[HTML][HTML] Reprint of: Using social network analysis to study crime: Navigating the challenges of criminal justice records

D Bright, R Brewer, C Morselli - Social Networks, 2022 - Elsevier
The use of social network analysis to study groups of offenders engaged in illicit activities
such as drug trafficking and terrorism has grown in popularity over the last three decades …

Swarm intelligence-based algorithms within IoT-based systems: A review

O Zedadra, A Guerrieri, N Jouandeau… - Journal of Parallel and …, 2018 - Elsevier
IoT-based systems are complex and dynamic aggregations of entities (Smart Objects) which
usually lack decentralized control. Swarm Intelligence systems are decentralized, self …

Robust link prediction in criminal networks: A case study of the Sicilian Mafia

F Calderoni, S Catanese, P De Meo, A Ficara… - Expert Systems with …, 2020 - Elsevier
Link prediction exercises may prove particularly challenging with noisy and incomplete
networks, such as criminal networks. Also, the link prediction effectiveness may vary across …

Contagion dynamics of extremist propaganda in social networks

E Ferrara - Information Sciences, 2017 - Elsevier
Recent terrorist attacks carried out on behalf of ISIS on American and European soil by lone
wolf attackers or sleeper cells remind us of the importance of understanding the dynamics of …

Communities in criminal networks: A case study

F Calderoni, D Brunetto, C Piccardi - Social Networks, 2017 - Elsevier
Criminal organizations tend to be clustered to reduce risks of detection and information
leaks. Yet, the literature exploring the relevance of subgroups for their internal structure is so …

Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

L Cavallaro, A Ficara, P De Meo, G Fiumara… - Plos one, 2020 - journals.plos.org
Compared to other types of social networks, criminal networks present particularly hard
challenges, due to their strong resilience to disruption, which poses severe hurdles to Law …

A network approach to cartel detection in public auction markets

J Wachs, J Kertész - Scientific reports, 2019 - nature.com
Competing firms can increase profits by setting prices collectively, imposing significant costs
on consumers. Such groups of firms are known as cartels and because this behavior is …

Link and node removal in real social networks: a review

M Bellingeri, D Bevacqua, F Scotognella, R Alfieri… - Frontiers in …, 2020 - frontiersin.org
We review the main results from the literature on the consequences of link and node
removal in real social networks. We restrict our review to only those works that adopted the …

Mobile phone data: A survey of techniques, features, and applications

M Okmi, LY Por, TF Ang, CS Ku - Sensors, 2023 - mdpi.com
Due to the rapid growth in the use of smartphones, the digital traces (eg, mobile phone data,
call detail records) left by the use of these devices have been widely employed to assess …

Covert network construction, disruption, and resilience: a survey

A Ficara, F Curreri, G Fiumara, P De Meo, A Liotta - Mathematics, 2022 - mdpi.com
Covert networks refer to criminal organizations that operate outside the boundaries of the
law; they can be mainly classified as terrorist networks and criminal networks. We consider …