A review of research in illicit supply-chain networks and new directions to thwart them

R Anzoom, R Nagi, C Vogiatzis - IISE Transactions, 2021 - Taylor & Francis
Illicit trades have emerged as a significant problem to almost every government across the
world. Their gradual expansion and diversification throughout the years suggests the …

[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions

J Moon, M Bukhari, C Kim, Y Nam, M Maqsood, S Rho - ICT Express, 2024 - Elsevier
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …

De-identification mechanism of user data in video systems according to risk level for preventing leakage of personal healthcare information

J Kim, N Park - Sensors, 2022 - mdpi.com
A problem with biometric information is that it is more sensitive to external leakage, because
it is information that cannot be changed immediately compared to general authentication …

Outlier mining in high-dimensional data using the jensen–shannon divergence and graph structure analysis

ASO Toledo, R Silini, LC Carpi… - Journal of Physics …, 2022 - iopscience.iop.org
Reliable anomaly/outlier detection algorithms have practical applications in many fields. For
instance, anomaly detection allows to filter and clean the data used to train machine …

The Multiplex Efficiency Index: unveiling the Brazilian air transportation multiplex network—BATMN

IM Oliveira, LC Carpi, APF Atman - Scientific reports, 2020 - nature.com
Modern society is increasingly massively connected, reflecting an omnipresent tendency to
organize social, economic, and technological structures in complex networks. Recently, with …

[PDF][PDF] Netwerken van netwerken in transit

V Dirksen, W van der Leest… - Tijdschrift voor …, 2021 - tijdschriften.boomcriminologie.nl
In dit artikel beschrijven wij nieuwe kenmerken van de tot nu toe onderbelichte
doorvoerhandel van cocaïne via Nederland. Op basis van een diversiteit aan bronnen …

Multiplex key roles to disrupt criminal networks

ASO Toledo, LC Carpi, APF Atman… - Social Network Analysis …, 2023 - Springer
The realization that society is structured in the form of networks caused a profound change
in the techniques and approaches applied in different areas of science. This impact is …

[PDF][PDF] Analyzing Crime Networks: A Complex Network-Based Approach

HB Sultan, BM Mahmood - AL-Rafidain Journal of Computer Sciences and …, 2021 - iasj.net
This article analyzed the crime network of Nineveh province based on the concepts of
Complex Networks. To this end, two networks were created; the first represented the crimes …

A IMPLEMENTAÇÃO DE TÉCNICAS DE MINERAÇÃO DE DADOS NA ÁREA DE CONTROLE EXTERNO DAS CONTAS PÚBLICAS

MPS da Rosa, AJ Rover, EL Schnitzler… - REVISTA …, 2023 - ojs.focopublicacoes.com.br
O presente artigo apresenta uma pesquisa realizada, a partir de uma revisão sistemática de
literatura, na base de dados Scopus, baseada nas técnicas de mineração de dados, com o …

[PDF][PDF] Nederlandse hennep van Spaanse bodem: De betrokkenheid van Nederlanders bij de georganiseerde hennepteelt in Spanje

I Vermeulen, T Chessa - researchgate.net
Nederland is een internationale hub voor de productie en handel van illegale drugs. Er is
vraag naar de in Nederland geproduceerde en door Nederland gevoerde drugs bij …