2011 European Intelligence and Security Informatics Conference 2011
DOI: 10.1109/eisic.2011.57
|View full text |Cite
|
Sign up to set email alerts
|

Node Removal in Criminal Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Callahan et al [11] reshape networks by identifying a set of nodes to remove that jointly maximize the network wide degree centrality which extends degree centrality of nodes to a network as a whole. Petersen et al [12] develop methods to remove nodes in criminal networks by considering the new links generated by the removal. STONE [13] reshapes networks by predicting who replaces a "removed" individual in a terrorist network then identifying which k people to remove to minimize the organization's efficiency (formalized in different ways).…”
Section: Related Workmentioning
confidence: 99%
“…Callahan et al [11] reshape networks by identifying a set of nodes to remove that jointly maximize the network wide degree centrality which extends degree centrality of nodes to a network as a whole. Petersen et al [12] develop methods to remove nodes in criminal networks by considering the new links generated by the removal. STONE [13] reshapes networks by predicting who replaces a "removed" individual in a terrorist network then identifying which k people to remove to minimize the organization's efficiency (formalized in different ways).…”
Section: Related Workmentioning
confidence: 99%
“…Previous software designed to support law-enforcement through social network analysis include CrimeFighter [14] and CrimeLink [15]. However, these tools provide complementary capabilities to ORCA.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, a structural parser assists the investigators by relating otherwise unrelated information in different ways, either based on the entities themselves or by applying algorithms to analyze them. In the following, core CrimeFighter Investigator features are presented, but unfortunately space limitations mean that details are limited and not all supported features can be presented (see [13,14,[25][26][27] for more details).…”
Section: Crimefighter Investigatormentioning
confidence: 99%
“…Customized combinations of different algorithms can be created for frequent use. For example, we developed a custom node removal algorithm which can be used by criminal network investigators to ask 'what-if' questions about the secondary effects of removing a key individual from a criminal network [25].…”
Section: Sense-making Supportmentioning
confidence: 99%
See 1 more Smart Citation