2022
DOI: 10.3390/math10162929
|View full text |Cite
|
Sign up to set email alerts
|

Covert Network Construction, Disruption, and Resilience: A Survey

Abstract: Covert networks refer to criminal organizations that operate outside the boundaries of the law; they can be mainly classified as terrorist networks and criminal networks. We consider how Social Network Analysis (SNA) is used to analyze such networks in order to attain a greater knowledge of criminal behavior. In fact, SNA allows examining the network structure and functioning by computing relevant metrics and parameters to identify roles, positions, features, and other network functioning that are not otherwis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 194 publications
0
9
0
Order By: Relevance
“…Therefore, if a soldier is arrested, he can easily be replaced by another one. The Sicilian Mafia is in fact extremely resilient against disruption precisely for its capacity to regenerate and rearrange the top positions [25].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, if a soldier is arrested, he can easily be replaced by another one. The Sicilian Mafia is in fact extremely resilient against disruption precisely for its capacity to regenerate and rearrange the top positions [25].…”
Section: Discussionmentioning
confidence: 99%
“…In [25], we provided a literature review of the most significant works on covert network disruption. We underlined how disruption strategies based on human or social capitals are usually developed in a parallel fashion and exploit very different techniques.…”
Section: Introductionmentioning
confidence: 99%
“…By categorizing police work in Tor cases in four layers, we give an overview of police work in Tor cases, but this categorization can thus be seen as a more general representation of how the police deal with (cyber)crime. Although the working methods are not completely new, as all the methods also find their place in earlier research (Collier et al, 2022;Ficara et al, 2022;Sebagh et al, 2022), Tor clearly influences the way those strategies and working methods are being used and given shape. The main difficulty; absent and anonymous suspects or victims whose locations and identities are effectively hidden behind encryption forces the police to revise their way of policing.…”
Section: Limitationsmentioning
confidence: 99%
“…Different ranking criteria have been proposed to maximize the efficiency of network dismantling, focusing on the detection of the most influential nodes to remove [4][5][6][7], or adopting holistic approaches that focus on the collective, emergent features of complex networks [8][9][10][11]. Due to its flexibility, network dismantling has been applied to different domains, ranging from biology [12] to socio-technical systems [13,14] and crime [15,16].…”
Section: Introductionmentioning
confidence: 99%