Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia
Compared to other types of social networks, criminal networks present particularly hard
challenges, due to their strong resilience to disruption, which poses severe hurdles to Law …
challenges, due to their strong resilience to disruption, which poses severe hurdles to Law …
Robust link prediction in criminal networks: A case study of the Sicilian Mafia
Link prediction exercises may prove particularly challenging with noisy and incomplete
networks, such as criminal networks. Also, the link prediction effectiveness may vary across …
networks, such as criminal networks. Also, the link prediction effectiveness may vary across …
Map** the market for remanufacturing: An application of “Big Data” analytics
Remanufacturing is one of the most examined topics in the closed-loop supply chain (CLSC)
literature. However, we still have limited knowledge on the characteristics of the market for …
literature. However, we still have limited knowledge on the characteristics of the market for …
Social network analysis of Sicilian Mafia interconnections
In this paper, we focus on the study of Sicilian Mafia organizations through Social Network
Analysis. We analyse datasets reflecting two different Mafia Families, based on …
Analysis. We analyse datasets reflecting two different Mafia Families, based on …
Multilayer network analysis: the identification of key actors in a Sicilian Mafia operation
Abstract Recently, Social Network Analysis studies have led to an improvement and to a
generalization of existing tools to networks with multiple subsystems and layers of …
generalization of existing tools to networks with multiple subsystems and layers of …
Game of Thieves and WERW-Kpath: Two novel measures of node and edge centrality for Mafia networks
Real-world complex systems can be modeled as homogeneous or heterogeneous graphs
composed by nodes connected by edges. The importance of nodes and edges is formally …
composed by nodes connected by edges. The importance of nodes and edges is formally …
The (not so) critical nodes of criminal networks
One of the most basic question in the analysis of social networks is to find nodes that are of
particular relevance in the network. The answer that emerged in the recent literature is that …
particular relevance in the network. The answer that emerged in the recent literature is that …
Social Data Mining for Crime Intelligence: Contributions to Social Data Quality Assessment and Prediction Methods
H Isah - 2017 - bradscholars.brad.ac.uk
With the advancement of the Internet and related technologies, many traditional crimes have
made the leap to digital environments. The successes of data mining in a wide variety of …
made the leap to digital environments. The successes of data mining in a wide variety of …
[PDF][PDF] Ontology-based framework applied to money laundering investigations
Criminal investigations face a deluge of structured and unstructured data obtained from
heterogeneous sources like forensic reports or wiretap transcriptions. In these cases, finding …
heterogeneous sources like forensic reports or wiretap transcriptions. In these cases, finding …
Social network analysis approaches to study crime
A Ficara - 2022 - tesidottorato.depositolegale.it
Abstract Social Network Analysis (SNA) studies groups of individuals and can be applied in
a lot of areas such us organizational studies, psychology, economics, information science …
a lot of areas such us organizational studies, psychology, economics, information science …