The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract”

Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But on...

Full description

Saved in:
Bibliographic Details
Published inSecurity informatics (Berlin) Vol. 7; no. 1; pp. 1 - 16
Main Authors Robinson, David, Scogings, Chris
Format Journal Article
LanguageEnglish
Published Berlin/Heidelberg Springer Berlin Heidelberg 17.08.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2190-8532
2190-8532
DOI10.1186/s13388-018-0031-9

Cover

Abstract Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But once this is achieved how should agencies go about attempting to exploit this data by proactively identifying criminal events and the actors responsible? The authors will outline an effective generic method that; computationally extracts minimally overlapping contextual subgraphs, then uses these subgraphs as the basis to construct a mesoscopic graph based on the intersections between the subgraphs, enabling knowledge discovery from these data representations for the purpose of maximally disrupting terrorism, organised crime and the broader criminal network.
AbstractList Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high performing entity resolution it is now possible to fuse multiple heterogeneous datasets into an explicit generic data representation. But once this is achieved how should agencies go about attempting to exploit this data by proactively identifying criminal events and the actors responsible? The authors will outline an effective generic method that; computationally extracts minimally overlapping contextual subgraphs, then uses these subgraphs as the basis to construct a mesoscopic graph based on the intersections between the subgraphs, enabling knowledge discovery from these data representations for the purpose of maximally disrupting terrorism, organised crime and the broader criminal network.
ArticleNumber 2
Author Scogings, Chris
Robinson, David
Author_xml – sequence: 1
  givenname: David
  orcidid: 0000-0002-8345-0351
  surname: Robinson
  fullname: Robinson, David
  email: david.robinson.18@uni.massey.ac.nz
  organization: Institute of Natural and Mathematical Sciences, Massey University
– sequence: 2
  givenname: Chris
  surname: Scogings
  fullname: Scogings, Chris
  organization: Institute of Natural and Mathematical Sciences, Massey University
BookMark eNqNkN9KwzAUxoMoOOcewLuA19Wk6b94J2NOYeDNvA5pmnYdXVKTlLm7PYi-3J7ElA4UQTEQcpJ838c5vwtwqrSSAFxhdINxltxaTEiWBQj7jQgO6AkYhZiiIItJePqtPgcTa9fIrxSFSRSNgFquJCykk8LVWkFdQmHqTa14Ayuju9bCWkEjeRNstWkKWHZWFrDgjt_Bztaqgs4HVIa3q8Db-gfeVNrUbrWBh_37vP-ZvTnDhTvsPy7BWckbKyfHcwxeHmbL6WOweJ4_Te8XgQgjQgOe5LTIaUzLIo9wGlERJwJHuMzSTKDcX3KCYp6KJMt5SgpJSJJ5U1TmeRGXMRmDcMjtVMt3W940rPVzcbNjGLEeGhugMQ-N9dAY9abrwdQa_dpJ69had8ajsCxEFMWpJ4i9Kh1UwmhrjSyZqB3v6fkh6-bPfPzD-Z-ejoNYr1WVNF89_W76BDaBoXk
CitedBy_id crossref_primary_10_3390_math10162929
crossref_primary_10_1371_journal_pone_0255067
crossref_primary_10_1016_j_dss_2021_113537
crossref_primary_10_1016_j_ipm_2022_102879
crossref_primary_10_1080_24725854_2021_1939466
crossref_primary_10_3390_electronics13112011
crossref_primary_10_1108_JMLC_12_2020_0139
crossref_primary_10_1080_17440572_2024_2371326
Cites_doi 10.1093/bjc/41.4.580
10.1002/asi.21008
10.1145/1400181.1400198
10.1073/pnas.0706851105
10.1089/big.2014.0021
10.1103/PhysRevE.65.056109
10.1017/CBO9780511815478
10.1146/annurev.soc.27.1.415
10.1007/s00778-008-0098-x
10.1038/nature03607
10.1007/978-1-84628-970-5
10.1002/asi.20552
10.1016/0047-2484(92)90081-J
10.1109/MC.2004.1297301
10.1111/j.1745-9125.2008.00103.x
10.1088/1742-5468/2008/10/P10008
10.1177/1043986210377105
10.1126/science.286.5439.509
10.1109/ACCESS.2018.2816564
10.1016/0378-8733(91)90008-H
10.1016/j.physrep.2009.11.002
10.1140/epjb/e2009-00335-8
10.3138/9781442673304
10.1109/TKDE.2012.154
10.1007/s10588-006-7083-y
10.1080/17440572.2011.567832
10.1145/1064830.1064834
10.1177/001872087501700206
10.1007/978-3-540-73871-8_54
10.1007/3-540-44853-5_18
10.4324/9781315885018
10.1109/VAST.2014.7042564
10.1515/9781626372573-005
10.1017/CBO9781316212639.010
10.1109/CBD.2017.38
10.1007/978-3-642-13601-6_1
10.1137/1.9781611972870.13
10.1007/978-3-319-31863-9_1
10.1007/978-0-387-09526-4
ContentType Journal Article
Copyright The Author(s) 2018
Security Informatics is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2018
– notice: Security Informatics is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7XB
8AL
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOI 10.1186/s13388-018-0031-9
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList Publicly Available Content Database

Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2190-8532
EndPage 16
ExternalDocumentID 10.1186/s13388-018-0031-9
10_1186_s13388_018_0031_9
GroupedDBID -A0
0R~
3V.
40G
5VS
8FE
8FG
AAKKN
ABEEZ
ABFTD
ABUWG
ACACY
ACGFS
ACULB
ADBBV
ADINQ
AFGXO
AFKRA
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
DWQXO
EBS
EJD
GNUQQ
GROUPED_DOAJ
HCIFZ
K6V
K7-
KQ8
M0N
M~E
OK1
P62
PIMPY
PQQKQ
PROAC
RSV
SCO
SOJ
AAYXX
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
7XB
8AL
8FK
JQ2
PKEHL
PQEST
PQUKI
PRINS
Q9U
2VQ
ADTOC
AHSBF
HZ~
O9-
UNPAY
ID FETCH-LOGICAL-c2439-a6b9db959fdb41749c56c141f878c0b56cb305a7c68ba73de3368a6b4fbbd5f53
IEDL.DBID C24
ISSN 2190-8532
IngestDate Tue Aug 19 14:21:24 EDT 2025
Fri Jul 25 22:50:23 EDT 2025
Thu Apr 24 23:02:18 EDT 2025
Wed Oct 01 03:10:36 EDT 2025
Fri Feb 21 02:30:26 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Organised crime
Dark networks
Criminal analysis
Social network analysis
Risk detection
Crime
Criminal networks
SNA
Entity resolution
Graph mining
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2439-a6b9db959fdb41749c56c141f878c0b56cb305a7c68ba73de3368a6b4fbbd5f53
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8345-0351
OpenAccessLink https://link.springer.com/10.1186/s13388-018-0031-9
PQID 2090575321
PQPubID 2034664
PageCount 16
ParticipantIDs unpaywall_primary_10_1186_s13388_018_0031_9
proquest_journals_2090575321
crossref_citationtrail_10_1186_s13388_018_0031_9
crossref_primary_10_1186_s13388_018_0031_9
springer_journals_10_1186_s13388_018_0031_9
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20180817
PublicationDateYYYYMMDD 2018-08-17
PublicationDate_xml – month: 8
  year: 2018
  text: 20180817
  day: 17
PublicationDecade 2010
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle Security informatics (Berlin)
PublicationTitleAbbrev Secur Inform
PublicationYear 2018
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References McGloin, Nguyen, Morselli (CR7) 2013
Xu, Chen (CR15) 2008; 51
CR39
Barabási, Albert (CR49) 1999; 286
CR34
CR32
Morselli (CR36) 2010; 26
Gould (CR44) 1989
Prado, Plantevit, Robardet, Boulicaut (CR18) 2013; 25
Everton (CR37) 2013
Sparrow (CR6) 1991; 13
Hu, Kaza, Chen (CR16) 2009; 60
Coles (CR9) 2001; 41
Wang, Rudin, Wagner, Sevieri (CR31) 2015; 3
CR4
Blondel, Guillaume, Lambiotte, Lefebvre (CR25) 2008; 2008
CR5
CR48
Klerks (CR8) 2001; 24
McPherson, Smith-Lovin, Cook (CR43) 2001; 27
Malm, Bichler, Nash (CR11) 2011; 12
Robinson, Scogings, Colarik, Jang-Jaccard, Mathrani (CR1) 2017
CR41
Benjelloun, Garcia-Molina, Menestrina, Su, Whang, Widom (CR13) 2009; 18
Ozgul, Erdem, Bowerman, Bondy, Chen, Chau, Li, Urs, Srinivasa, Wang (CR30) 2010
Zhou, Lü, Zhang (CR46) 2009; 71
Bondy, Murty (CR12) 2008
Krebs (CR35) 2002; 24
Dunbar (CR47) 1992; 22
CR17
Xu, Chen (CR21) 2005; 48
Huang, Mu, Yang, Cai (CR28) 2018; 6
CR14
Schroeder, Xu, Chen, Chau (CR3) 2007; 58
Carley (CR40) 2006; 12
CR52
Wasserman, Faust (CR20) 1994
CR51
Morselli, Roy (CR45) 2008; 46
Fortunato (CR33) 2010; 486
Morselli, Grund, Boivin, Bichler, Malm (CR38) 2015
Chen, Chung, Xu, Wang, Qin, Chau (CR22) 2004; 37
Palla, Derényi, Farkas, Vicsek (CR19) 2005; 435
CR29
CR27
CR26
CR24
Rosvall, Bergstrom (CR42) 2008; 105
CR23
Holme, Kim, Yoon, Han (CR50) 2002; 65
Morselli (CR10) 2005
Harper, Harris (CR2) 1975; 17
A Malm (31_CR11) 2011; 12
D Robinson (31_CR1) 2017
31_CR39
31_CR34
G Palla (31_CR19) 2005; 435
WR Harper (31_CR2) 1975; 17
31_CR32
N Coles (31_CR9) 2001; 41
H Chen (31_CR22) 2004; 37
S Fortunato (31_CR33) 2010; 486
31_CR5
31_CR4
31_CR48
C Morselli (31_CR36) 2010; 26
KM Carley (31_CR40) 2006; 12
JA Bondy (31_CR12) 2008
A Prado (31_CR18) 2013; 25
RV Gould (31_CR44) 1989
J Schroeder (31_CR3) 2007; 58
J Xu (31_CR15) 2008; 51
M Rosvall (31_CR42) 2008; 105
31_CR17
31_CR14
D Hu (31_CR16) 2009; 60
JM McGloin (31_CR7) 2013
M McPherson (31_CR43) 2001; 27
cr-split#-31_CR41.1
31_CR52
cr-split#-31_CR41.2
31_CR51
F Ozgul (31_CR30) 2010
VD Blondel (31_CR25) 2008; 2008
31_CR27
VE Krebs (31_CR35) 2002; 24
31_CR26
31_CR29
C Morselli (31_CR45) 2008; 46
31_CR23
D Huang (31_CR28) 2018; 6
31_CR24
C Morselli (31_CR38) 2015
RIM Dunbar (31_CR47) 1992; 22
P Holme (31_CR50) 2002; 65
C Morselli (31_CR10) 2005
M Sparrow (31_CR6) 1991; 13
A-L Barabási (31_CR49) 1999; 286
S Wasserman (31_CR20) 1994
T Wang (31_CR31) 2015; 3
T Zhou (31_CR46) 2009; 71
J Xu (31_CR21) 2005; 48
O Benjelloun (31_CR13) 2009; 18
DSF Everton (31_CR37) 2013
P Klerks (31_CR8) 2001; 24
References_xml – volume: 41
  start-page: 580
  issue: 4
  year: 2001
  end-page: 594
  ident: CR9
  article-title: It’s not what you know—it’s who you know that counts. analysing serious crime groups as social networks
  publication-title: Br J Criminol
  doi: 10.1093/bjc/41.4.580
– volume: 60
  start-page: 655
  issue: 4
  year: 2009
  end-page: 665
  ident: CR16
  article-title: Identifying significant facilitators of dark network evolution
  publication-title: J Am Soc Inform Sci Technol
  doi: 10.1002/asi.21008
– volume: 51
  start-page: 58
  issue: 10
  year: 2008
  ident: CR15
  article-title: The topology of dark networks
  publication-title: Commun ACM
  doi: 10.1145/1400181.1400198
– volume: 105
  start-page: 1118
  issue: 4
  year: 2008
  end-page: 1123
  ident: CR42
  article-title: Maps of random walks on complex networks reveal community structure
  publication-title: Proc Natl Acad Sci
  doi: 10.1073/pnas.0706851105
– ident: CR4
– start-page: 47
  year: 2015
  end-page: 66
  ident: CR38
  article-title: Network stability issues in a co-offending population
  publication-title: Disrupting criminal networks: network analysis in crime prevention
– ident: CR39
– ident: CR51
– volume: 3
  start-page: 3
  issue: 1
  year: 2015
  end-page: 21
  ident: CR31
  article-title: Finding patterns with a rotten core: data mining for crime series with cores
  publication-title: Big Data
  doi: 10.1089/big.2014.0021
– ident: CR29
– volume: 65
  start-page: 056109
  issue: 5
  year: 2002
  ident: CR50
  article-title: Attack vulnerability of complex networks
  publication-title: Phys Rev E
  doi: 10.1103/PhysRevE.65.056109
– start-page: 482
  year: 2013
  ident: CR37
  publication-title: Disrupting dark networks
– year: 1994
  ident: CR20
  publication-title: Social network analysis: methods and applications
  doi: 10.1017/CBO9780511815478
– volume: 27
  start-page: 415
  issue: 1
  year: 2001
  end-page: 444
  ident: CR43
  article-title: Birds of a feather: homophily in Social Networks
  publication-title: Ann Rev Sociol
  doi: 10.1146/annurev.soc.27.1.415
– volume: 18
  start-page: 255
  issue: 1
  year: 2009
  end-page: 276
  ident: CR13
  article-title: Swoosh: a generic approach to entity resolution
  publication-title: VLDB J
  doi: 10.1007/s00778-008-0098-x
– volume: 435
  start-page: 814
  issue: 7043
  year: 2005
  end-page: 818
  ident: CR19
  article-title: Uncovering the overlapping community structure of complex networks in nature and society
  publication-title: Nature
  doi: 10.1038/nature03607
– volume: 24
  start-page: 53
  issue: 3
  year: 2001
  end-page: 65
  ident: CR8
  article-title: The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands
  publication-title: Connections
– start-page: 651
  year: 2008
  ident: CR12
  publication-title: Graph theory
  doi: 10.1007/978-1-84628-970-5
– volume: 58
  start-page: 842
  issue: 6
  year: 2007
  end-page: 855
  ident: CR3
  article-title: Automated criminal link analysis based on domain knowledge
  publication-title: J Am Soc Inf Sci
  doi: 10.1002/asi.20552
– start-page: 13
  year: 2013
  end-page: 27
  ident: CR7
  article-title: The importance of studying co-offending networks for criminological theory and policy
  publication-title: Crime and networks
– ident: CR32
– volume: 22
  start-page: 469
  issue: 6
  year: 1992
  end-page: 493
  ident: CR47
  article-title: Neocortex size as a constraint on group size in primates
  publication-title: J Hum Evol
  doi: 10.1016/0047-2484(92)90081-J
– ident: CR5
– volume: 37
  start-page: 50
  issue: 4
  year: 2004
  end-page: 56
  ident: CR22
  article-title: Crime data mining: a general framework and some examples
  publication-title: Computer
  doi: 10.1109/MC.2004.1297301
– volume: 46
  start-page: 71
  issue: 1
  year: 2008
  end-page: 98
  ident: CR45
  article-title: Brokerage qualifications in ringing operations*
  publication-title: Criminology
  doi: 10.1111/j.1745-9125.2008.00103.x
– ident: CR26
– volume: 2008
  start-page: P10008
  issue: 10
  year: 2008
  ident: CR25
  article-title: Fast unfolding of communities in large networks
  publication-title: J Stat Mech Theory Exp
  doi: 10.1088/1742-5468/2008/10/P10008
– ident: CR14
– volume: 26
  start-page: 382
  issue: 4
  year: 2010
  end-page: 392
  ident: CR36
  article-title: Assessing vulnerable and strategic positions in a criminal network
  publication-title: J Contemp Crim Justice
  doi: 10.1177/1043986210377105
– volume: 286
  start-page: 509
  issue: 5439
  year: 1999
  end-page: 512
  ident: CR49
  article-title: Emergence of scaling in random networks
  publication-title: Science
  doi: 10.1126/science.286.5439.509
– volume: 6
  start-page: 19161
  year: 2018
  end-page: 19174
  ident: CR28
  article-title: CoDetect: financial fraud detection with anomaly feature detection
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2816564
– volume: 13
  start-page: 251
  issue: 3
  year: 1991
  end-page: 274
  ident: CR6
  article-title: The application of network analysis to criminal intelligence: an assessment of the prospects
  publication-title: Soc Netw
  doi: 10.1016/0378-8733(91)90008-H
– volume: 24
  start-page: 43
  issue: 3
  year: 2002
  end-page: 52
  ident: CR35
  article-title: Mapping networks of terrorist cells
  publication-title: Connections
– ident: CR27
– start-page: 89
  year: 1989
  end-page: 126
  ident: CR44
  publication-title: Fernandez RM
– ident: CR23
– ident: CR48
– volume: 486
  start-page: 75
  issue: 3–5
  year: 2010
  end-page: 174
  ident: CR33
  article-title: Community detection in graphs
  publication-title: Phys Rep
  doi: 10.1016/j.physrep.2009.11.002
– ident: CR52
– ident: CR17
– volume: 71
  start-page: 623
  issue: 4
  year: 2009
  end-page: 630
  ident: CR46
  article-title: Predicting missing links via local information
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2009-00335-8
– year: 2005
  ident: CR10
  publication-title: Contacts, opportunities, and criminal enterprise
  doi: 10.3138/9781442673304
– volume: 25
  start-page: 2090
  issue: 9
  year: 2013
  end-page: 2104
  ident: CR18
  article-title: Mining graph topological patterns: finding covariations among vertex descriptors
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2012.154
– start-page: 1
  year: 2010
  end-page: 14
  ident: CR30
  article-title: Combined detection model for criminal network detection
  publication-title: Intelligence and security informatics
– volume: 12
  start-page: 51
  issue: 1
  year: 2006
  end-page: 66
  ident: CR40
  article-title: Destabilization of covert networks
  publication-title: Comput Math Organiz Theor
  doi: 10.1007/s10588-006-7083-y
– ident: CR34
– volume: 12
  start-page: 112
  issue: 2
  year: 2011
  end-page: 128
  ident: CR11
  article-title: Co-offending between criminal enterprise groups
  publication-title: Global Crime
  doi: 10.1080/17440572.2011.567832
– start-page: 87
  year: 2017
  end-page: 108
  ident: CR1
  article-title: Picking high-level fruit in dark trees: using complex systems analytics to detect and understand crime
  publication-title: Cyber security and policy: a substantive dialogue
– ident: CR41
– ident: CR24
– volume: 48
  start-page: 100
  issue: 6
  year: 2005
  end-page: 107
  ident: CR21
  article-title: Criminal network analysis and visualization
  publication-title: Commun ACM
  doi: 10.1145/1064830.1064834
– volume: 17
  start-page: 157
  issue: 2
  year: 1975
  end-page: 164
  ident: CR2
  article-title: The application of link analysis to police intelligence
  publication-title: Hum Factors
  doi: 10.1177/001872087501700206
– ident: 31_CR29
  doi: 10.1007/978-3-540-73871-8_54
– ident: 31_CR51
– ident: 31_CR23
  doi: 10.1007/3-540-44853-5_18
– start-page: 13
  volume-title: Crime and networks
  year: 2013
  ident: 31_CR7
  doi: 10.4324/9781315885018
– volume: 286
  start-page: 509
  issue: 5439
  year: 1999
  ident: 31_CR49
  publication-title: Science
  doi: 10.1126/science.286.5439.509
– volume: 13
  start-page: 251
  issue: 3
  year: 1991
  ident: 31_CR6
  publication-title: Soc Netw
  doi: 10.1016/0378-8733(91)90008-H
– ident: 31_CR27
  doi: 10.1109/VAST.2014.7042564
– ident: 31_CR39
– volume: 51
  start-page: 58
  issue: 10
  year: 2008
  ident: 31_CR15
  publication-title: Commun ACM
  doi: 10.1145/1400181.1400198
– volume: 41
  start-page: 580
  issue: 4
  year: 2001
  ident: 31_CR9
  publication-title: Br J Criminol
  doi: 10.1093/bjc/41.4.580
– ident: 31_CR5
– volume: 46
  start-page: 71
  issue: 1
  year: 2008
  ident: 31_CR45
  publication-title: Criminology
  doi: 10.1111/j.1745-9125.2008.00103.x
– volume: 71
  start-page: 623
  issue: 4
  year: 2009
  ident: 31_CR46
  publication-title: Eur Phys J B
  doi: 10.1140/epjb/e2009-00335-8
– start-page: 47
  volume-title: Disrupting criminal networks: network analysis in crime prevention
  year: 2015
  ident: 31_CR38
  doi: 10.1515/9781626372573-005
– ident: 31_CR24
  doi: 10.1017/CBO9781316212639.010
– volume: 17
  start-page: 157
  issue: 2
  year: 1975
  ident: 31_CR2
  publication-title: Hum Factors
  doi: 10.1177/001872087501700206
– volume: 60
  start-page: 655
  issue: 4
  year: 2009
  ident: 31_CR16
  publication-title: J Am Soc Inform Sci Technol
  doi: 10.1002/asi.21008
– ident: 31_CR52
– volume: 58
  start-page: 842
  issue: 6
  year: 2007
  ident: 31_CR3
  publication-title: J Am Soc Inf Sci
  doi: 10.1002/asi.20552
– ident: 31_CR32
  doi: 10.1109/CBD.2017.38
– volume-title: Social network analysis: methods and applications
  year: 1994
  ident: 31_CR20
  doi: 10.1017/CBO9780511815478
– start-page: 1
  volume-title: Intelligence and security informatics
  year: 2010
  ident: 31_CR30
  doi: 10.1007/978-3-642-13601-6_1
– volume: 435
  start-page: 814
  issue: 7043
  year: 2005
  ident: 31_CR19
  publication-title: Nature
  doi: 10.1038/nature03607
– start-page: 482
  volume-title: Disrupting dark networks
  year: 2013
  ident: 31_CR37
– ident: 31_CR4
– volume: 12
  start-page: 51
  issue: 1
  year: 2006
  ident: 31_CR40
  publication-title: Comput Math Organiz Theor
  doi: 10.1007/s10588-006-7083-y
– volume-title: Contacts, opportunities, and criminal enterprise
  year: 2005
  ident: 31_CR10
  doi: 10.3138/9781442673304
– ident: 31_CR34
– volume: 24
  start-page: 43
  issue: 3
  year: 2002
  ident: 31_CR35
  publication-title: Connections
– ident: 31_CR17
  doi: 10.1137/1.9781611972870.13
– ident: #cr-split#-31_CR41.2
– volume: 22
  start-page: 469
  issue: 6
  year: 1992
  ident: 31_CR47
  publication-title: J Hum Evol
  doi: 10.1016/0047-2484(92)90081-J
– volume: 3
  start-page: 3
  issue: 1
  year: 2015
  ident: 31_CR31
  publication-title: Big Data
  doi: 10.1089/big.2014.0021
– volume: 486
  start-page: 75
  issue: 3–5
  year: 2010
  ident: 31_CR33
  publication-title: Phys Rep
  doi: 10.1016/j.physrep.2009.11.002
– volume: 2008
  start-page: P10008
  issue: 10
  year: 2008
  ident: 31_CR25
  publication-title: J Stat Mech Theory Exp
  doi: 10.1088/1742-5468/2008/10/P10008
– start-page: 87
  volume-title: Cyber security and policy: a substantive dialogue
  year: 2017
  ident: 31_CR1
– volume: 48
  start-page: 100
  issue: 6
  year: 2005
  ident: 31_CR21
  publication-title: Commun ACM
  doi: 10.1145/1064830.1064834
– ident: 31_CR48
– volume: 105
  start-page: 1118
  issue: 4
  year: 2008
  ident: 31_CR42
  publication-title: Proc Natl Acad Sci
  doi: 10.1073/pnas.0706851105
– volume: 24
  start-page: 53
  issue: 3
  year: 2001
  ident: 31_CR8
  publication-title: Connections
– ident: 31_CR14
  doi: 10.1007/978-3-319-31863-9_1
– volume: 37
  start-page: 50
  issue: 4
  year: 2004
  ident: 31_CR22
  publication-title: Computer
  doi: 10.1109/MC.2004.1297301
– volume: 25
  start-page: 2090
  issue: 9
  year: 2013
  ident: 31_CR18
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2012.154
– volume: 6
  start-page: 19161
  year: 2018
  ident: 31_CR28
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2816564
– volume: 27
  start-page: 415
  issue: 1
  year: 2001
  ident: 31_CR43
  publication-title: Ann Rev Sociol
  doi: 10.1146/annurev.soc.27.1.415
– volume: 12
  start-page: 112
  issue: 2
  year: 2011
  ident: 31_CR11
  publication-title: Global Crime
  doi: 10.1080/17440572.2011.567832
– ident: #cr-split#-31_CR41.1
  doi: 10.1007/978-0-387-09526-4
– volume: 18
  start-page: 255
  issue: 1
  year: 2009
  ident: 31_CR13
  publication-title: VLDB J
  doi: 10.1007/s00778-008-0098-x
– start-page: 651
  volume-title: Graph theory
  year: 2008
  ident: 31_CR12
  doi: 10.1007/978-1-84628-970-5
– volume: 65
  start-page: 056109
  issue: 5
  year: 2002
  ident: 31_CR50
  publication-title: Phys Rev E
  doi: 10.1103/PhysRevE.65.056109
– start-page: 89
  volume-title: Fernandez RM
  year: 1989
  ident: 31_CR44
– volume: 26
  start-page: 382
  issue: 4
  year: 2010
  ident: 31_CR36
  publication-title: J Contemp Crim Justice
  doi: 10.1177/1043986210377105
– ident: 31_CR26
SSID ssj0000702644
Score 2.0396667
Snippet Law enforcement and intelligence agencies generally have access to a number of rich data sources, both structured and unstructured, and with the advent of high...
SourceID unpaywall
proquest
crossref
springer
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Computer Science
Crime
Data mining
Data Mining and Knowledge Discovery
Disruption
Information Systems and Communication Service
Intersections
Representations
Terrorism
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LT9wwEB7R5dD2QOkDdSlFPvRUZHWTOI5dqUIFLUWVuqqqInGL_IgBKWQXNqu2N35I--f4JYy9zm65LIccIr8kz9j-xp6ZD-CdzKXShUhoYlxOGUsVVcJllHPLNOcsscpHI38b8eMT9vU0P12DURcL490quz0xbNR2bPwdORrp0kOLLE32J1fUs0b519WOQkNFagX7KaQYewTrqc-M1YP1g-Ho-4_FrQsquEcA8XkzEfzD1Btp3p8LP1RwKu8fUEvUuXgofQqPZ81E_fml6vq_s-hoEzYiiCSf51J_DmtV8wKedQQNJK7Xl9CgEhBbtcHdqiFjR0xk8SIhmmNKLhqCqLGmIXEqcbNpZYl3Gv1IvEP8GUF4SEJOa3oZmCSIqs9wVtrzS3J78_eLLxn-bn2k1e3Nv1dwcjT8eXhMI8ECNSkCEaq4llajuJzVDE0TaXJuEpY4UQgz0PijcTtQheFCqyKzVZZxgY2Y09rmLs-2oNeMm-o1EIknP5PYXVblrJCFTlM3qGxiZZEOdCb6MOhmtTQx-7gnwajLYIUIXs4FUaIgQr7SUvbh_aLJZJ56Y1XlnU5UZVyF03KpM33Y68S3LF7R2d5Cwg8Pvb166DfwJA3ahdZ6sQO99npWvUUg0-rdqJ13HanxQQ
  priority: 102
  providerName: ProQuest
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LbtQwFL0q0wWwoDzFQEFesKLyNHEcx2ZXoZYKiQokRiqryI-4RU0zo0lGLaz6IfBz_RJsx5kCQkVILLKI_EhsX9vH8r3nALwQuZCq4ClOtc0xpURiyW2GGTNUMUZTI3008rsDtj-lbw_zwzX4MMTCtFG1DUfeUM9VPBmuKL2gVFi9u4XUJ9tzY_tJz9l2689a3i3LPc5OsbgB6yx38HwE69OD9zufvMhcCJvOMxJvN_9Y7tf96Qp0ru5Jb8PNZTOXX85kXf-0Fe1twGJoRO-BcjJZdmqiv_7G7_hfW3kX7kTginZ6S7sHa1VzHzYGUQgU14gH0DjDQ6bqgotXg2YW6agchkIESYs-N8gh1RoHslZkl21lkHdUfYW8E_4RcpAUBR5tfBrUK5Csj2auHcen6PLi2xufsnvu_7q7vPj-EKZ7ux9f7-Mo6oA1ceAHS6aEUc5ErFHUHYeEzplOaWp5wXWi3ItyS5AsNONKFpmpsoxxV4hapUxu8-wRjJpZUz0GJBzaoMJVl1U5LUShCLFJZVIjCpKojI8hGYay1JHx3Atv1GU4-XBW9v1Zuv4MHKmlGMPLVZF5T_dxXebNwT7KOPPbkiTCQ-CMpGPYGob0KvmayrZWZvX3Tz_5p9xP4RYJNsNxWmzCqFssq2cOS3XqeZwdPwAYlBsv
  priority: 102
  providerName: Unpaywall
Title The detection of criminal groups in real-world fused data: using the graph-mining algorithm “GraphExtract”
URI https://link.springer.com/article/10.1186/s13388-018-0031-9
https://www.proquest.com/docview/2090575321
https://security-informatics.springeropen.com/track/pdf/10.1186/s13388-018-0031-9
UnpaywallVersion publishedVersion
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: KQ8
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: KQ8
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: M~E
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2190-8532
  dateEnd: 20181231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: BENPR
  dateStart: 20120201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: 8FG
  dateStart: 20120201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: Springer Open Access Hybrid - NESLI2 2011-2012
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: 40G
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://link.springer.com/
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Open Access Journals
  customDbUrl:
  eissn: 2190-8532
  dateEnd: 20181231
  omitProxy: true
  ssIdentifier: ssj0000702644
  issn: 2190-8532
  databaseCode: C24
  dateStart: 20121201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEBZNckh76CNt6DZp0KGnBFFblvXoLV12EwpZQslCejKSZSUBxxtiL20vJT-k-XP5JR1p5U0LJaUHDxhZMvjTeL5B80DoncqVNkKmJC1dThijmmjpMsK5ZYZzllrts5GPJvxwyj6d5qcxj7vto937I8nwpw5qLfn71ntTPvAKLtiJRK2gNaAf1PdrGMYUh_D7FYk38vEE868z_7RB98RyeRb6BK3Pmyv9_auu69_Mzfg5ehp5It5fAPsCPaqaDfSs78GAo0q-RA3gjG3VhYiqBs8cLmOjLhwSNlp80WAghjUJtVGxm7eVxT4u9AP2Me9nGBggDmWryWVoFoF1fTa7vujOL_Hdzc8DPzL61vlkqrub21doOh6dDA9J7KFASgpcg2hulDWAiLOGgfehypyXKUudFLJMDNwY0HgtSi6NFpmtsoxLmMScMTZ3ebaJVptZU71GWIFxZwqWy6qcCSUMpS6pbGqVoInJ5AAl_Vctylhg3Pe5qIvgaEheLIAoAIhQkrRQA7S7nHK1qK7x0MPbPVRFVLS2oInyjDOj6QDt9fDdDz-w2N4S4X-_-s1_rb2FHtOw2cA_F9totbueV2-BunRmB62w5ACkHINc-ziaHH_eCdvXSz4EefRjBCPTyfH-l1-Z8-4u
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELaq9lA48I9YKOADXKgs1onj2EgV4mfLlrYrhFqpt9Q_cUFKswvJqvTWB4FX4WH6JIy9zi5cllMPOURO4igz4_kmnpkPoWcyk0rnghJqXEYYSxRRwqWEc8s054xa5auR90d8eMg-HmVHK-h3Vwvj0yq7NTEs1HZs_D9yCNKlhxZpQl9PvhHPGuV3VzsKDRWpFexWaDEWCzt2y_MzCOGarZ33IO_nSbI9OHg3JJFlgJgEvDFRXEur4Z2d1QzwuTQZN5RRJ3Jh-hpONNiEyg0XWuWpLdOUC7iJOa1t5jxrBLiANZYyCcHf2tvB6NPn-V8eMCiPOOJ2KhX8ZeODQp8_BgcYFJH_OsQFyp1vzF5H69N6os7PVFX95fu2b6EbEbTiNzMtu41WyvoOutkRQuC4PtxFNSgdtmUb0rtqPHbYRNYwHKpHGvy1xoBSKxIatWI3bUqLfZLqK-wT8E8wwFEcemiT08BcgVV1AlJov5ziy4ufH_zI4EfrK7suL37dQ4dX8qnvo9V6XJcPEJaANJiEx6VlxnKZ6yRx_dJSK_Okr1PRQ_3uqxYmdjv3pBtVEaIewYuZIAoQROiPWsgeejG_ZTJr9bHs4o1OVEW0-qZY6GgPbXbiWwwvedjmXML_n_rh8qmfovXhwf5esbcz2n2EriVB0wSh-QZabb9Py8cAolr9JGoqRsdXbRx_APnzLs4
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9wwEB61VKLl0JaWii2U-sCpyCIPx7G5oS1b3uqhSNwiO44BKWRXJCvojR_S_jl-CWMnWVqpAvWQQ-TYkfLNaL7JvADWZSKVTkVIw9wmlLFIUSVsTDk3THPOQqNcNfLRMd89YfunyWk357Tus937kGRb0-C6NFXN5sTYVsUF36ydZ-WSsPBCqaTyObxgaNzcCIMhH85-sqA8O4PfRTP_ufNve_RAMmdx0QV4Oa0m6ue1Kss_TM_oLbzuOCPZbkFehGdF9Q7e9PMYSKee76FCzIkpGp9dVZGxJXk3tIv44o2aXFQESWJJfZ9UYqd1YYjLEd0iLv_9jCAbJL6FNb30gyOIKs_GVxfN-SW5u_31za3s3DSusOru9vcSnIx2fgx3aTdPgeYR8g6quJZGIzrWaIaeiMwTnocstCIVeaDxRqP2qzTnQqs0NkUcc4GbmNXaJDaJP8BcNa6KZSASDT2TeFxcJCyVqY4iGxQmNDKNAh2LAQT9V83yrtm4m3lRZt7pEDxrgcgQCN-eNJMD-DLbMmk7bTz28GoPVdYpXZ1FgXTsM47CAWz08D0sP3LYxgzhp1_98b_O_gzz37-OssO944MVeBV5uUO3PV2FueZqWnxCRtPoNS-195kO7nU
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LbtQwFL0q0wWwoDzFQEFesKLyNHEcx2ZXoZYKiQokRiqryI-4RU0zo0lGLaz6IfBz_RJsx5kCQkVILLKI_EhsX9vH8r3nALwQuZCq4ClOtc0xpURiyW2GGTNUMUZTI3008rsDtj-lbw_zwzX4MMTCtFG1DUfeUM9VPBmuKL2gVFi9u4XUJ9tzY_tJz9l2689a3i3LPc5OsbgB6yx38HwE69OD9zufvMhcCJvOMxJvN_9Y7tf96Qp0ru5Jb8PNZTOXX85kXf-0Fe1twGJoRO-BcjJZdmqiv_7G7_hfW3kX7kTginZ6S7sHa1VzHzYGUQgU14gH0DjDQ6bqgotXg2YW6agchkIESYs-N8gh1RoHslZkl21lkHdUfYW8E_4RcpAUBR5tfBrUK5Csj2auHcen6PLi2xufsnvu_7q7vPj-EKZ7ux9f7-Mo6oA1ceAHS6aEUc5ErFHUHYeEzplOaWp5wXWi3ItyS5AsNONKFpmpsoxxV4hapUxu8-wRjJpZUz0GJBzaoMJVl1U5LUShCLFJZVIjCpKojI8hGYay1JHx3Atv1GU4-XBW9v1Zuv4MHKmlGMPLVZF5T_dxXebNwT7KOPPbkiTCQ-CMpGPYGob0KvmayrZWZvX3Tz_5p9xP4RYJNsNxWmzCqFssq2cOS3XqeZwdPwAYlBsv
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+detection+of+criminal+groups+in+real-world+fused+data%3A+using+the+graph-mining+algorithm+%E2%80%9CGraphExtract%E2%80%9D&rft.jtitle=Security+informatics+%28Berlin%29&rft.au=Robinson%2C+David&rft.au=Scogings%2C+Chris&rft.date=2018-08-17&rft.pub=Springer+Berlin+Heidelberg&rft.eissn=2190-8532&rft.volume=7&rft.issue=1&rft_id=info:doi/10.1186%2Fs13388-018-0031-9&rft.externalDocID=10_1186_s13388_018_0031_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2190-8532&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2190-8532&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2190-8532&client=summon