{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:24:28Z","timestamp":1757618668248,"version":"3.44.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T00:00:00Z","timestamp":1752105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Swiss Federal Institute of Technology Zurich"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The digitalization and automation of anti-financial crime (AFC) investigations has made significant progress in recent years. However, key challenges remain\u2014in particular, the need for interpretability in the output of AI models and the limited availability of labeled data for training. Criminal activity in transaction networks often involves complex, evolving patterns specifically designed to evade detection. We introduce FlowSeries, a top-down flow analysis methodology to explore transaction data and analyze complex interaction patterns over time. Rather than relying on pre-defined patterns or labeled training data, our approach scales to large transaction volumes and provides interpretable insights into anomalous behaviors, aiding AFC analysts in their investigations. We evaluate the effectiveness of this method using a dataset provided by the bank Intesa Sanpaolo (ISP), comprising 80 million cross-border transactions over a 15-month period. In collaboration with ISP\u2019s AFC experts, our analysis focuses on detecting anomalous transactions and identifying suspicious actors in the context of the economic sanctions imposed on Russia following its invasion of Ukraine on February 24th, 2022.<\/jats:p>","DOI":"10.1007\/s41109-025-00711-0","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T10:03:01Z","timestamp":1752141781000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FlowSeries: flow analysis on financial networks"],"prefix":"10.1007","volume":"10","author":[{"given":"Arthur","family":"Capozzi","sequence":"first","affiliation":[]},{"given":"Salvatore","family":"Vilella","sequence":"additional","affiliation":[]},{"given":"Dario","family":"Moncalvo","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Fornasiero","sequence":"additional","affiliation":[]},{"given":"Valeria","family":"Ricci","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Ronchiadin","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Ruffo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"711_CR1","unstructured":"AP (2023) New US sanctions target people and companies in Turkey, Georgia and Russia. Accessed 14 Sept 2023. https:\/\/www.euronews.com\/business\/2023\/09\/14\/new-us-sanctions-target-people-and-companies-in-turkey-georgia-and-russia"},{"key":"711_CR2","unstructured":"Bank EC (2021) Payments statistics: 2020. Accessed 28 Mar 2025. https:\/\/www.ecb.europa.eu\/press\/stats\/paysec\/html\/ecb.pis20205d0ea9dfa5.en.html"},{"issue":"3","key":"711_CR3","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton RJ, Hand DJ (2002) Statistical fraud detection: a review. Stat Sci 17(3):235\u2013249","journal-title":"Stat Sci"},{"key":"711_CR4","volume-title":"Time series analysis: forecasting and control","author":"GE Box","year":"2015","unstructured":"Box GE, Jenkins GM, Reinsel GC, Ljung GM (2015) Time series analysis: forecasting and control. Wiley, Hoboken"},{"key":"711_CR5","doi-asserted-by":"crossref","unstructured":"Caldarelli G, Battiston S, Garlaschelli D, Catanzaro M (2004) Emergence of complexity in financial networks, vol 650, pp 399\u2013423","DOI":"10.1007\/978-3-540-44485-5_18"},{"key":"711_CR6","doi-asserted-by":"crossref","unstructured":"Capozzi A, Vilella S, Moncalvo D, Fornasiero M, Ricci V, Ronchiadin S, Ruffo G (2024) Flowseries: anomaly detection in financial transaction flows. In: International conference on complex networks and their applications. Springer, pp 29\u201340","DOI":"10.1007\/978-3-031-82435-7_3"},{"key":"711_CR7","doi-asserted-by":"crossref","unstructured":"Capozzi A (2025) FlowSeries: flow analysis on financial networks\u2014GitHub Repository. Accessed 31 Mar 2025. https:\/\/github.com\/PotenteOpossum\/FlowSeries","DOI":"10.1007\/s41109-025-00711-0"},{"key":"711_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1144-z","author":"Z Chen","year":"2018","unstructured":"Chen Z, Le DV-K, Teoh E, Nazir A, Karuppiah E, Lam K (2018) Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowl Inf Syst. https:\/\/doi.org\/10.1007\/s10115-017-1144-z","journal-title":"Knowl Inf Syst"},{"key":"711_CR9","doi-asserted-by":"publisher","unstructured":"Didimo W, Liotta G, Montecchiani F, Palladino P (2011) An advanced network visualization system for financial crime detection, pp. 203\u2013210. https:\/\/doi.org\/10.1109\/PACIFICVIS.2011.5742391","DOI":"10.1109\/PACIFICVIS.2011.5742391"},{"key":"711_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.eap.2019.01.009","volume":"62","author":"M Faggini","year":"2019","unstructured":"Faggini M, Bruno B, Parziale A (2019) Crises in economic complex networks: black swans or dragon kings? Econ Anal Policy 62:105\u2013115. https:\/\/doi.org\/10.1016\/j.eap.2019.01.009","journal-title":"Econ Anal Policy"},{"key":"711_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"A Fronzetti Colladon","year":"2017","unstructured":"Fronzetti Colladon A, Remondi E (2017) Using social network analysis to prevent money laundering. Expert Syst Appl 67:49\u201358. https:\/\/doi.org\/10.1016\/j.eswa.2016.09.029","journal-title":"Expert Syst Appl"},{"key":"711_CR12","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-04-2020-0033","author":"O Garcia-Bedoya","year":"2020","unstructured":"Garcia-Bedoya O, Granados O, Burgos J (2020) Ai against money laundering networks: the Colombian case. J Money Laund Control Ahead-of-Print. https:\/\/doi.org\/10.1108\/JMLC-04-2020-0033","journal-title":"J Money Laund Control Ahead-of-Print"},{"issue":"4","key":"711_CR13","first-page":"159","volume":"239","author":"IG Garc\u00eda","year":"2021","unstructured":"Garc\u00eda IG, Mateos A (2021) Use of social network analysis for tax control in Spain. Hacienda P\u00fablica Espa\u00f1ola \/ Rev Public Econ 239(4):159\u2013197","journal-title":"Hacienda P\u00fablica Espa\u00f1ola \/ Rev Public Econ"},{"key":"711_CR14","doi-asserted-by":"publisher","first-page":"19161","DOI":"10.1109\/ACCESS.2018.2816564","volume":"6","author":"D Huang","year":"2018","unstructured":"Huang D, Mu D, Yang L, Cai X (2018) Codetect: financial fraud detection with anomaly feature detection. IEEE Access 6:19161\u201319174. https:\/\/doi.org\/10.1109\/ACCESS.2018.2816564","journal-title":"IEEE Access"},{"issue":"1","key":"711_CR15","doi-asserted-by":"publisher","DOI":"10.1063\/1.3683467","volume":"22","author":"T Kau\u00ea Dal\u2019Maso Peron","year":"2012","unstructured":"Kau\u00ea Dal\u2019Maso Peron T, Fontoura Costa L, Rodrigues FA (2012) The structure and resilience of financial market networks. Chaos Interdiscip J Nonlinear Sci 22(1):013117. https:\/\/doi.org\/10.1063\/1.3683467","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"711_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101474","volume":"47","author":"A Kumar Dubey","year":"2021","unstructured":"Kumar Dubey A, Kumar A, Garc\u00eda-D\u00edaz V, Kumar Sharma A, Kanhaiya K (2021) Study and analysis of sarima and lstm in forecasting time series data. Sustain Energy Technol Assess 47:101474. https:\/\/doi.org\/10.1016\/j.seta.2021.101474","journal-title":"Sustain Energy Technol Assess"},{"key":"711_CR17","doi-asserted-by":"publisher","first-page":"82300","DOI":"10.1109\/ACCESS.2021.3086230","volume":"9","author":"DV Kute","year":"2021","unstructured":"Kute DV, Pradhan B, Shukla N, Alamri A (2021) Deep learning and explainable artificial intelligence techniques applied for detecting money laundering\u2014a critical review. IEEE Access 9:82300\u201382317. https:\/\/doi.org\/10.1109\/ACCESS.2021.3086230","journal-title":"IEEE Access"},{"issue":"3","key":"711_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0018443","volume":"6","author":"K-M Lee","year":"2011","unstructured":"Lee K-M, Yang J-S, Kim G, Lee J, Goh K-I, Kim I (2011) Impact of the topology of global macroeconomic network on the spreading of economic crises. PLoS ONE 6(3):1\u201311. https:\/\/doi.org\/10.1371\/journal.pone.0018443","journal-title":"PLoS ONE"},{"issue":"2","key":"711_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.11130\/jei.2011.26.2.197","volume":"26","author":"A Leila","year":"2011","unstructured":"Leila A (2011) Global crises: a network perspective on the economic integration. J Econ Integr 26(2):197\u2013216x","journal-title":"J Econ Integr"},{"issue":"4","key":"711_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/10\/4\/043019","volume":"10","author":"F Lillo","year":"2008","unstructured":"Lillo F, Moro E, Vaglica G, Mantegna RN (2008) Specialization and herding behavior of trading firms in a financial market. New J Phys 10(4):043019. https:\/\/doi.org\/10.1088\/1367-2630\/10\/4\/043019","journal-title":"New J Phys"},{"issue":"11","key":"711_CR21","doi-asserted-by":"publisher","first-page":"2737","DOI":"10.1109\/TCSII.2020.2968376","volume":"67","author":"D Lin","year":"2020","unstructured":"Lin D, Wu J, Yuan Q, Zheng Z (2020) Modeling and understanding ethereum transaction records via a complex network approach. IEEE Trans Circuits Syst II Express Briefs 67(11):2737\u20132741. https:\/\/doi.org\/10.1109\/TCSII.2020.2968376","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"711_CR22","doi-asserted-by":"publisher","unstructured":"Liu Z, Zhou D, Zhu Y, Gu J, He J (2020) Towards fine-grained temporal network representation via time-reinforced random walk. In: Proceedings of the AAAI conference on artificial intelligence, vol 34, No. 04, pp 4973\u20134980. https:\/\/doi.org\/10.1609\/aaai.v34i04.5936","DOI":"10.1609\/aaai.v34i04.5936"},{"issue":"3","key":"711_CR23","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1016\/S0378-4371(02)01867-8","volume":"324","author":"L L\u00f3pez","year":"2003","unstructured":"L\u00f3pez L, Almendral AJ, Sanju\u00e1in MAF (2003) Complex networks and the www market. Physica A Stat Mech Appl 324(3):754\u2013758. https:\/\/doi.org\/10.1016\/S0378-4371(02)01867-8","journal-title":"Physica A Stat Mech Appl"},{"issue":"7","key":"711_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/7\/075037","volume":"12","author":"G-H Mu","year":"2010","unstructured":"Mu G-H, Zhou W-X, Chen W, Kert\u00e9sz J (2010) Order flow dynamics around extreme price changes on an emerging stock market. New J Phys 12(7):075037. https:\/\/doi.org\/10.1088\/1367-2630\/12\/7\/075037","journal-title":"New J Phys"},{"key":"711_CR25","doi-asserted-by":"publisher","unstructured":"Pan J (2022) Deep set classifier for financial forensics: an application to detect money laundering. arXiv. https:\/\/doi.org\/10.48550\/ARXIV.2207.07863","DOI":"10.48550\/ARXIV.2207.07863"},{"key":"711_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2020.112831","volume":"376","author":"T Papadimitriou","year":"2020","unstructured":"Papadimitriou T, Gogas P, Gkatzoglou F (2020) The evolution of the cryptocurrencies market: a complex networks approach. J Comput Appl Math 376:112831. https:\/\/doi.org\/10.1016\/j.cam.2020.112831","journal-title":"J Comput Appl Math"},{"key":"711_CR27","unstructured":"Phua C, Lee VCS, Smith-Miles K, Gayler RW (2010) A comprehensive survey of data mining-based fraud detection research. CoRR arXiv:1009.6119"},{"issue":"4","key":"711_CR28","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1257\/jel.39.4.1177","volume":"39","author":"JE Rauch","year":"2001","unstructured":"Rauch JE (2001) Business and social networks in international trade. J Econ Lit 39(4):1177\u20131203. https:\/\/doi.org\/10.1257\/jel.39.4.1177","journal-title":"J Econ Lit"},{"key":"711_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-020-00314-x","author":"A Semeraro","year":"2020","unstructured":"Semeraro A, Tambuscio M, Ronchiadin S, Puma L, Ruffo G (2020) Structural inequalities emerging from a large wire transfers network. Appl Netw Sci. https:\/\/doi.org\/10.1007\/s41109-020-00314-x","journal-title":"Appl Netw Sci"},{"key":"711_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01220-4","author":"L Serena","year":"2022","unstructured":"Serena L, Ferretti S, D\u2019Angelo G (2022) Cryptocurrencies activity as a complex network: Analysis of transactions graphs. Peer-to-Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-021-01220-4","journal-title":"Peer-to-Peer Netw Appl"},{"key":"711_CR31","doi-asserted-by":"publisher","unstructured":"Shun J, Dhulipala L, Blelloch GE (2015) Smaller and faster: parallel processing of compressed graphs with ligra+. In: 2015 data compression conference, pp 403\u2013412. https:\/\/doi.org\/10.1109\/DCC.2015.8","DOI":"10.1109\/DCC.2015.8"},{"key":"711_CR32","doi-asserted-by":"publisher","unstructured":"Tarjan R (1971) Depth-first search and linear graph algorithms. In: 12th annual symposium on switching and automata Theory (swat 1971), pp 114\u2013121. https:\/\/doi.org\/10.1109\/SWAT.1971.10","DOI":"10.1109\/SWAT.1971.10"},{"key":"711_CR33","unstructured":"Times F (2023) Armenia: on the new silk road for goods to sanctions-hit Russia. Accessed 18 July 2023. https:\/\/www.ft.com\/content\/0fc846f7-aac8-4a34-a7dd-3b0615bce983"},{"issue":"3","key":"711_CR34","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1088\/1469-7688\/1\/3\/308","volume":"1","author":"N Vandewalle","year":"2001","unstructured":"Vandewalle N, Brisbois F, Tordoir X (2001) Non-random topology of stock markets. Quant Finance 1(3):372\u2013374. https:\/\/doi.org\/10.1088\/1469-7688\/1\/3\/308","journal-title":"Quant Finance"},{"key":"711_CR35","doi-asserted-by":"publisher","unstructured":"Vilella S, Lupi A, Fornasiero M, Moncalvo D, Ricci V, Ronchiadin S, Ruffo G (2025) Weirdnodes: centrality based anomaly detection on temporal networks for the anti-financial crime domain. Appl Netw Sci 10:14. https:\/\/doi.org\/10.1007\/s41109-025-00702-1","DOI":"10.1007\/s41109-025-00702-1"},{"key":"711_CR36","unstructured":"Wagner R (2023) Higher German exports to Russia\u2019s neighbours fuel sanctions evasion fears. Accessed 17 May 2023. https:\/\/www.reuters.com\/world\/german-exports-russias-neighbours-fuel-sanctions-evasion-fears-2023-05-16\/"},{"key":"711_CR37","unstructured":"Warrick J (2023) In Central Asia, a hidden pipeline supplies Russia with banned tech. Accessed 18 July 2023. https:\/\/www.washingtonpost.com\/national-security\/2023\/07\/18\/russia-sanctions-weapons-china-drones\/"},{"key":"711_CR38","unstructured":"Weber M, Chen J, Suzumura T, Pareja A, Ma T, Kanezashi H, Kaler T, Leiserson CE, Schardl TB (2018) Scalable graph learning for anti-money laundering: a first look. CoRR arxiv:1812.00076"},{"issue":"4","key":"711_CR39","doi-asserted-by":"publisher","first-page":"48002","DOI":"10.1209\/0295-5075\/107\/48002","volume":"107","author":"X-G Yan","year":"2014","unstructured":"Yan X-G, Xie C, Wang G-J (2014) The stability of financial market networks. Europhys Lett 107(4):48002. https:\/\/doi.org\/10.1209\/0295-5075\/107\/48002","journal-title":"Europhys Lett"},{"issue":"1","key":"711_CR40","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/j.eswa.2010.07.143","volume":"38","author":"L \u0161ubelj","year":"2011","unstructured":"\u0161ubelj L, Furlan-Bajec M (2011) An expert system for detecting automobile insurance fraud using social network analysis. Expert Syst Appl 38(1):1039\u20131052. https:\/\/doi.org\/10.1016\/j.eswa.2010.07.143","journal-title":"Expert Syst Appl"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00711-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00711-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00711-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T03:57:31Z","timestamp":1757217451000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00711-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,10]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00711-0","relation":{},"ISSN":["2364-8228"],"issn-type":[{"type":"electronic","value":"2364-8228"}],"subject":[],"published":{"date-parts":[[2025,7,10]]},"assertion":[{"value":"31 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare(s) that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}