies to collect, analyze, and interpret vast amounts
of information. In recent years, the scale and complexity of this task have grown dramatically, as
law enforcement agencies are confronted with millions of crime incidents every year. For instance, in
the United States alone, over 14 million criminal ofenses were reported in 2024 1. This huge volume
of cases is compounded by the increasing set of digital traces, social media communications, and
open-source intelligence that investigators must consider to fully contextualize evidence. To cope
with this complexity, researchers and practitioners have increasingly explored computational methods
to support the investigation process. For example, recent approaches have tackled problems such as
determining the most influential members of a criminal group [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], preventing online crimes [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], or
sorting and identifying relevant artifacts [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In parallel, large-scale European Union–funded projects
such as TITANIUM2 and TENSOR3 have also highlighted the growing interest in this direction.
      </p>
      <p>
        At the heart of crime investigation processes lie crime reports, which serve as the primary
documentation of incidents and provide investigators with the factual basis for understanding criminal
activity. Each report is not only a narrative of a specific event but also a potential piece of a much
larger puzzle that may reveal patterns, networks, or emerging threats. However, the sheer volume and
1st Workshop on supporting CRIme reSolution Through Artificial INtelligence (CRISTAIN), held in conjunction with CHITALY
2025, Salerno, Italy, October 6–10
* Corresponding author.
heterogeneity of these documents make the extraction of relevant information and the identification
of relationships a slow and demanding task. Recent advances in Natural Language Processing (NLP)
represent a major opportunity to address this challenge, enabling to automatically extract knowledge
from large volumes of unstructured text and uncover hidden relationships. Recent works have begun to
explore the use of NLP to support investigative processes [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. However, existing systems often lack an
explicit representation of knowledge that can be directly manipulated by investigators. Without such
representations, it becomes dificult for investigators to explore the data beyond the system’s predefined
outputs. Furthermore, current tools ofer limited interactivity: investigators may receive extracted
results or predictions, but they are not empowered to query the data in natural language, to visualize
connections dynamically, or to correct and enrich the knowledge base with their own insights. Finally,
the integration of external contextual knowledge may further support and ease the investigations.
      </p>
      <p>Motivated by these gaps, in this paper we envision an investigative support tool, namely Grace
(Graph-based Representation and Analysis for Crime Exploration), that combines automated information
extraction, data enrichment, and interactive visualization. Starting from textual crime reports, Grace
applies Named Entity Recognition (NER) and Relation Extraction (RE) to identify relevant entities and
their relationships. These elements are represented as nodes and relationships in a graph, creating
an initial structured representation of the case. This graph is then enriched through the integration
of external knowledge sources, transforming it into an enriched graph where nodes and edges are
associated with attributes, and can be dynamically updated when new reports are available. Moreover,
Grace provides an interface that enables investigators to explore, query, and refine the knowledge base.
In addition, it supports natural language querying, allowing investigators to easily formulate questions.
The visual environment also allows dynamic exploration of connections and the possibility to add or
correct information. To summarize, the key novelties that characterize Grace are the following:
• It allows to automatically enrich the graph obtained from the reports with external knowledge;
• It allows to dynamically update the aforementioned graph when new case reports are available;
• It provides users with an interface that they can analyze and query using natural language and/or
predefined queries.</p>
      <p>The rest of this paper is organized as follows: Section 2 discusses related works, while Section 3 provides
an overview of the problem. Section 4 details Grace and its components, while Section 5 provides a use
case to show its potential. Finally, Section 6 provides closing remarks and future directions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        In recent years, several research eforts have proposed computational approaches to support forensic
reasoning and crime investigation. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the authors introduce CISRI, a graph-based framework aimed
at analyzing the structural properties of criminal networks, enabling the identification of important
actors and relational patterns. On the other hand, in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], the authors propose an approach that, starting
from unstructured social media content, builds a knowledge graph, thereby providing a structure that
captures relationships and that can be used to uncover hidden patterns and relationships. Graphs are
also leveraged in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], in which the authors focus on legal reasoning about evidences. In particular, they
explore the use of support graphs as an intermediate representation to translate Bayesian networks
into argumentative structures, thereby improving the interpretability of probabilistic evidence while
preserving the underlying independence information. Finally, another graph-based approach was
proposed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], in which the authors propose a novel graph model for network forensics, where
evidence graphs support both local and global reasoning about attack scenarios and enable interactive
hypothesis testing to uncover implicit attacker behavior. Recently, the research community explored the
use of NLP techniques in their approaches. In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the authors present an early warning system based
on NLP and knowledge discovery that assists law enforcement agencies in collecting and analyzing
large volumes of unstructured textual data from sources such as the dark web. In particular, the authors
leverage NER to build a Knowledge Repository, and then they provide a set of Knowledge Discovery
tools to perform tasks such as association rule mining and clustering. On the other hand, in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] the
authors combine NLP and graph-based methods to extract and structure relations from crime reports on
violence against women in India. Named entities are identified via NER, and relationships are captured
through hierarchical graph clustering.
      </p>
      <p>The works above illustrate the potential of both graph-based and NLP-driven approaches in supporting
forensic reasoning and criminal investigations. However, only a limited number of studies attempt to
combine the two perspectives, leaving open opportunities for designing more refined systems. Moreover,
none of the reviewed works addresses the design of an interactive interface to enable investigators
to actively manipulate and act upon the extracted data and knowledge. Finally, none of the existing
approaches considers the possibility of dynamically updating the graph, either manually or automatically.
This aspect is crucial in real investigative scenarios, where new reports continuously emerge and the
knowledge base must evolve accordingly. With Grace, we envision a more complete framework that
includes all these features, thereby providing a valuable support to crime investigations.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem overview</title>
      <p>
        In the investigative context, textual reports are one of the main sources of information, as they contain
detailed descriptions of crime scenes, testimonies, and observations. These documents contain a wide
variety of entities and relationships, such as people, places, events, and objects, expressed in natural
language. The analysis of such texts is crucial for detectives, who must extract relevant elements, relate
them to each other, and construct a coherent representation of events. However, this process remains
largely manual, time-consuming, and cognitively demanding. Despite the significant efort required for
this process, several studies in the field of criminology have shown that the structured extraction of
entities and relationships from investigative texts can drastically reduce the risk of information loss
and facilitate the identification of recurring patterns [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>
        Crime reports often lack a formal representation that allows immediate correlations between
documents, resulting in fragmented information and making it dificult to identify indirect connections
between people and places, or between events separated in time. Furthermore, the absence of
integration with external knowledge bases, such as DBPedia [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and Wikidata [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], limits the possibility of
contextualizing and enriching data, for example, by disambiguating entities with common names or
linking an organization mentioned in reports to public domain information. Another critical issue with
the tools currently available concerns the dificulties experienced by non-expert users in using them
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Although these technologies have demonstrated great potential in various application domains,
their use often remains confined to highly specialized academic or industrial environments. Access to
data is mediated by formal query languages, such as SPARQL[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], which require advanced technical
skills and in-depth knowledge of the underlying models. Recent studies emphasize that modeling
and interacting with graphs are complex activities that are not easily accessible to non-expert users,
both because of the dificulty of mastering the formalisms and the absence of truly intuitive interfaces
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This technological gap translates into a significant barrier in the investigative context: detectives,
despite being experts in reading and interpreting reports, generally do not have simple and immediate
tools to transform such data into structured and navigable knowledge. This results in the need for
solutions that reduce technical complexity, favoring natural and user-centered modes of interaction.
      </p>
      <p>To address these limitations, Grace aims to transform investigative reports into structured and
navigable knowledge. It applies NER and RE to identify and connect entities such as people, places,
and events, organizing them into a dynamic knowledge graph enriched with external resources, like
Wikidata and DBpedia, enabling disambiguation and contextualization. Grace is designed for detectives
and non-technical users, providing an intuitive interface that allows them to explore, query, and
modify the graph by adding, removing, or editing entities and relationships. Predefined queries support
common investigative tasks, while a text-to-query component allows users to formulate natural language
questions without expertise in formal query languages. This combination of automated extraction,
semantic enrichment, interactive editing, and flexible querying, allows to reduce analysis time, lowers
cognitive load, and enhances the ability to detect connections and patterns.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The Grace system</title>
      <p>Grace is structured as a modular pipeline that integrates NLP techniques, knowledge graph construction,
and interactive visualization. Its main goal is to transform unstructured investigative reports into a
structured, navigable representation that supports investigators in their analytical activities. As can
be seen in Figure 1, Grace consists of several components that allow the execution of the extraction
and enrichment tasks, as well as the exploration of data. Initially, the investigative reports are fed into
the Information Extraction Component, which applies NLP techniques to identify and extract data from
the available documents. Once extracted, this information is organized into a graph, which allows it
to be represented in a structured and easily navigable manner. This graph is then enriched through
the Enrichment Component. Specifically, this component integrates external knowledge from resources
such as Wikidata or DBpedia, enabling disambiguation and semantic enhancement of entities. This
process increases the knowledge present in the graph, providing additional details and characteristics
related to the various entities extracted. Once the graph has been constructed and enriched, it becomes
the input for the Exploration and Visualization Component, which makes the graph accessible through
an interactive graphical interface designed specifically for non-technical users. This interface allows
investigators to explore the graph, manually modify its content, and execute queries.</p>
      <p>In what follows, we detail Grace’s main components, describing the techniques used in each of them.</p>
      <sec id="sec-4-1">
        <title>4.1. Information Extraction Component</title>
        <p>
          The Information Extraction Component deals with all text analysis processes aimed at identifying entities
and relationships between them within investigative reports. In particular, this component takes
text reports as input and applies NER and RE techniques to identify main entities, such as people,
places, weapons, or events, as well as the relationships between them. To extract this information,
the Information Extraction component can leverage fine-tuned Large Language Models (e.g., LLaMA
[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], GPT [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]) or Machine Learning approaches designed for the criminological domain [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. These
approaches identifies entities, such as people, criminal organizations, places, types of crime, and material
evidence, and relationships between them, for example, linking a suspect to a specific crime or a criminal
event to a specific location. The process involves a text pre-processing phase, followed by zero-shot or
few-shot model inference, and subsequently post-processed aimed at normalizing entities and reducing
false positives. At the end of this process, the user can manually interact with the results by adding or
removing entities and relationships not extracted by them. The results are then organized into a graph,
which allows for the representation of the case in a structured manner, facilitating the identification of
patterns and meaningful connections.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Enrichment Component</title>
        <p>
          The graph generated by the Information Extraction Component is provided as input for the second
component of Grace, i.e., the Enrichment component. This component extends the graph beyond the
information explicitly extracted from reports, resolving ambiguities and adding contextual knowledge.
Its operation relies on entity linking techniques, which map textual mentions of people, places, or
organizations to identifiers in external resources such as Wikidata or DBpedia. This process combines
string similarity measures (e.g., Levenshtein distance), contextual embeddings derived from language
models, and disambiguation rules based on co-occurring entities in the same document [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Once an
entity is matched, the system uses SPARQL queries to retrieve relevant attributes and relations, such as
alternative names, geographical coordinates, afiliations, or classifications. These are integrated into
the graph as additional node properties or new edges, while maintaining metadata that distinguishes
extracted information from externally enriched knowledge and the external knowledge bases.
        </p>
        <p>In this way, this component transforms the graph from an exact representation of the reports into
a semantically enhanced structure, where entities are enriched and connected through meaningful
relationships extracted from both the reports and external knowledge bases.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Exploration and Visualization Component</title>
        <p>
          The enriched graph produced by the previous component serves as the input for the Exploration and
Visualization component. This component provides investigators with a versatile interface to explore,
analyze, and manipulate the graph in a way that reflects both the original reports and the additional
contextual information integrated during the enrichment. In particular, queries can be executed either
using predefined templates, specifically designed to address common investigative scenarios, or through
a text-to-query conversion module [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], which allows for the translation of natural language questions
into formal queries without requiring technical expertise. Beyond querying, the interface enables
investigators to actively manage the graph: they can add new nodes and edges as new information
emerges, remove outdated or incorrect entries, and modify existing connections to ensure that the
representation remains accurate and up-to-date. By combining flexible querying with direct graph
manipulation, this interactive layer not only facilitates the rapid retrieval of relevant information but
also supports iterative analysis, hypothesis testing, and the identification of previously unrecognized
connections, making the tool a comprehensive support system for investigative reasoning.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Use Case</title>
      <p>In order to illustrate the features of the envisioned tool, we present a use case focused on analyzing a
ifctional police report. This use case demonstrates how the tool Grace would define an enriched graph
for further knowledge description. The workflow delineated below incorporates automated information
extraction, graph construction, a proposed query interface, and graph editing. To illustrate this, we
considered the generation of the graph based on a fictional report of the American serial killer Jefrey
Dahmer. The initial text constitutes a police report that documents the apprehension of the suspect
after the escape of a victim. Thereby revealing a scene characterized by the presence of a substantial
amount of evidence, including human remains, chemical substances, and photographic documentation.</p>
      <p>After the selection of a new report, the Information Extraction Component is the first to be applied
to it. The application of NER results in the extraction of several entities, including Persons, Locations,
and Evidences. As shown in Figure 2, upon the selection of the report, the analysis results are both
highlighted in the text and grouped by entity categories. For instance, a person could be exemplified by
Jefrey Dahmer. The suspect is related to the victim, Tracy E., who reported that he had been threatened
with a knife. So this situation is described by the entities Jefrey Dahmer, Tracy E., and Knife, which are
connected through the relationships “reported_against” and “threatened_with”. In the sample graph are
also described the diferent evidences and the requested forensic analysis. In addition to this, the user
can also interact to remove or highlight some of the missed entities, and later confirm the validity of
the results for the graph definition.</p>
      <p>The generated graph is then enriched through the Enrichment Component, which is callable by the
database icon in the top-left corner of the interface at any time. As illustrated in Figure 3, the user can
see which sources are analyzed, including, but not limited to, other case reports, ontologies, newspapers,
geographical data, and other online sources. For instance, the Person entity Jefrey Dahmer can be
enhanced with the property “Prior suspicions”, or the Evidence entity Hydrochloric Acid can be described
with its chemical properties, as shown in Figure 4.</p>
      <p>Then, the enriched graph can be visualized and explored by the Exploration and Visualization
Component, as depicted in Figure 5. The user can manipulate the graph by clicking on the horizontal dots
menu located on the top-right side of the graph. In this scenario, the user can add, remove, and connect
nodes or edit the properties of the single entities. For instance, the detective can remove a redundant
entity or include new information from further analysis.</p>
      <p>Moreover, Grace enables the user to explore and analyze the enriched graph in two diferent ways.
At first, the user can execute queries in Cypher language by selecting among diferent predefined ones.
For instance, the user can select one of the default queries in order to search for the objects possessed
by the suspect, whose results are highlighted in the graph, as shown in Figure 6.</p>
      <p>On the other hand, the user can exploit the Text2Query function to generate personalized queries. For
instance, the user needs to find all the forensic analysis required in the investigation, and s/he submits
this request to Grace, which shows both the raw query and the results, as depicted in Figure 7.</p>
      <p>Overall, the proposed use case allowed us to show the main features of Grace, illustrating how it
facilitates the presentation and the analysis of crime reports, as well as the integration of multiple
information provided by diferent sources. In addition, the graph representation with the proposed
querying features can support the investigators in discovering insights and uncovering hidden relations.</p>
      <p>Furthermore, Grace also facilitates the concurrent analysis of multiple reports in the Information
Extraction Component, ensuring the consistency of the extracted entities, which are subsequently
represented within the graph. For instance, in such a scenario, the case of Jefrey Dahmer could also be
supported by multiple reports from the victims’ discoveries. As a matter of fact, during the exploration
of the graph, the user can select standard queries, such as the first in Figure 6, which allows to extract
the “Cases where Jefery Dahmer is a suspect” and enables the reconstruction of the report identifiers to
visualize which entities are involved in which case. On the other hand, the Text2Query feature could
deal with a prompt such as “Consider all incidents involving Jefrey Dahmer and the chemical substances
discovered in his apartment, return the associated victims and the common traits between them”, which
has to interact with the several victims’ information in diferent case reports. These diferent usage
modes of Grace demonstrate its versatility in diferent investigation contexts, either those involving a
single report or multiple ones.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>In this paper, we envision Grace, a framework that integrates automated information extraction,
external data enrichment, and interactive visualization to support criminal investigations. Grace
empowers investigators not only to visualize and explore complex connections among entities, but also
to manipulate, enrich, and query the knowledge base, bridging the gap between automation and human
expertise. We also provided a fictional use case to show the potential impact of Grace on criminal
investigations. In the future, we aim to evaluate a prototype of Grace to evaluate it within real-world
scenarios to assess its usability and its impact on investigative workflows. In addition, integration
with multimedia data could further expand the scope of analysis beyond textual reports. Finally, future
developments should also ensure compliance with privacy requirements and legal regulations, so that
Grace can be deployed responsibly within law enforcement contexts.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This study was funded by Ministero dell’Università e della Ricerca (MUR) of Italy in the context of the project
denoted as BLOODSTAIN in the program PRIN 2022 (grant number D53D23008660006).
The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alzaabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Taha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <surname>Cisri:</surname>
          </string-name>
          <article-title>A crime investigation system using the relative importance of information spreaders in networks depicting criminals communications</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>10</volume>
          (
          <year>2015</year>
          )
          <fpage>2196</fpage>
          -
          <lpage>2211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Elezaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Y.</given-names>
            <surname>Yayilgan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kalemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wendelberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abomhara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <article-title>Towards designing a knowledge graph-based framework for investigating and preventing crime on online social networks</article-title>
          , in: International Conference on e-Democracy, Springer,
          <year>2019</year>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Al Fahdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Clarke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Furnell</surname>
          </string-name>
          ,
          <article-title>Towards an automated forensic examiner (afe) based upon criminal profiling</article-title>
          &amp; artificial
          <string-name>
            <surname>intelligence</surname>
          </string-name>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Fernandez-Basso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Gutiérrez-Batista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gómez-Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Ruiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Martin-Bautista</surname>
          </string-name>
          ,
          <article-title>An ai knowledge-based system for police assistance in crime investigation</article-title>
          ,
          <source>Expert Systems</source>
          <volume>42</volume>
          (
          <year>2025</year>
          )
          <article-title>e13524</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Das</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. Das</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Nayak</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Pelusi</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Ding</surname>
          </string-name>
          ,
          <article-title>A graph based clustering approach for relation extraction from crime data</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>101269</fpage>
          -
          <lpage>101282</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. T.</given-names>
            <surname>Timmer</surname>
          </string-name>
          , J.-J. C. Meyer, H. Prakken,
          <string-name>
            <given-names>S.</given-names>
            <surname>Renooij</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Verheij</surname>
          </string-name>
          ,
          <article-title>Explaining legal bayesian networks using support graphs</article-title>
          ,
          <source>in: Legal Knowledge and Information Systems</source>
          , IOS Press,
          <year>2015</year>
          , pp.
          <fpage>121</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. E.</given-names>
            <surname>Daniels</surname>
          </string-name>
          ,
          <article-title>A graph based approach toward network forensics analysis</article-title>
          ,
          <source>ACM Transactions on Information and System Security (TISSEC) 12</source>
          (
          <year>2008</year>
          )
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Johnsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Franke</surname>
          </string-name>
          ,
          <article-title>The impact of preprocessing in natural language for open source intelligence and criminal investigation</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Big Data (Big Data)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>4248</fpage>
          -
          <lpage>4254</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saini</surname>
          </string-name>
          ,
          <article-title>Role of artificial intelligence in the crime prediction and pattern analysis studies published over the last decade: a scientometric analysis</article-title>
          ,
          <source>Artificial Intelligence Review</source>
          <volume>57</volume>
          (
          <year>2024</year>
          )
          <fpage>202</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Auer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bizer</surname>
          </string-name>
          , G. Kobilarov,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lehmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cyganiak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ives</surname>
          </string-name>
          ,
          <article-title>Dbpedia: A nucleus for a web of open data</article-title>
          , in: international semantic web conference, Springer,
          <year>2007</year>
          , pp.
          <fpage>722</fpage>
          -
          <lpage>735</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Vrandečić</surname>
          </string-name>
          ,
          <article-title>Wikidata: A new platform for collaborative data collection</article-title>
          ,
          <source>in: Proceedings of the 21st international conference on world wide web</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1063</fpage>
          -
          <lpage>1064</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Kuric</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Fernández</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Drozd</surname>
          </string-name>
          ,
          <article-title>Knowledge graph exploration: a usability evaluation of query builders for laypeople</article-title>
          ,
          <source>in: International Conference on Semantic Systems</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>326</fpage>
          -
          <lpage>342</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Arenas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <article-title>Semantics and complexity of sparql</article-title>
          ,
          <source>ACM Transactions on Database Systems (TODS) 34</source>
          (
          <year>2009</year>
          )
          <fpage>1</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hogan</surname>
          </string-name>
          , E. Blomqvist,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cochez</surname>
          </string-name>
          , C. d'Amato,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Melo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. E. L.</given-names>
            <surname>Gayo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Navigli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Neumaier</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Knowledge</surname>
            <given-names>graphs</given-names>
          </string-name>
          ,
          <source>ACM Computing Surveys (Csur) 54</source>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Grattafiori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dubey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jauhri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pandey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kadian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Dahle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Letman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mathur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Schelten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaughan</surname>
          </string-name>
          , et al.,
          <source>The llama 3 herd of models, arXiv preprint arXiv:2407.21783</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Islam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Moushi</surname>
          </string-name>
          , Gpt-4o:
          <article-title>The cutting-edge advancement in multimodal llm</article-title>
          ,
          <source>in: Intelligent Computing-Proceedings of the Computing Conference</source>
          , Springer,
          <year>2025</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>P. Das</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. K. Das</surname>
          </string-name>
          ,
          <article-title>A two-stage approach of named-entity recognition for crime analysis</article-title>
          ,
          <source>in: 2017 8th international conference on computing, communication and networking technologies (ICCCNT)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I.</given-names>
            <surname>Guellil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Garcia-Dominguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Lewis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hussain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Smith,</surname>
          </string-name>
          <article-title>Entity linking for english and other languages: a survey</article-title>
          ,
          <source>Knowledge and Information Systems</source>
          <volume>66</volume>
          (
          <year>2024</year>
          )
          <fpage>3773</fpage>
          -
          <lpage>3824</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Mandilara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Androna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Fotopoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zafeiropoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Papavassiliou</surname>
          </string-name>
          ,
          <article-title>Decoding the mystery: How can llms turn text into cypher in complex knowledge graphs?</article-title>
          , IEEE Access (
          <year>2025</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>