Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,856 Hits in 7.7 sec

Using the Spanning Tree of a Criminal Network for Identifying Its Leaders

Kamal Taha, Paul D. Yoo
2017 IEEE Transactions on Information Forensics and Security  
It then constructs a Minimum Spanning Tree (MST) of the network.  ...  It identifies the influential members of a criminal organization by determining the important vertices in the network representing the organization, using the concept of existence dependency.  ...  A MST is a tree that spans all the vertices of a network and the sum of the scores of the edges connecting the vertices is the smallest among all other trees that span all the vertices.  ... 
doi:10.1109/tifs.2016.2622226 fatcat:dumsmueubvejha3affgfdyiddm

Identifying criminal organizations from their social network structures

Muhammet Serkan ÇINAR, Burkay GENÇ, Hayri SEVER
2019 Turkish Journal of Electrical Engineering and Computer Sciences  
We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis.  ...  By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act.  ...  As a concluding remark, we emphasize once again that the results provided here are only for academic purposes and prone to data-based statistical errors.  ... 
doi:10.3906/elk-1806-52 fatcat:4bdgkqbzfnbopl2y3kmnf5votq

Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks

Romain Bourqui, Frédéric Gilbert, Paolo Simonetto, Faraz Zaidi, Umang Sharan, Fabien Jourdan
2009 2009 International Conference on Advances in Social Network Analysis and Mining  
We use the Catalano/Vidro dataset for empirical evaluation and observe that our framework provides a satisfactory assessment of the social and hierarchical structure present in the dataset.  ...  The framework allows detection of major structural changes over time, identifies events analyzing temporal dimension and reveals command hierarchies in social networks.  ...  For example the time of a phone call just before a criminal activity in a terrorist network might indicate transmission of important information.  ... 
doi:10.1109/asonam.2009.55 dblp:conf/asunam/BourquiGSZSJ09 fatcat:vieuzdodtbfcxoggvir6rb23t4

Communities and Hierarchical Structures in Dynamic Social Networks: Analysis and Visualization [article]

Frédéric Gilbert, Paolo Simonetto, Faraz Zaidi, Fabien Jourdan, Romain Bourqui
2014 arXiv   pre-print
Detection and Visualization of these networks changing over time is a challenging problem where communities change as a function of events taking place in the society and the role people play in it.  ...  We use two different data sets for the empirical evaluation and observe that our system helps to discover interesting facts about the social and hierarchical structures present in these social networks  ...  Once we have the spanning tree, the next step is to find the leaders (boss) in the network.  ... 
arXiv:1409.5040v1 fatcat:yoiigbcfkvg6fpllo5gjrwddpq

Communities and hierarchical structures in dynamic social networks: analysis and visualization

Frédéric Gilbert, Paolo Simonetto, Faraz Zaidi, Fabien Jourdan, Romain Bourqui
2010 Social Network Analysis and Mining  
Detection and Visualization of these networks changing over time is a challenging problem where communities change as a function of events taking place in the society and the role people play in it.  ...  We use two different data sets for the empirical evaluation and observe that our system helps to discover interesting facts about the social and hierarchical structures present in these social networks  ...  Once we have the spanning tree, the next step is to find the leaders (boss) in the network.  ... 
doi:10.1007/s13278-010-0002-8 fatcat:bfbg47qnvvfdjmbf622joonria

Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

Lucia Cavallaro, Annamaria Ficara, Pasquale De Meo, Giacomo Fiumara, Salvatore Catanese, Ovidiu Bagdasar, Wei Song, Antonio Liotta, Leto Peel
2020 PLoS ONE  
Our work has significant practical applications for perturbing the operations of criminal and terrorist networks.  ...  We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted  ...  The Average Path Length (APL) [45] is a useful metric for assessing the connectivity of a graph. It is the average number of steps along the shortest paths for all possible pairs of network nodes.  ... 
doi:10.1371/journal.pone.0236476 pmid:32756592 fatcat:wj5l7lbj6bdwfi247ojig6xzye

Criminal Network Community Detection Using Graphical Analytic Methods: A Survey

Theyvaa Sangkaran, Azween Abdullah, NZ. JhanJhi
2018 EAI Endorsed Transactions on Energy Web  
The concept of community was vividly discussed as well as the algorithms for detecting communities within a network.  ...  Most importantly, a strict review of researches based on the detection of community in a criminal network was carried out revealing the strength and limitations of criminal network community detection  ...  It was established in their paper that identifying of communities within a criminal network enable disrupting operations within the network and to detect communities is more difficult in a criminal network  ... 
doi:10.4108/eai.13-7-2018.162690 fatcat:objcbuwp4bamlcr7asc4r3ejzq

Crime in Urban Areas: A Data Mining Perspective [article]

Xiangyu Zhao, Jiliang Tang
2018 arXiv   pre-print
Urban safety and security play a crucial role in improving life quality of citizen and the sustainable development of urban.  ...  The availability of big urban data provides unprecedented opportunities, which enable us to conduct advanced urban crime research.  ...  Acknowledgements This research is supported by the National Science Foundation (NSF) under grant number IIS-1714741 and IIS-1715940.  ... 
arXiv:1804.08159v2 fatcat:udbg7u76wvdoragl2m6xb7sfxi

Network Disruption via Continuous Batch Removal: The Case of Sicilian Mafia [article]

Mingshan Jia, Pasquale De Meo, Bogdan Gabrys, Katarzyna Musial
2023 arXiv   pre-print
In this paper, with a particular focus on disrupting criminal networks, we proposed to impose a within-the-largest-connected-component constraint in a continuous batch removal disruption process.  ...  Network disruption is pivotal in understanding the robustness and vulnerability of complex networks, which is instrumental in devising strategies for infrastructure protection, epidemic control, cybersecurity  ...  ACKNOWLEDGMENTS This work was supported by the Australian Research Council, Grant No. DP190101087: "Dynamics and Control of Complex Social Networks".  ... 
arXiv:2310.09987v1 fatcat:lbu4ak3vejgkthuqtldlvea374

One-mode projection analysis and design of covert affiliation networks

Roy Lindelauf, Peter Borm, Herbert Hamers
2012 Social Networks  
First we provide a characterization of the total distance in the one-mode projection using its corresponding cell-shrinked version.  ...  In addition we evaluate an example of a covert organization wishing to conduct an attack and compare its performance to that of the common covert organizational forms.  ...  The computation of the total distance is simplified by use of a proposition relating the total distance in a covert affiliation network to its cell-shrinked version.  ... 
doi:10.1016/j.socnet.2012.07.001 fatcat:ksx5nk7xx5bl3o5zurft2h3khi

One-Mode Projection Analysis and Design of Covert Affiliation Networks

Roy H. A. Lindelauf, Peter E. M. Borm, Herbert Hamers
2010 Social Science Research Network  
First we provide a characterization of the total distance in the one-mode projection using its corresponding cell-shrinked version.  ...  In addition we evaluate an example of a covert organization wishing to conduct an attack and compare its performance to that of the common covert organizational forms.  ...  The computation of the total distance is simplified by use of a proposition relating the total distance in a covert affiliation network to its cell-shrinked version.  ... 
doi:10.2139/ssrn.1615496 fatcat:zg7dn3uvona4jpi6ed7a3nigsa

Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape

Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac
2021 IEEE Access  
It involves either one or both of the tasks: (a) is one method of identifying bad actors in a financial network identification of the abnormal data, e.g., noise,  ...  It is also capable of identifying potential and individuals of the public.  ... 
doi:10.1109/access.2021.3134076 fatcat:lm2upcaoabbnbie6r4sfzhjh4y

Identification of Influencers in Social Media using Social Network Analysis (SNA)

Andre Maureen Pudjajana, Danny Manongga, Ade Iriani, Hindriyanto Dwi Purnomo
2018 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)  
This research aims to identify influencers in social media. This research use hoax dataset. The methods are Social Network Analysis (SNA) and weighting of SNA measurements.  ...  Social media is a communication media that is often used to connect many people around the world. The inappropriate use of social media will have a negative impact.  ...  The third study discusses identifying influencers in criminal organizations and finding influencer leader in organization.  ... 
doi:10.1109/isriti.2018.8864458 fatcat:edgetef7mjgsvgkem676le2omi

Los Zetas and Proprietary Radio Network Development

James Halverson
2016 Journal of Strategic Security  
It was during these years that the group constructed and utilized a proprietary encrypted radio network that grew to span from Texas to Guatemala through the Gulf States of Mexico and across much of the  ...  It also stood as a symbol of the latitude the group enjoyed across vast areas, as this extensive illicit infrastructure stood, in the face of the government and rival cartels, for six years.  ...  Any opinions, findings, conclusions and recommendations in this issue are those of the authors and do not necessarily reflect views of Sandia National Laboratories or the U.S. Department of Energy.  ... 
doi:10.5038/1944-0472.9.1.1505 fatcat:q5dxiqbhfvbcfput2kfhb5htam

Digital Forensics to Intelligent Forensics

Alastair Irons, Harjinder Lallie
2014 Future Internet  
In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use.  ...  The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital  ...  Figure 3 . 3 A reduced social network depicting email flow from group leaders in a number of groups in Enron.  ... 
doi:10.3390/fi6030584 fatcat:3l2ykao3snburlfm5kowilcyra
« Previous Showing results 1 — 15 out of 7,856 results