|
|
|
Efstathios Konstantinos Anastasiadis and Ioannis Antoniou
We extend network analysis to directed criminal networks in the context of asymmetric links. We computed selected centralities, centralizations and the assortativity of a drug trafficking network with 110 nodes and 295 edges. We also monitored the centra...
ver más
|
|
|
|
|
|
|
Annamaria Ficara, Giacomo Fiumara, Salvatore Catanese, Pasquale De Meo and Xiaoyang Liu
Traditional social network analysis can be generalized to model some networked systems by multilayer structures where the individual nodes develop relationships in multiple layers. A multilayer network is called multiplex if each layer shares at least on...
ver más
|
|
|
|
|
|
|
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i...
ver más
|
|
|
|
|
|
|
Ricardo Resende de Mendonça, Daniel Felix de Brito, Ferrucio de Franco Rosa, Júlio Cesar dos Reis and Rodrigo Bonacin
Criminals use online social networks for various activities by including communication, planning, and execution of criminal acts. They often employ ciphered posts using slang expressions, which are restricted to specific groups. Although literature shows...
ver más
|
|
|
|
|
|
|
Marcus Lim, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam
Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these networks tends to...
ver más
|
|
|
|
|
|
|
Nureni Ayofe Azeez, Tolulope Jide Ayemobola, Sanjay Misra, Rytis Maskeliunas and Robertas Dama?evicius
Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to ...
ver más
|
|
|
|
|
|
|
Justin Pierce,Ashley Jones,Matthew Warren
In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal h...
ver más
|
|
|
|