2012 European Intelligence and Security Informatics Conference 2012
DOI: 10.1109/eisic.2012.65
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures

Abstract: For investigators working on criminal covert networks, identification of key actor(s) in the network is a major objective. Taking out key nodes will decrease the ability of the criminal network to function normally. Traditionally, the node centrality measurements have relied solely on the number of edges incident to nodes but not on the weights of those edges. However, in some generalizations for centrality measures for weighted networks, the focus shifts solely to the weights of the links and they don't accou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…This component is responsible for extracting commenters and authors with respect to a particular video under investigation. (Memon, 2012) and determining various clusters in the resulting social network is supported by this component.…”
Section: The Youtube Monitoring Toolmentioning
confidence: 97%
“…This component is responsible for extracting commenters and authors with respect to a particular video under investigation. (Memon, 2012) and determining various clusters in the resulting social network is supported by this component.…”
Section: The Youtube Monitoring Toolmentioning
confidence: 97%
“…For weighted graphs, a variation of DC has been presented by Memon [ 5 ]. According to author, for weighted networks, the simplest extension of degree is node strength [ 6 , 7 ], which is the sum of weights of node's direct ties.…”
Section: Related Workmentioning
confidence: 99%
“…Hierarchically structured criminal organizations mainly use mobile phones and emails to communicate, so access to mobile communications data (MCD) and email records allows the relationships among the members of such organizations to be depicted as networks, often allowing the identification of leaders and the most important communication channels [16,18,22,28,29,30,41,45]. For example, the email addresses of Nigeria-based scammers were linked to their Facebook profiles and the k-clique was used to identify the scammers and their leaders, based on a social network with 40,000 nodes [18].…”
Section: Introductionmentioning
confidence: 99%