{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T23:45:05Z","timestamp":1750117505523,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284092","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"60-65","source":"Crossref","is-referenced-by-count":31,"title":["Structural analysis of online criminal social networks"],"prefix":"10.1109","author":[{"given":"Michael","family":"Yip","sequence":"first","affiliation":[]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Webber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1257\/jep.23.3.3"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.05.001"},{"key":"33","article-title":"An Investigation into Chinese Cybercrime and the Applicability of Social Network Analysis","author":"yip","year":"2011","journal-title":"ACM Web Science Conference 2011 14-17 June 2011 Koblenz Germany"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354713842"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565058"},{"key":"13","first-page":"43","article-title":"Mapping Networks of Terrorist Cells","volume":"24","author":"krebs","year":"2001","journal-title":"Connections"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367620"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1257\/aer.97.3.890"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026126"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","author":"newman","year":"2010","journal-title":"Networks An Introduction"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.032085699"},{"key":"24","first-page":"375","article-title":"Data Breaches: What the underground world of 'carding' reveals","volume":"25","author":"peretti","year":"2008","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026112"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2006.05.049"},{"key":"27","first-page":"7","article-title":"The underground economy?: Priceless","volume":"31","author":"thomas","year":"2006","journal-title":"USENIX Magazine"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.015101"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"3","article-title":"Reconstruction of Threaded Conversations in Online Discussion Forums","author":"aumayr","year":"0","journal-title":"International AAAI Conference on Weblogs and Social Media Fifth International AAAI Conference on Weblogs and Social Media 2011"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1093\/jb\/mvi094"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_3"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1038\/nphys209"},{"key":"6","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","article-title":"Power-Law Distributions in Empirical Data","volume":"51","author":"clauset","year":"2009","journal-title":"SIAM Review"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1400181.1400198"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"31","first-page":"958","article-title":"Untangling Criminal Networks: A Case Study","volume":"2665","author":"xu","year":"2003","journal-title":"ISIT 2003"},{"key":"4","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of Scaling in Random Networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"journal-title":"Darkmarket Cyberthieves Cybercops and You","year":"2011","author":"glenny","key":"9"},{"key":"8","first-page":"375","article-title":"An inquiry into the nature and causes of the wealth of internet miscreants","author":"franklin","year":"0","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security 2007"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","start":{"date-parts":[[2012,6,11]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284092.pdf?arnumber=6284092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:28:26Z","timestamp":1498001306000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284092","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}