{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:51:49Z","timestamp":1725551509607},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642120787"},{"type":"electronic","value":"9783642120794"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12079-4_49","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T14:50:56Z","timestamp":1270651856000},"page":"390-397","source":"Crossref","is-referenced-by-count":8,"title":["A Social Network Analysis Approach to Detecting Suspicious Online Financial Activities"],"prefix":"10.1007","author":[{"given":"Lei","family":"Tang","sequence":"first","affiliation":[]},{"given":"Geoffrey","family":"Barbier","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Managing and Mining Graph Data","year":"2010","key":"49_CR1","unstructured":"Aggarwal, C., Wang, H. (eds.): Managing and Mining Graph Data. Springer, Heidelberg; Expected in early 2010"},{"issue":"3","key":"49_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10588-005-5381-4","volume":"11","author":"A. Chapanond","year":"2005","unstructured":"Chapanond, A., Krishnamoorthy, M.S., Yener, B.: Graph theoretic and spectral analysis of enron email data. Comput. Math. Organ. Theory\u00a011(3), 265\u2013281 (2005)","journal-title":"Comput. Math. Organ. Theory"},{"issue":"3","key":"49_CR3","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10588-005-5377-0","volume":"11","author":"J. Diesner","year":"2005","unstructured":"Diesner, J., Frantz, T.L., Carley, K.M.: Communication networks from the enron email corpus \u201cit\u2019s always about the people. enron is no different\u201d. Comput. Math. Organ. Theory\u00a011(3), 201\u2013228 (2005)","journal-title":"Comput. Math. Organ. Theory"},{"key":"49_CR4","unstructured":"FinCen. The SAR activity review: the trends, tips, and issues (October 2007), \n                  \n                    http:\/\/www.fincen.gov\/sarreviewissue12.pdf"},{"key":"49_CR5","unstructured":"FinCen. The SAR activity review - by the numbers (June 2009)"},{"key":"49_CR6","unstructured":"Jonas, J., Harper, J.: Effective counterterrorism and the limited role of predictive data mining. Policy Analysis\u00a011 (2006)"},{"key":"49_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-540-30115-8_22","volume-title":"Machine Learning: ECML 2004","author":"B. Klimat","year":"2004","unstructured":"Klimat, B., Yang, Y.: The enron corpus: A new dataset for email classification research. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) ECML 2004. LNCS (LNAI), vol.\u00a03201, pp. 217\u2013226. Springer, Heidelberg (2004)"},{"key":"49_CR8","unstructured":"O\u2019Hare, P.: Facebook boaster robbed of pounds 30,000; conmen use details off net. Daily Record, p. 23 (April 2008)"},{"issue":"3","key":"49_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10588-005-5378-z","volume":"11","author":"C. Priebe","year":"2005","unstructured":"Priebe, C., Conroy, J., Marchette, D., Park, Y.: Scan statistics on enron graphs. Computational & Mathematical Organization Theory\u00a011(3), 229\u2013247 (2005)","journal-title":"Computational & Mathematical Organization Theory"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1134271.1134282","volume-title":"LinkKDD 2005: Proceedings of the 3rd international workshop on Link discovery","author":"J. Shetty","year":"2005","unstructured":"Shetty, J., Adibi, J.: Discovering important nodes through graph entropy the case of enron email database. In: LinkKDD 2005: Proceedings of the 3rd international workshop on Link discovery, pp. 74\u201381. ACM, New York (2005)"},{"key":"49_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"issue":"6","key":"49_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J. Xu","year":"2005","unstructured":"Xu, J., Chen, H.: Criminal network analysis and visualization. Commun. ACM\u00a048(6), 100\u2013107 (2005)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Social Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12079-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:00:23Z","timestamp":1558288823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12079-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642120787","9783642120794"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12079-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}