{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T09:25:58Z","timestamp":1775553958922,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/pacificvis.2011.5742391","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T10:43:41Z","timestamp":1302173021000},"page":"203-210","source":"Crossref","is-referenced-by-count":33,"title":["An advanced network visualization system for financial crime detection"],"prefix":"10.1109","author":[{"given":"Walter","family":"Didimo","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Liotta","sequence":"additional","affiliation":[]},{"given":"Fabrizio","family":"Montecchiani","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Palladino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"westphal","year":"2009","journal-title":"Data Mining for Intelligence, Fraud &amp; Criminal Detection"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2004.43"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/230562.230577"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578008"},{"key":"ref31","first-page":"296","article-title":"Structural analysis and destabilizing terrorist networks","author":"memon","year":"2006","journal-title":"DMIN"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/9\/6\/188"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12079-4_49"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009760732249"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500180"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(83)90028-X"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500172"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056893"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/602421.602441"},{"key":"ref13","author":"di battista","year":"1999","journal-title":"Graph Drawing Prentice Hall"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.40"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1842993.1843073"},{"key":"ref16","first-page":"35","author":"didimo","year":"2007","journal-title":"Mining Graph Data Chapter Graph Visualization and Data Mining"},{"key":"ref17","first-page":"73","article-title":"A system for graph clustering based on user hints","volume":"2","author":"do nascimento","year":"2001","journal-title":"Selected papers from Pan-Sydney Area Workshop on Visual Information Processing (VIP2000)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.11.017"},{"key":"ref19","article-title":"k-core organization of complex networks","author":"dorogovtsev","year":"2005","journal-title":"CoRR abs\/cond-mat\/0509102"},{"key":"ref28","article-title":"k-core (boot-strap) percolation on complex networks: Critical phenomena and nonlocal effects","author":"goltsev","year":"2006","journal-title":"CoRR abs\/cond-mat\/0602611"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.34"},{"key":"ref27","first-page":"136","article-title":"Restructuring databases for knowledge discovery by consolidation and link formation","author":"goldberg","year":"1995","journal-title":"Proceedings of the First International Conference on Knowledge Discovery and Data Mining"},{"key":"ref3","first-page":"17","article-title":"Security works","volume":"38","author":"anderson","year":"1994","journal-title":"Security Management"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PACIFICVIS.2010.5429591"},{"key":"ref29","first-page":"53","article-title":"The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investi-gators? Recent developments in the netherlands","volume":"24","author":"klerks","year":"2001","journal-title":"Connections"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2003.1249011"},{"key":"ref8","first-page":"35","article-title":"The evolution of sparse graphs","author":"bollob\u00e1s","year":"1984","journal-title":"Graph Theory and Combinatorics"},{"key":"ref7","first-page":"90","article-title":"Partitioning approach to visualization of large networks","volume":"1731","author":"batagelj","year":"1999","journal-title":"GD 1999"},{"key":"ref2","first-page":"498","article-title":"Prediction of Protein Functions Based on K-Cores of Protein-Protein Interaction Networks and Amino Acid Sequences","volume":"14","author":"altaf-ul-amin","year":"2003","journal-title":"Genome Informatics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00055"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.120"},{"key":"ref20","first-page":"149","article-title":"A heuristic for graph drawing","volume":"42","author":"eades","year":"1984","journal-title":"Congressus Numerantium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63938-1_77"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref23","year":"2003","journal-title":"FinCEN - United States Department of the Treasury Guidance on preparing a complete & sufficient suspicious activity report narrative"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2004.18"}],"event":{"name":"2011 IEEE Pacific Visualization Symposium (PacificVis)","location":"Hong Kong, China","start":{"date-parts":[[2011,3,1]]},"end":{"date-parts":[[2011,3,4]]}},"container-title":["2011 IEEE Pacific Visualization Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5738441\/5742354\/05742391.pdf?arnumber=5742391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:50:15Z","timestamp":1490079015000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5742391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/pacificvis.2011.5742391","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}