dc.contributor.author | Johnsen, Jan William | |
dc.contributor.author | Franke, Katrin | |
dc.date.accessioned | 2017-06-21T08:29:43Z | |
dc.date.available | 2017-06-21T08:29:43Z | |
dc.date.created | 2017-06-16T22:17:42Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Procedia Computer Science. 2017, 108 2388-2392. | nb_NO |
dc.identifier.issn | 1877-0509 | |
dc.identifier.uri | http://hdl.handle.net/11250/2446544 | |
dc.description.abstract | Organised criminal groups are moving more of their activities from traditionally physical crime into the cyber domain; where they form online communities that are used as marketplaces for illegal materials, products and services. The trading of illicit goods drives an underground economy by providing services that facilitate almost any type of cyber crime. The challenge for law enforcement agencies is to know which individuals to focus their efforts on, in order to effectively disrupting the services provided by cyber criminals. This paper present our study to assess graph-based centrality measures’ performance for identifying important individuals within a criminal network. These measures has previously been used on small and structured general social networks. In this study, we are testing the measures on a new dataset that is larger, loosely structured and resembles a network within cyber criminal forums. Our result shows that well established measures have weaknesses when applied to this challenging dataset. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Elsevier | nb_NO |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/deed.no | * |
dc.title | Feasibility Study of Social Network Analysis on Loosely Structured Communication Networks | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | publishedVersion | nb_NO |
dc.source.pagenumber | 2388-2392 | nb_NO |
dc.source.volume | 108 | nb_NO |
dc.source.journal | Procedia Computer Science | nb_NO |
dc.identifier.doi | 10.1016/j.procs.2017.05.172 | |
dc.identifier.cristin | 1476811 | |
dc.description.localcode | © 2017 The Authors. Published by Elsevier B.V. Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) | nb_NO |
cristin.unitcode | 194,18,21,80 | |
cristin.unitname | Norwegian Information Security Lab | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |