The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract”
Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But on...
Saved in:
| Published in | Security informatics (Berlin) Vol. 7; no. 1; pp. 1 - 16 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
17.08.2018
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2190-8532 2190-8532 |
| DOI | 10.1186/s13388-018-0031-9 |
Cover
| Abstract | Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But once this is achieved how should agencies go about attempting to exploit this data by proactively identifying criminal events and the actors responsible? The authors will outline an effective generic method that; computationally extracts minimally overlapping contextual subgraphs, then uses these subgraphs as the basis to construct a mesoscopic graph based on the intersections between the subgraphs, enabling knowledge discovery from these data representations for the purpose of maximally disrupting terrorism, organised crime and the broader criminal network. |
|---|---|
| AbstractList | Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But once this is achieved how should agencies go about attempting to exploit this data by proactively identifying criminal events and the actors responsible? The authors will outline an effective generic method that; computationally extracts minimally overlapping contextual subgraphs, then uses these subgraphs as the basis to construct a mesoscopic graph based on the intersections between the subgraphs, enabling knowledge discovery from these data representations for the purpose of maximally disrupting terrorism, organised crime and the broader criminal network. |
| ArticleNumber | 2 |
| Author | Scogings, Chris Robinson, David |
| Author_xml | – sequence: 1 givenname: David orcidid: 0000-0002-8345-0351 surname: Robinson fullname: Robinson, David email: david.robinson.18@uni.massey.ac.nz organization: Institute of Natural and Mathematical Sciences, Massey University – sequence: 2 givenname: Chris surname: Scogings fullname: Scogings, Chris organization: Institute of Natural and Mathematical Sciences, Massey University |
| BookMark | eNqNkN9KwzAUxoMoOOcewLuA19Wk6b94J2NOYeDNvA5pmnYdXVKTlLm7PYi-3J7ElA4UQTEQcpJ838c5vwtwqrSSAFxhdINxltxaTEiWBQj7jQgO6AkYhZiiIItJePqtPgcTa9fIrxSFSRSNgFquJCykk8LVWkFdQmHqTa14Ayuju9bCWkEjeRNstWkKWHZWFrDgjt_Bztaqgs4HVIa3q8Db-gfeVNrUbrWBh_37vP-ZvTnDhTvsPy7BWckbKyfHcwxeHmbL6WOweJ4_Te8XgQgjQgOe5LTIaUzLIo9wGlERJwJHuMzSTKDcX3KCYp6KJMt5SgpJSJJ5U1TmeRGXMRmDcMjtVMt3W940rPVzcbNjGLEeGhugMQ-N9dAY9abrwdQa_dpJ69had8ajsCxEFMWpJ4i9Kh1UwmhrjSyZqB3v6fkh6-bPfPzD-Z-ejoNYr1WVNF89_W76BDaBoXk |
| CitedBy_id | crossref_primary_10_3390_math10162929 crossref_primary_10_1371_journal_pone_0255067 crossref_primary_10_1016_j_dss_2021_113537 crossref_primary_10_1016_j_ipm_2022_102879 crossref_primary_10_1080_24725854_2021_1939466 crossref_primary_10_3390_electronics13112011 crossref_primary_10_1108_JMLC_12_2020_0139 crossref_primary_10_1080_17440572_2024_2371326 |
| Cites_doi | 10.1093/bjc/41.4.580 10.1002/asi.21008 10.1145/1400181.1400198 10.1073/pnas.0706851105 10.1089/big.2014.0021 10.1103/PhysRevE.65.056109 10.1017/CBO9780511815478 10.1146/annurev.soc.27.1.415 10.1007/s00778-008-0098-x 10.1038/nature03607 10.1007/978-1-84628-970-5 10.1002/asi.20552 10.1016/0047-2484(92)90081-J 10.1109/MC.2004.1297301 10.1111/j.1745-9125.2008.00103.x 10.1088/1742-5468/2008/10/P10008 10.1177/1043986210377105 10.1126/science.286.5439.509 10.1109/ACCESS.2018.2816564 10.1016/0378-8733(91)90008-H 10.1016/j.physrep.2009.11.002 10.1140/epjb/e2009-00335-8 10.3138/9781442673304 10.1109/TKDE.2012.154 10.1007/s10588-006-7083-y 10.1080/17440572.2011.567832 10.1145/1064830.1064834 10.1177/001872087501700206 10.1007/978-3-540-73871-8_54 10.1007/3-540-44853-5_18 10.4324/9781315885018 10.1109/VAST.2014.7042564 10.1515/9781626372573-005 10.1017/CBO9781316212639.010 10.1109/CBD.2017.38 10.1007/978-3-642-13601-6_1 10.1137/1.9781611972870.13 10.1007/978-3-319-31863-9_1 10.1007/978-0-387-09526-4 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2018 Security Informatics is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2018 – notice: Security Informatics is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION 3V. 7XB 8AL 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.1186/s13388-018-0031-9 |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2190-8532 |
| EndPage | 16 |
| ExternalDocumentID | 10.1186/s13388-018-0031-9 10_1186_s13388_018_0031_9 |
| GroupedDBID | -A0 0R~ 3V. 40G 5VS 8FE 8FG AAKKN ABEEZ ABFTD ABUWG ACACY ACGFS ACULB ADBBV ADINQ AFGXO AFKRA AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CCPQU DWQXO EBS EJD GNUQQ GROUPED_DOAJ HCIFZ K6V K7- KQ8 M0N M~E OK1 P62 PIMPY PQQKQ PROAC RSV SCO SOJ AAYXX CITATION PHGZM PHGZT PQGLB PUEGO 7XB 8AL 8FK JQ2 PKEHL PQEST PQUKI PRINS Q9U 2VQ ADTOC AHSBF HZ~ O9- UNPAY |
| ID | FETCH-LOGICAL-c2439-a6b9db959fdb41749c56c141f878c0b56cb305a7c68ba73de3368a6b4fbbd5f53 |
| IEDL.DBID | C24 |
| ISSN | 2190-8532 |
| IngestDate | Tue Aug 19 14:21:24 EDT 2025 Fri Jul 25 22:50:23 EDT 2025 Thu Apr 24 23:02:18 EDT 2025 Wed Oct 01 03:10:36 EDT 2025 Fri Feb 21 02:30:26 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Organised crime Dark networks Criminal analysis Social network analysis Risk detection Crime Criminal networks SNA Entity resolution Graph mining |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2439-a6b9db959fdb41749c56c141f878c0b56cb305a7c68ba73de3368a6b4fbbd5f53 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8345-0351 |
| OpenAccessLink | https://link.springer.com/10.1186/s13388-018-0031-9 |
| PQID | 2090575321 |
| PQPubID | 2034664 |
| PageCount | 16 |
| ParticipantIDs | unpaywall_primary_10_1186_s13388_018_0031_9 proquest_journals_2090575321 crossref_citationtrail_10_1186_s13388_018_0031_9 crossref_primary_10_1186_s13388_018_0031_9 springer_journals_10_1186_s13388_018_0031_9 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20180817 |
| PublicationDateYYYYMMDD | 2018-08-17 |
| PublicationDate_xml | – month: 8 year: 2018 text: 20180817 day: 17 |
| PublicationDecade | 2010 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | Security informatics (Berlin) |
| PublicationTitleAbbrev | Secur Inform |
| PublicationYear | 2018 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | McGloin, Nguyen, Morselli (CR7) 2013 Xu, Chen (CR15) 2008; 51 CR39 Barabási, Albert (CR49) 1999; 286 CR34 CR32 Morselli (CR36) 2010; 26 Gould (CR44) 1989 Prado, Plantevit, Robardet, Boulicaut (CR18) 2013; 25 Everton (CR37) 2013 Sparrow (CR6) 1991; 13 Hu, Kaza, Chen (CR16) 2009; 60 Coles (CR9) 2001; 41 Wang, Rudin, Wagner, Sevieri (CR31) 2015; 3 CR4 Blondel, Guillaume, Lambiotte, Lefebvre (CR25) 2008; 2008 CR5 CR48 Klerks (CR8) 2001; 24 McPherson, Smith-Lovin, Cook (CR43) 2001; 27 Malm, Bichler, Nash (CR11) 2011; 12 Robinson, Scogings, Colarik, Jang-Jaccard, Mathrani (CR1) 2017 CR41 Benjelloun, Garcia-Molina, Menestrina, Su, Whang, Widom (CR13) 2009; 18 Ozgul, Erdem, Bowerman, Bondy, Chen, Chau, Li, Urs, Srinivasa, Wang (CR30) 2010 Zhou, Lü, Zhang (CR46) 2009; 71 Bondy, Murty (CR12) 2008 Krebs (CR35) 2002; 24 Dunbar (CR47) 1992; 22 CR17 Xu, Chen (CR21) 2005; 48 Huang, Mu, Yang, Cai (CR28) 2018; 6 CR14 Schroeder, Xu, Chen, Chau (CR3) 2007; 58 Carley (CR40) 2006; 12 CR52 Wasserman, Faust (CR20) 1994 CR51 Morselli, Roy (CR45) 2008; 46 Fortunato (CR33) 2010; 486 Morselli, Grund, Boivin, Bichler, Malm (CR38) 2015 Chen, Chung, Xu, Wang, Qin, Chau (CR22) 2004; 37 Palla, Derényi, Farkas, Vicsek (CR19) 2005; 435 CR29 CR27 CR26 CR24 Rosvall, Bergstrom (CR42) 2008; 105 CR23 Holme, Kim, Yoon, Han (CR50) 2002; 65 Morselli (CR10) 2005 Harper, Harris (CR2) 1975; 17 A Malm (31_CR11) 2011; 12 D Robinson (31_CR1) 2017 31_CR39 31_CR34 G Palla (31_CR19) 2005; 435 WR Harper (31_CR2) 1975; 17 31_CR32 N Coles (31_CR9) 2001; 41 H Chen (31_CR22) 2004; 37 S Fortunato (31_CR33) 2010; 486 31_CR5 31_CR4 31_CR48 C Morselli (31_CR36) 2010; 26 KM Carley (31_CR40) 2006; 12 JA Bondy (31_CR12) 2008 A Prado (31_CR18) 2013; 25 RV Gould (31_CR44) 1989 J Schroeder (31_CR3) 2007; 58 J Xu (31_CR15) 2008; 51 M Rosvall (31_CR42) 2008; 105 31_CR17 31_CR14 D Hu (31_CR16) 2009; 60 JM McGloin (31_CR7) 2013 M McPherson (31_CR43) 2001; 27 cr-split#-31_CR41.1 31_CR52 cr-split#-31_CR41.2 31_CR51 F Ozgul (31_CR30) 2010 VD Blondel (31_CR25) 2008; 2008 31_CR27 VE Krebs (31_CR35) 2002; 24 31_CR26 31_CR29 C Morselli (31_CR45) 2008; 46 31_CR23 D Huang (31_CR28) 2018; 6 31_CR24 C Morselli (31_CR38) 2015 RIM Dunbar (31_CR47) 1992; 22 P Holme (31_CR50) 2002; 65 C Morselli (31_CR10) 2005 M Sparrow (31_CR6) 1991; 13 A-L Barabási (31_CR49) 1999; 286 S Wasserman (31_CR20) 1994 T Wang (31_CR31) 2015; 3 T Zhou (31_CR46) 2009; 71 J Xu (31_CR21) 2005; 48 O Benjelloun (31_CR13) 2009; 18 DSF Everton (31_CR37) 2013 P Klerks (31_CR8) 2001; 24 |
| References_xml | – volume: 41 start-page: 580 issue: 4 year: 2001 end-page: 594 ident: CR9 article-title: It’s not what you know—it’s who you know that counts. analysing serious crime groups as social networks publication-title: Br J Criminol doi: 10.1093/bjc/41.4.580 – volume: 60 start-page: 655 issue: 4 year: 2009 end-page: 665 ident: CR16 article-title: Identifying significant facilitators of dark network evolution publication-title: J Am Soc Inform Sci Technol doi: 10.1002/asi.21008 – volume: 51 start-page: 58 issue: 10 year: 2008 ident: CR15 article-title: The topology of dark networks publication-title: Commun ACM doi: 10.1145/1400181.1400198 – volume: 105 start-page: 1118 issue: 4 year: 2008 end-page: 1123 ident: CR42 article-title: Maps of random walks on complex networks reveal community structure publication-title: Proc Natl Acad Sci doi: 10.1073/pnas.0706851105 – ident: CR4 – start-page: 47 year: 2015 end-page: 66 ident: CR38 article-title: Network stability issues in a co-offending population publication-title: Disrupting criminal networks: network analysis in crime prevention – ident: CR39 – ident: CR51 – volume: 3 start-page: 3 issue: 1 year: 2015 end-page: 21 ident: CR31 article-title: Finding patterns with a rotten core: data mining for crime series with cores publication-title: Big Data doi: 10.1089/big.2014.0021 – ident: CR29 – volume: 65 start-page: 056109 issue: 5 year: 2002 ident: CR50 article-title: Attack vulnerability of complex networks publication-title: Phys Rev E doi: 10.1103/PhysRevE.65.056109 – start-page: 482 year: 2013 ident: CR37 publication-title: Disrupting dark networks – year: 1994 ident: CR20 publication-title: Social network analysis: methods and applications doi: 10.1017/CBO9780511815478 – volume: 27 start-page: 415 issue: 1 year: 2001 end-page: 444 ident: CR43 article-title: Birds of a feather: homophily in Social Networks publication-title: Ann Rev Sociol doi: 10.1146/annurev.soc.27.1.415 – volume: 18 start-page: 255 issue: 1 year: 2009 end-page: 276 ident: CR13 article-title: Swoosh: a generic approach to entity resolution publication-title: VLDB J doi: 10.1007/s00778-008-0098-x – volume: 435 start-page: 814 issue: 7043 year: 2005 end-page: 818 ident: CR19 article-title: Uncovering the overlapping community structure of complex networks in nature and society publication-title: Nature doi: 10.1038/nature03607 – volume: 24 start-page: 53 issue: 3 year: 2001 end-page: 65 ident: CR8 article-title: The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands publication-title: Connections – start-page: 651 year: 2008 ident: CR12 publication-title: Graph theory doi: 10.1007/978-1-84628-970-5 – volume: 58 start-page: 842 issue: 6 year: 2007 end-page: 855 ident: CR3 article-title: Automated criminal link analysis based on domain knowledge publication-title: J Am Soc Inf Sci doi: 10.1002/asi.20552 – start-page: 13 year: 2013 end-page: 27 ident: CR7 article-title: The importance of studying co-offending networks for criminological theory and policy publication-title: Crime and networks – ident: CR32 – volume: 22 start-page: 469 issue: 6 year: 1992 end-page: 493 ident: CR47 article-title: Neocortex size as a constraint on group size in primates publication-title: J Hum Evol doi: 10.1016/0047-2484(92)90081-J – ident: CR5 – volume: 37 start-page: 50 issue: 4 year: 2004 end-page: 56 ident: CR22 article-title: Crime data mining: a general framework and some examples publication-title: Computer doi: 10.1109/MC.2004.1297301 – volume: 46 start-page: 71 issue: 1 year: 2008 end-page: 98 ident: CR45 article-title: Brokerage qualifications in ringing operations* publication-title: Criminology doi: 10.1111/j.1745-9125.2008.00103.x – ident: CR26 – volume: 2008 start-page: P10008 issue: 10 year: 2008 ident: CR25 article-title: Fast unfolding of communities in large networks publication-title: J Stat Mech Theory Exp doi: 10.1088/1742-5468/2008/10/P10008 – ident: CR14 – volume: 26 start-page: 382 issue: 4 year: 2010 end-page: 392 ident: CR36 article-title: Assessing vulnerable and strategic positions in a criminal network publication-title: J Contemp Crim Justice doi: 10.1177/1043986210377105 – volume: 286 start-page: 509 issue: 5439 year: 1999 end-page: 512 ident: CR49 article-title: Emergence of scaling in random networks publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 6 start-page: 19161 year: 2018 end-page: 19174 ident: CR28 article-title: CoDetect: financial fraud detection with anomaly feature detection publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2816564 – volume: 13 start-page: 251 issue: 3 year: 1991 end-page: 274 ident: CR6 article-title: The application of network analysis to criminal intelligence: an assessment of the prospects publication-title: Soc Netw doi: 10.1016/0378-8733(91)90008-H – volume: 24 start-page: 43 issue: 3 year: 2002 end-page: 52 ident: CR35 article-title: Mapping networks of terrorist cells publication-title: Connections – ident: CR27 – start-page: 89 year: 1989 end-page: 126 ident: CR44 publication-title: Fernandez RM – ident: CR23 – ident: CR48 – volume: 486 start-page: 75 issue: 3–5 year: 2010 end-page: 174 ident: CR33 article-title: Community detection in graphs publication-title: Phys Rep doi: 10.1016/j.physrep.2009.11.002 – ident: CR52 – ident: CR17 – volume: 71 start-page: 623 issue: 4 year: 2009 end-page: 630 ident: CR46 article-title: Predicting missing links via local information publication-title: Eur Phys J B doi: 10.1140/epjb/e2009-00335-8 – year: 2005 ident: CR10 publication-title: Contacts, opportunities, and criminal enterprise doi: 10.3138/9781442673304 – volume: 25 start-page: 2090 issue: 9 year: 2013 end-page: 2104 ident: CR18 article-title: Mining graph topological patterns: finding covariations among vertex descriptors publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2012.154 – start-page: 1 year: 2010 end-page: 14 ident: CR30 article-title: Combined detection model for criminal network detection publication-title: Intelligence and security informatics – volume: 12 start-page: 51 issue: 1 year: 2006 end-page: 66 ident: CR40 article-title: Destabilization of covert networks publication-title: Comput Math Organiz Theor doi: 10.1007/s10588-006-7083-y – ident: CR34 – volume: 12 start-page: 112 issue: 2 year: 2011 end-page: 128 ident: CR11 article-title: Co-offending between criminal enterprise groups publication-title: Global Crime doi: 10.1080/17440572.2011.567832 – start-page: 87 year: 2017 end-page: 108 ident: CR1 article-title: Picking high-level fruit in dark trees: using complex systems analytics to detect and understand crime publication-title: Cyber security and policy: a substantive dialogue – ident: CR41 – ident: CR24 – volume: 48 start-page: 100 issue: 6 year: 2005 end-page: 107 ident: CR21 article-title: Criminal network analysis and visualization publication-title: Commun ACM doi: 10.1145/1064830.1064834 – volume: 17 start-page: 157 issue: 2 year: 1975 end-page: 164 ident: CR2 article-title: The application of link analysis to police intelligence publication-title: Hum Factors doi: 10.1177/001872087501700206 – ident: 31_CR29 doi: 10.1007/978-3-540-73871-8_54 – ident: 31_CR51 – ident: 31_CR23 doi: 10.1007/3-540-44853-5_18 – start-page: 13 volume-title: Crime and networks year: 2013 ident: 31_CR7 doi: 10.4324/9781315885018 – volume: 286 start-page: 509 issue: 5439 year: 1999 ident: 31_CR49 publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 13 start-page: 251 issue: 3 year: 1991 ident: 31_CR6 publication-title: Soc Netw doi: 10.1016/0378-8733(91)90008-H – ident: 31_CR27 doi: 10.1109/VAST.2014.7042564 – ident: 31_CR39 – volume: 51 start-page: 58 issue: 10 year: 2008 ident: 31_CR15 publication-title: Commun ACM doi: 10.1145/1400181.1400198 – volume: 41 start-page: 580 issue: 4 year: 2001 ident: 31_CR9 publication-title: Br J Criminol doi: 10.1093/bjc/41.4.580 – ident: 31_CR5 – volume: 46 start-page: 71 issue: 1 year: 2008 ident: 31_CR45 publication-title: Criminology doi: 10.1111/j.1745-9125.2008.00103.x – volume: 71 start-page: 623 issue: 4 year: 2009 ident: 31_CR46 publication-title: Eur Phys J B doi: 10.1140/epjb/e2009-00335-8 – start-page: 47 volume-title: Disrupting criminal networks: network analysis in crime prevention year: 2015 ident: 31_CR38 doi: 10.1515/9781626372573-005 – ident: 31_CR24 doi: 10.1017/CBO9781316212639.010 – volume: 17 start-page: 157 issue: 2 year: 1975 ident: 31_CR2 publication-title: Hum Factors doi: 10.1177/001872087501700206 – volume: 60 start-page: 655 issue: 4 year: 2009 ident: 31_CR16 publication-title: J Am Soc Inform Sci Technol doi: 10.1002/asi.21008 – ident: 31_CR52 – volume: 58 start-page: 842 issue: 6 year: 2007 ident: 31_CR3 publication-title: J Am Soc Inf Sci doi: 10.1002/asi.20552 – ident: 31_CR32 doi: 10.1109/CBD.2017.38 – volume-title: Social network analysis: methods and applications year: 1994 ident: 31_CR20 doi: 10.1017/CBO9780511815478 – start-page: 1 volume-title: Intelligence and security informatics year: 2010 ident: 31_CR30 doi: 10.1007/978-3-642-13601-6_1 – volume: 435 start-page: 814 issue: 7043 year: 2005 ident: 31_CR19 publication-title: Nature doi: 10.1038/nature03607 – start-page: 482 volume-title: Disrupting dark networks year: 2013 ident: 31_CR37 – ident: 31_CR4 – volume: 12 start-page: 51 issue: 1 year: 2006 ident: 31_CR40 publication-title: Comput Math Organiz Theor doi: 10.1007/s10588-006-7083-y – volume-title: Contacts, opportunities, and criminal enterprise year: 2005 ident: 31_CR10 doi: 10.3138/9781442673304 – ident: 31_CR34 – volume: 24 start-page: 43 issue: 3 year: 2002 ident: 31_CR35 publication-title: Connections – ident: 31_CR17 doi: 10.1137/1.9781611972870.13 – ident: #cr-split#-31_CR41.2 – volume: 22 start-page: 469 issue: 6 year: 1992 ident: 31_CR47 publication-title: J Hum Evol doi: 10.1016/0047-2484(92)90081-J – volume: 3 start-page: 3 issue: 1 year: 2015 ident: 31_CR31 publication-title: Big Data doi: 10.1089/big.2014.0021 – volume: 486 start-page: 75 issue: 3–5 year: 2010 ident: 31_CR33 publication-title: Phys Rep doi: 10.1016/j.physrep.2009.11.002 – volume: 2008 start-page: P10008 issue: 10 year: 2008 ident: 31_CR25 publication-title: J Stat Mech Theory Exp doi: 10.1088/1742-5468/2008/10/P10008 – start-page: 87 volume-title: Cyber security and policy: a substantive dialogue year: 2017 ident: 31_CR1 – volume: 48 start-page: 100 issue: 6 year: 2005 ident: 31_CR21 publication-title: Commun ACM doi: 10.1145/1064830.1064834 – ident: 31_CR48 – volume: 105 start-page: 1118 issue: 4 year: 2008 ident: 31_CR42 publication-title: Proc Natl Acad Sci doi: 10.1073/pnas.0706851105 – volume: 24 start-page: 53 issue: 3 year: 2001 ident: 31_CR8 publication-title: Connections – ident: 31_CR14 doi: 10.1007/978-3-319-31863-9_1 – volume: 37 start-page: 50 issue: 4 year: 2004 ident: 31_CR22 publication-title: Computer doi: 10.1109/MC.2004.1297301 – volume: 25 start-page: 2090 issue: 9 year: 2013 ident: 31_CR18 publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2012.154 – volume: 6 start-page: 19161 year: 2018 ident: 31_CR28 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2816564 – volume: 27 start-page: 415 issue: 1 year: 2001 ident: 31_CR43 publication-title: Ann Rev Sociol doi: 10.1146/annurev.soc.27.1.415 – volume: 12 start-page: 112 issue: 2 year: 2011 ident: 31_CR11 publication-title: Global Crime doi: 10.1080/17440572.2011.567832 – ident: #cr-split#-31_CR41.1 doi: 10.1007/978-0-387-09526-4 – volume: 18 start-page: 255 issue: 1 year: 2009 ident: 31_CR13 publication-title: VLDB J doi: 10.1007/s00778-008-0098-x – start-page: 651 volume-title: Graph theory year: 2008 ident: 31_CR12 doi: 10.1007/978-1-84628-970-5 – volume: 65 start-page: 056109 issue: 5 year: 2002 ident: 31_CR50 publication-title: Phys Rev E doi: 10.1103/PhysRevE.65.056109 – start-page: 89 volume-title: Fernandez RM year: 1989 ident: 31_CR44 – volume: 26 start-page: 382 issue: 4 year: 2010 ident: 31_CR36 publication-title: J Contemp Crim Justice doi: 10.1177/1043986210377105 – ident: 31_CR26 |
| SSID | ssj0000702644 |
| Score | 2.0396667 |
| Snippet | Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high... |
| SourceID | unpaywall proquest crossref springer |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Computer Science Crime Data mining Data Mining and Knowledge Discovery Disruption Information Systems and Communication Service Intersections Representations Terrorism |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LT9wwEB7R5dD2QOkDdSlFPvRUZHWTOI5dqUIFLUWVuqqqInGL_IgBKWQXNqu2N35I--f4JYy9zm65LIccIr8kz9j-xp6ZD-CdzKXShUhoYlxOGUsVVcJllHPLNOcsscpHI38b8eMT9vU0P12DURcL490quz0xbNR2bPwdORrp0kOLLE32J1fUs0b519WOQkNFagX7KaQYewTrqc-M1YP1g-Ho-4_FrQsquEcA8XkzEfzD1Btp3p8LP1RwKu8fUEvUuXgofQqPZ81E_fml6vq_s-hoEzYiiCSf51J_DmtV8wKedQQNJK7Xl9CgEhBbtcHdqiFjR0xk8SIhmmNKLhqCqLGmIXEqcbNpZYl3Gv1IvEP8GUF4SEJOa3oZmCSIqs9wVtrzS3J78_eLLxn-bn2k1e3Nv1dwcjT8eXhMI8ECNSkCEaq4llajuJzVDE0TaXJuEpY4UQgz0PijcTtQheFCqyKzVZZxgY2Y09rmLs-2oNeMm-o1EIknP5PYXVblrJCFTlM3qGxiZZEOdCb6MOhmtTQx-7gnwajLYIUIXs4FUaIgQr7SUvbh_aLJZJ56Y1XlnU5UZVyF03KpM33Y68S3LF7R2d5Cwg8Pvb166DfwJA3ahdZ6sQO99npWvUUg0-rdqJ13HanxQQ priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LbtQwFL0q0wWwoDzFQEFesKLyNHEcx2ZXoZYKiQokRiqryI-4RU0zo0lGLaz6IfBz_RJsx5kCQkVILLKI_EhsX9vH8r3nALwQuZCq4ClOtc0xpURiyW2GGTNUMUZTI3008rsDtj-lbw_zwzX4MMTCtFG1DUfeUM9VPBmuKL2gVFi9u4XUJ9tzY_tJz9l2689a3i3LPc5OsbgB6yx38HwE69OD9zufvMhcCJvOMxJvN_9Y7tf96Qp0ru5Jb8PNZTOXX85kXf-0Fe1twGJoRO-BcjJZdmqiv_7G7_hfW3kX7kTginZ6S7sHa1VzHzYGUQgU14gH0DjDQ6bqgotXg2YW6agchkIESYs-N8gh1RoHslZkl21lkHdUfYW8E_4RcpAUBR5tfBrUK5Csj2auHcen6PLi2xufsnvu_7q7vPj-EKZ7ux9f7-Mo6oA1ceAHS6aEUc5ErFHUHYeEzplOaWp5wXWi3ItyS5AsNONKFpmpsoxxV4hapUxu8-wRjJpZUz0GJBzaoMJVl1U5LUShCLFJZVIjCpKojI8hGYay1JHx3Atv1GU4-XBW9v1Zuv4MHKmlGMPLVZF5T_dxXebNwT7KOPPbkiTCQ-CMpGPYGob0KvmayrZWZvX3Tz_5p9xP4RYJNsNxWmzCqFssq2cOS3XqeZwdPwAYlBsv priority: 102 providerName: Unpaywall |
| Title | The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract” |
| URI | https://link.springer.com/article/10.1186/s13388-018-0031-9 https://www.proquest.com/docview/2090575321 https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0031-9 |
| UnpaywallVersion | publishedVersion |
| Volume | 7 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2190-8532 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: KQ8 dateStart: 20120101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2190-8532 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: KQ8 dateStart: 20100101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2190-8532 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2190-8532 dateEnd: 20181231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: BENPR dateStart: 20120201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2190-8532 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: 8FG dateStart: 20120201 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Open Access Hybrid - NESLI2 2011-2012 customDbUrl: eissn: 2190-8532 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: 40G dateStart: 20120101 isFulltext: true titleUrlDefault: http://link.springer.com/ providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Open Access Journals customDbUrl: eissn: 2190-8532 dateEnd: 20181231 omitProxy: true ssIdentifier: ssj0000702644 issn: 2190-8532 databaseCode: C24 dateStart: 20121201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEBZNckh76CNt6DZp0KGnBFFblvXoLV12EwpZQslCejKSZSUBxxtiL20vJT-k-XP5JR1p5U0LJaUHDxhZMvjTeL5B80DoncqVNkKmJC1dThijmmjpMsK5ZYZzllrts5GPJvxwyj6d5qcxj7vto937I8nwpw5qLfn71ntTPvAKLtiJRK2gNaAf1PdrGMYUh_D7FYk38vEE868z_7RB98RyeRb6BK3Pmyv9_auu69_Mzfg5ehp5It5fAPsCPaqaDfSs78GAo0q-RA3gjG3VhYiqBs8cLmOjLhwSNlp80WAghjUJtVGxm7eVxT4u9AP2Me9nGBggDmWryWVoFoF1fTa7vujOL_Hdzc8DPzL61vlkqrub21doOh6dDA9J7KFASgpcg2hulDWAiLOGgfehypyXKUudFLJMDNwY0HgtSi6NFpmtsoxLmMScMTZ3ebaJVptZU71GWIFxZwqWy6qcCSUMpS6pbGqVoInJ5AAl_Vctylhg3Pe5qIvgaEheLIAoAIhQkrRQA7S7nHK1qK7x0MPbPVRFVLS2oInyjDOj6QDt9fDdDz-w2N4S4X-_-s1_rb2FHtOw2cA_F9totbueV2-BunRmB62w5ACkHINc-ziaHH_eCdvXSz4EefRjBCPTyfH-l1-Z8-4u |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELaq9lA48I9YKOADXKgs1onj2EgV4mfLlrYrhFqpt9Q_cUFKswvJqvTWB4FX4WH6JIy9zi5cllMPOURO4igz4_kmnpkPoWcyk0rnghJqXEYYSxRRwqWEc8s054xa5auR90d8eMg-HmVHK-h3Vwvj0yq7NTEs1HZs_D9yCNKlhxZpQl9PvhHPGuV3VzsKDRWpFexWaDEWCzt2y_MzCOGarZ33IO_nSbI9OHg3JJFlgJgEvDFRXEur4Z2d1QzwuTQZN5RRJ3Jh-hpONNiEyg0XWuWpLdOUC7iJOa1t5jxrBLiANZYyCcHf2tvB6NPn-V8eMCiPOOJ2KhX8ZeODQp8_BgcYFJH_OsQFyp1vzF5H69N6os7PVFX95fu2b6EbEbTiNzMtu41WyvoOutkRQuC4PtxFNSgdtmUb0rtqPHbYRNYwHKpHGvy1xoBSKxIatWI3bUqLfZLqK-wT8E8wwFEcemiT08BcgVV1AlJov5ziy4ufH_zI4EfrK7suL37dQ4dX8qnvo9V6XJcPEJaANJiEx6VlxnKZ6yRx_dJSK_Okr1PRQ_3uqxYmdjv3pBtVEaIewYuZIAoQROiPWsgeejG_ZTJr9bHs4o1OVEW0-qZY6GgPbXbiWwwvedjmXML_n_rh8qmfovXhwf5esbcz2n2EriVB0wSh-QZabb9Py8cAolr9JGoqRsdXbRx_APnzLs4 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB61VKLl0JaWii2U-sCpyCIPx7G5oS1b3uqhSNwiO44BKWRXJCvojR_S_jl-CWMnWVqpAvWQQ-TYkfLNaL7JvADWZSKVTkVIw9wmlLFIUSVsTDk3THPOQqNcNfLRMd89YfunyWk357Tus937kGRb0-C6NFXN5sTYVsUF36ydZ-WSsPBCqaTyObxgaNzcCIMhH85-sqA8O4PfRTP_ufNve_RAMmdx0QV4Oa0m6ue1Kss_TM_oLbzuOCPZbkFehGdF9Q7e9PMYSKee76FCzIkpGp9dVZGxJXk3tIv44o2aXFQESWJJfZ9UYqd1YYjLEd0iLv_9jCAbJL6FNb30gyOIKs_GVxfN-SW5u_31za3s3DSusOru9vcSnIx2fgx3aTdPgeYR8g6quJZGIzrWaIaeiMwTnocstCIVeaDxRqP2qzTnQqs0NkUcc4GbmNXaJDaJP8BcNa6KZSASDT2TeFxcJCyVqY4iGxQmNDKNAh2LAQT9V83yrtm4m3lRZt7pEDxrgcgQCN-eNJMD-DLbMmk7bTz28GoPVdYpXZ1FgXTsM47CAWz08D0sP3LYxgzhp1_98b_O_gzz37-OssO944MVeBV5uUO3PV2FueZqWnxCRtPoNS-195kO7nU |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LbtQwFL0q0wWwoDzFQEFesKLyNHEcx2ZXoZYKiQokRiqryI-4RU0zo0lGLaz6IfBz_RJsx5kCQkVILLKI_EhsX9vH8r3nALwQuZCq4ClOtc0xpURiyW2GGTNUMUZTI3008rsDtj-lbw_zwzX4MMTCtFG1DUfeUM9VPBmuKL2gVFi9u4XUJ9tzY_tJz9l2689a3i3LPc5OsbgB6yx38HwE69OD9zufvMhcCJvOMxJvN_9Y7tf96Qp0ru5Jb8PNZTOXX85kXf-0Fe1twGJoRO-BcjJZdmqiv_7G7_hfW3kX7kTginZ6S7sHa1VzHzYGUQgU14gH0DjDQ6bqgotXg2YW6agchkIESYs-N8gh1RoHslZkl21lkHdUfYW8E_4RcpAUBR5tfBrUK5Csj2auHcen6PLi2xufsnvu_7q7vPj-EKZ7ux9f7-Mo6oA1ceAHS6aEUc5ErFHUHYeEzplOaWp5wXWi3ItyS5AsNONKFpmpsoxxV4hapUxu8-wRjJpZUz0GJBzaoMJVl1U5LUShCLFJZVIjCpKojI8hGYay1JHx3Atv1GU4-XBW9v1Zuv4MHKmlGMPLVZF5T_dxXebNwT7KOPPbkiTCQ-CMpGPYGob0KvmayrZWZvX3Tz_5p9xP4RYJNsNxWmzCqFssq2cOS3XqeZwdPwAYlBsv |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+detection+of+criminal+groups+in+real-world+fused+data%3A+using+the+graph-mining+algorithm+%E2%80%9CGraphExtract%E2%80%9D&rft.jtitle=Security+informatics+%28Berlin%29&rft.au=Robinson%2C+David&rft.au=Scogings%2C+Chris&rft.date=2018-08-17&rft.pub=Springer+Berlin+Heidelberg&rft.eissn=2190-8532&rft.volume=7&rft.issue=1&rft_id=info:doi/10.1186%2Fs13388-018-0031-9&rft.externalDocID=10_1186_s13388_018_0031_9 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2190-8532&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2190-8532&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2190-8532&client=summon |