Vis enkel innførsel

dc.contributor.authorJohnsen, Jan William
dc.contributor.authorFranke, Katrin
dc.date.accessioned2019-04-04T10:23:24Z
dc.date.available2019-04-04T10:23:24Z
dc.date.created2018-11-14T12:52:08Z
dc.date.issued2018
dc.identifier.citationLecture Notes in Computer Science. 2018, 10862 LNCS 379-386.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2593268
dc.description.abstractTraditional organised criminal groups are becoming more active in the cyber domain. They form online communities and use these as marketplaces for illegal materials, products and services, which drives the Crime as a Service business model. The challenge for law enforcement of investigating and disrupting the underground marketplaces is to know which individuals to focus effort on. Because taking down a few high impact individuals can have more effect on disrupting the criminal services provided. This paper present our study on social network centrality measures’ performance for identifying important individuals in two networks. We focus our analysis on two distinctly different network structures: Enron and Nulled.IO. The first resembles an organised criminal group, while the latter is a more loosely structured hacker forum. Our result show that centrality measures favour individuals with more communication rather than individuals usually considered more important: organised crime leaders and cyber criminals who sell illegal materials, products and services.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleIdentifying Central Individuals in Organised Criminal Groups and Underground Marketplacesnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber379-386nb_NO
dc.source.volume10862 LNCSnb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-319-93713-7_31
dc.identifier.cristin1630453
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [Lecture Notes in Computer Science] Locked until 12.6.2019 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-93713-7_31nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel