A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using the Spanning Tree of a Criminal Network for Identifying Its Leaders
2017
IEEE Transactions on Information Forensics and Security
It then constructs a Minimum Spanning Tree (MST) of the network. ...
It identifies the influential members of a criminal organization by determining the important vertices in the network representing the organization, using the concept of existence dependency. ...
A MST is a tree that spans all the vertices of a network and the sum of the scores of the edges connecting the vertices is the smallest among all other trees that span all the vertices. ...
doi:10.1109/tifs.2016.2622226
fatcat:dumsmueubvejha3affgfdyiddm
Identifying criminal organizations from their social network structures
2019
Turkish Journal of Electrical Engineering and Computer Sciences
We consider three methods for the identification of network types: evaluating common social network analysis metrics, modeling with a decision tree, and network motif frequency analysis. ...
By identifying such structures, it may be possible to track, neutralize, and terminate the corresponding criminal organizations before they act. ...
As a concluding remark, we emphasize once again that the results provided here are only for academic purposes and prone to data-based statistical errors. ...
doi:10.3906/elk-1806-52
fatcat:4bdgkqbzfnbopl2y3kmnf5votq
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
2009
2009 International Conference on Advances in Social Network Analysis and Mining
We use the Catalano/Vidro dataset for empirical evaluation and observe that our framework provides a satisfactory assessment of the social and hierarchical structure present in the dataset. ...
The framework allows detection of major structural changes over time, identifies events analyzing temporal dimension and reveals command hierarchies in social networks. ...
For example the time of a phone call just before a criminal activity in a terrorist network might indicate transmission of important information. ...
doi:10.1109/asonam.2009.55
dblp:conf/asunam/BourquiGSZSJ09
fatcat:vieuzdodtbfcxoggvir6rb23t4
Communities and Hierarchical Structures in Dynamic Social Networks: Analysis and Visualization
[article]
2014
arXiv
pre-print
Detection and Visualization of these networks changing over time is a challenging problem where communities change as a function of events taking place in the society and the role people play in it. ...
We use two different data sets for the empirical evaluation and observe that our system helps to discover interesting facts about the social and hierarchical structures present in these social networks ...
Once we have the spanning tree, the next step is to find the leaders (boss) in the network. ...
arXiv:1409.5040v1
fatcat:yoiigbcfkvg6fpllo5gjrwddpq
Communities and hierarchical structures in dynamic social networks: analysis and visualization
2010
Social Network Analysis and Mining
Detection and Visualization of these networks changing over time is a challenging problem where communities change as a function of events taking place in the society and the role people play in it. ...
We use two different data sets for the empirical evaluation and observe that our system helps to discover interesting facts about the social and hierarchical structures present in these social networks ...
Once we have the spanning tree, the next step is to find the leaders (boss) in the network. ...
doi:10.1007/s13278-010-0002-8
fatcat:bfbg47qnvvfdjmbf622joonria
Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia
2020
PLoS ONE
Our work has significant practical applications for perturbing the operations of criminal and terrorist networks. ...
We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions' frequency), no significant differences exist between weighted and unweighted ...
The Average Path Length (APL) [45] is a useful metric for assessing the connectivity of a graph. It is the average number of steps along the shortest paths for all possible pairs of network nodes. ...
doi:10.1371/journal.pone.0236476
pmid:32756592
fatcat:wj5l7lbj6bdwfi247ojig6xzye
Criminal Network Community Detection Using Graphical Analytic Methods: A Survey
2018
EAI Endorsed Transactions on Energy Web
The concept of community was vividly discussed as well as the algorithms for detecting communities within a network. ...
Most importantly, a strict review of researches based on the detection of community in a criminal network was carried out revealing the strength and limitations of criminal network community detection ...
It was established in their paper that identifying of communities within a criminal network enable disrupting operations within the network and to detect communities is more difficult in a criminal network ...
doi:10.4108/eai.13-7-2018.162690
fatcat:objcbuwp4bamlcr7asc4r3ejzq
Crime in Urban Areas: A Data Mining Perspective
[article]
2018
arXiv
pre-print
Urban safety and security play a crucial role in improving life quality of citizen and the sustainable development of urban. ...
The availability of big urban data provides unprecedented opportunities, which enable us to conduct advanced urban crime research. ...
Acknowledgements This research is supported by the National Science Foundation (NSF) under grant number IIS-1714741 and IIS-1715940. ...
arXiv:1804.08159v2
fatcat:udbg7u76wvdoragl2m6xb7sfxi
Network Disruption via Continuous Batch Removal: The Case of Sicilian Mafia
[article]
2023
arXiv
pre-print
In this paper, with a particular focus on disrupting criminal networks, we proposed to impose a within-the-largest-connected-component constraint in a continuous batch removal disruption process. ...
Network disruption is pivotal in understanding the robustness and vulnerability of complex networks, which is instrumental in devising strategies for infrastructure protection, epidemic control, cybersecurity ...
ACKNOWLEDGMENTS This work was supported by the Australian Research Council, Grant No. DP190101087: "Dynamics and Control of Complex Social Networks". ...
arXiv:2310.09987v1
fatcat:lbu4ak3vejgkthuqtldlvea374
One-mode projection analysis and design of covert affiliation networks
2012
Social Networks
First we provide a characterization of the total distance in the one-mode projection using its corresponding cell-shrinked version. ...
In addition we evaluate an example of a covert organization wishing to conduct an attack and compare its performance to that of the common covert organizational forms. ...
The computation of the total distance is simplified by use of a proposition relating the total distance in a covert affiliation network to its cell-shrinked version. ...
doi:10.1016/j.socnet.2012.07.001
fatcat:ksx5nk7xx5bl3o5zurft2h3khi
One-Mode Projection Analysis and Design of Covert Affiliation Networks
2010
Social Science Research Network
First we provide a characterization of the total distance in the one-mode projection using its corresponding cell-shrinked version. ...
In addition we evaluate an example of a covert organization wishing to conduct an attack and compare its performance to that of the common covert organizational forms. ...
The computation of the total distance is simplified by use of a proposition relating the total distance in a covert affiliation network to its cell-shrinked version. ...
doi:10.2139/ssrn.1615496
fatcat:zg7dn3uvona4jpi6ed7a3nigsa
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape
2021
IEEE Access
It involves either one or both of the tasks: (a)
is one method of identifying bad actors in a financial network identification of the abnormal data, e.g., noise, ...
It is also capable of identifying potential
and individuals of the public. ...
doi:10.1109/access.2021.3134076
fatcat:lm2upcaoabbnbie6r4sfzhjh4y
Identification of Influencers in Social Media using Social Network Analysis (SNA)
2018
2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)
This research aims to identify influencers in social media. This research use hoax dataset. The methods are Social Network Analysis (SNA) and weighting of SNA measurements. ...
Social media is a communication media that is often used to connect many people around the world. The inappropriate use of social media will have a negative impact. ...
The third study discusses identifying influencers in criminal organizations and finding influencer leader in organization. ...
doi:10.1109/isriti.2018.8864458
fatcat:edgetef7mjgsvgkem676le2omi
Los Zetas and Proprietary Radio Network Development
2016
Journal of Strategic Security
It was during these years that the group constructed and utilized a proprietary encrypted radio network that grew to span from Texas to Guatemala through the Gulf States of Mexico and across much of the ...
It also stood as a symbol of the latitude the group enjoyed across vast areas, as this extensive illicit infrastructure stood, in the face of the government and rival cartels, for six years. ...
Any opinions, findings, conclusions and recommendations in this issue are those of the authors and do not necessarily reflect views of Sandia National Laboratories or the U.S. Department of Energy. ...
doi:10.5038/1944-0472.9.1.1505
fatcat:q5dxiqbhfvbcfput2kfhb5htam
Digital Forensics to Intelligent Forensics
2014
Future Internet
In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. ...
The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital ...
Figure 3 . 3 A reduced social network depicting email flow from group leaders in a number of groups in Enron. ...
doi:10.3390/fi6030584
fatcat:3l2ykao3snburlfm5kowilcyra
« Previous
Showing results 1 — 15 out of 7,856 results