Introduction to algorithms
Analysis of shortest-path routing algorithms in a dynamic network environment
ACM SIGCOMM Computer Communication Review
The one-to-one shortest-path problem: an empirical analysis with the two-tree Dijkstra algorithm
Computational Optimization and Applications
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Comparing noun phrasing techniques for use with medical digital library tools
Journal of the American Society for Information Science - Special topic issue on digital libraries: part 2
Communications of the ACM
Pseudo approximation algorithms, with applications to optimal motion planning
Proceedings of the eighteenth annual symposium on Computational geometry
Extracting meaningful entities from police narrative reports
dg.o '02 Proceedings of the 2002 annual national conference on Digital government research
A neural network for shortest path computation
IEEE Transactions on Neural Networks
Visualization in law enforcement
CHI '05 Extended Abstracts on Human Factors in Computing Systems
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Topological analysis of criminal activity networks in multiple jurisdictions
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Social Network Discovery by Mining Spatio-Temporal Events
Computational & Mathematical Organization Theory
Mining communities and their relationships in blogs: A study of online hate groups
International Journal of Human-Computer Studies
Automated criminal link analysis based on domain knowledge: Research Articles
Journal of the American Society for Information Science and Technology
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
Comparing Two Models for Terrorist Group Detection: GDM or OGDM?
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Using importance flooding to identify interesting networks of criminal activity
Journal of the American Society for Information Science and Technology
Efficient Privacy-Preserving Link Discovery
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Analysis of terrorist social networks with fractal views
Journal of Information Science
Using an edge-dual graph and k-connectivity to identify strong connections in social networks
Proceedings of the 46th Annual Southeast Regional Conference on XX
A bio-inspired crime simulation model
Decision Support Systems
Topological analysis of criminal activity networks: enhancing transportation security
IEEE Transactions on Intelligent Transportation Systems
PerpSearch: an integrated crime detection system
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Dynamic core detection in social network analysis
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7
Knowledge management technology for organized crime risk assessment
Information Systems Frontiers
Derived types in semantic association discovery
Journal of Intelligent Information Systems
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Decision Support Systems
Biometric keypads: Improving accuracy through optimal PIN selection
Decision Support Systems
CrimeWalker: a recommendation model for suspect investigation
Proceedings of the fifth ACM conference on Recommender systems
Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches
International Journal of Electronic Commerce
Using importance flooding to identify interesting networks of criminal activity
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Community detection based on a semantic network
Knowledge-Based Systems
Link analysis tools for intelligence and counterterrorism
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Combined detection model for criminal network detection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
A framework for exploring organizational structure in dynamic social networks
Decision Support Systems
A query based approach for mining evolving graphs
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
An analyst-adaptive approach to focused crawlers
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Information Sciences: an International Journal
Hi-index | 0.00 |
Effective and efficient link analysis techniques are needed to help law enforcement and intelligence agencies fight organized crimes such as narcotics violation, terrorism, and kidnapping. In this paper, we propose a link analysis technique that uses shortest-path algorithms, priority-first-search (PFS) and two-tree PFS, to identify the strongest association paths between entities in a criminal network. To evaluate effectiveness, we compared the PFS algorithms with crime investigators' typical association-search approach, as represented by a modified breadth-first-search (BFS). Our domain expert considered the association paths identified by PFS algorithms to be useful about 70% of the time, whereas the modified BFS algorithm's precision rates were only 30% for a kidnapping network and 16.7% for a narcotics network. Efficiency of the two-tree PFS was better for a small, dense kidnapping network, and the PFS was better for the large, sparse narcotics network.