{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:53:22Z","timestamp":1773482002157,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,4,12]],"date-time":"2015-04-12T00:00:00Z","timestamp":1428796800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13388-015-0018-8","type":"journal-article","created":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T04:02:16Z","timestamp":1428724936000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Federated databases and actionable intelligence: using social network analysis to disrupt transnational wildlife trafficking criminal networks"],"prefix":"10.1186","volume":"4","author":[{"given":"Timothy C","family":"Haas","sequence":"first","affiliation":[]},{"given":"Sam M","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,12]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10393-010-0317-y","volume":"7","author":"GE Rosen","year":"2010","unstructured":"GE Rosen, KF Smith, Summarizing the evidence on the illegal international trade in wildlife. Ecohealth. 7, 24\u201332 (2010)","journal-title":"Ecohealth"},{"key":"18_CR2","volume-title":"Small arms availability, trade and impacts in the republic of Congo","author":"S Demetriou","year":"2002","unstructured":"S Demetriou, R Muggah, I Biddle, Small arms availability, trade and impacts in the republic of Congo (International Organization for Migration and the United Nations Development Programme, Geneva, Switzerland, 2002)"},{"key":"18_CR3","doi-asserted-by":"crossref","DOI":"10.5040\/9798216015512","volume-title":"Smuggling and trafficking in human beings: all roads lead to America","author":"SX Zhang","year":"2007","unstructured":"SX Zhang, Smuggling and trafficking in human beings: all roads lead to America (Praeger Publishers, Westport, United States, 2007)"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1080\/01639625.2010.483162","volume":"32","author":"N South","year":"2011","unstructured":"N South, T Wyatt, Comparing illicit trades in wildlife and drugs: an exploratory study. Deviant. Behavior. 32, 538\u2013561 (2011)","journal-title":"Deviant. Behavior."},{"key":"18_CR5","volume-title":"Green criminology and wildlife trafficking: the illegal fur and falcon trades in Russia Far East","author":"T Wyatt","year":"2012","unstructured":"T Wyatt, Green criminology and wildlife trafficking: the illegal fur and falcon trades in Russia Far East (LAP Lambert Academic Publishing, Saarbr\u00fccken, Germany, 2012)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Duffy R, St John FAV. Poverty, poaching and trafficking: What are the links. Evidence on Demand. 2013. http:\/\/dx.doi.org\/10.12774\/eod_hd059.jun2013.duffy . Accessed 19 Jan 2015.","DOI":"10.12774\/eod_hd059.jun2013.duffy"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10657-010-9203-x","volume":"32","author":"R Barone","year":"2011","unstructured":"R Barone, D Masciandaro, Organized crime, money laundering and legal economy: theory and simulations. European. J. Law. Economics. 32, 115\u2013142 (2011)","journal-title":"European. J. Law. Economics."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.ecolecon.2006.07.007","volume":"62","author":"R Damiana","year":"2007","unstructured":"R Damiana, EH Bulte, The economics of wildlife farming and endangered species conservation. Ecol. Econ. 62, 461\u2013472 (2007)","journal-title":"Ecol. Econ."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1111\/reel.12037","volume":"22","author":"PH Sand","year":"2013","unstructured":"PH Sand, Enforcing CITES: The rise and fall of trade sanctions. Rev. European. Int. Environ. Law. 22, 251\u2013263 (2013)","journal-title":"Rev. European. Int. Environ. Law."},{"key":"18_CR10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.69649\/pachyderm.v51i.290","volume":"51","author":"SM Ferreira","year":"2012","unstructured":"SM Ferreira, B Okita-Ouma, A proposed framework for short-, medium- and long-term responses by range States to curb poaching for African rhino horns. Pachyderm. 51, 60\u201374 (2012)","journal-title":"Pachyderm."},{"key":"18_CR11","first-page":"51","volume":"42","author":"L Moore","year":"2011","unstructured":"L Moore, The neoliberal elephant: exploring the impacts of the trade ban in ivory on the commodification and neoliberalisation of elephants. Geophys. J. Roy. Astron. Soc. 42, 51\u201360 (2011)","journal-title":"Geophys. J. Roy. Astron. Soc."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.1016\/j.ecolecon.2010.06.017","volume":"69","author":"KD Messer","year":"2010","unstructured":"KD Messer, Protecting endangered species: when are shoot-on-sight policies the only viable option to stop poaching? Ecol. Econ. 69, 2334\u20132340 (2010)","journal-title":"Ecol. Econ."},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1177\/1043986208318226","volume":"24","author":"JL Schneider","year":"2008","unstructured":"JL Schneider, Reducing the illicit trade in endangered wildlife: the market reduction approach. J. Contemporary. Criminal. Justice. 24, 274\u2013295 (2008)","journal-title":"J. Contemporary. Criminal. Justice."},{"key":"18_CR14","first-page":"e45989","volume":"7","author":"SM Ferreira","year":"2012","unstructured":"SM Ferreira, JM Botha, M Emmett, Anthropogenic influences on conservation values of white rhinos. Public. Library. Sc. ONE. 7, e45989 (2012). doi:10.1371\/ journal.pone.0045989","journal-title":"Public. Library. Sc. ONE."},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4102\/sajs.v108i7\/8.1338","volume":"108","author":"B Child","year":"2012","unstructured":"B Child, The sustainable use approach could save South Africa\u2019s rhinos. S. Afr. J. Sci. 108, 21\u201325 (2012)","journal-title":"S. Afr. J. Sci."},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1126\/science.1229998","volume":"339","author":"D Biggs","year":"2013","unstructured":"D Biggs, F Courchamp, R Martin, HP Possingham, Legal trade of Africa\u2019s rhino horns. Science 339, 1038\u20131039 (2013)","journal-title":"Science"},{"key":"18_CR17","volume-title":"Networks and netwars: the future of terror, crime and militancy","author":"P Williams","year":"2001","unstructured":"P Williams, Transnational criminal networks, in Networks and netwars: the future of terror, crime and militancy, ed. by J Arquilla, D Ronfeldt (RAND, Pittsburg, 2001)"},{"key":"18_CR18","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1017\/S1068280500003051","volume":"37","author":"P Ferrier","year":"2008","unstructured":"P Ferrier, Illicit agricultural trade. Agric. Resource. Econ. Rev. 37, 273\u2013287 (2008)","journal-title":"Agric. Resource. Econ. Rev."},{"key":"18_CR19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.18564\/jasss.2155","volume":"16","author":"E Catullo","year":"2013","unstructured":"E Catullo, An agent based model of monopolistic competition in international trade with emerging firm heterogeneity. J. Artificial. Societies. Social. Simulation. 16, 7 (2013)","journal-title":"J. Artificial. Societies. Social. Simulation."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2305\/IUCN.CH.2013.PARKS-19-1.ND.en","volume":"19","author":"N Dudley","year":"2013","unstructured":"N Dudley, S Stolton, W Elliott, Wildlife crime poses unique challenges to protected areas. PARKS. 19, 7\u201312 (2013)","journal-title":"PARKS."},{"key":"18_CR21","volume-title":"The South Africa-Viet Nam rhino horn trade nexus: a deadly combination of institutional lapses, corrupt wildlife industry professionals and Asian crime syndicates","author":"T Milliken","year":"2012","unstructured":"T Milliken, J Shaw, The South Africa-Viet Nam rhino horn trade nexus: a deadly combination of institutional lapses, corrupt wildlife industry professionals and Asian crime syndicates (TRAFFIC, Johannesburg, 2012)"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/08884310420001679334","volume":"17","author":"GL Warchol","year":"2004","unstructured":"GL Warchol, The transnational illegal wildlife trade. Criminal. Justice. Studies. Critical. J. Crime Law. Soc. 17, 57\u201373 (2004)","journal-title":"Criminal. Justice. Studies. Critical. J. Crime Law. Soc."},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/13880292.2013.764776","volume":"16","author":"J Ayling","year":"2013","unstructured":"J Ayling, What sustains wildlife crime? Rhino horn trading and the resilience of criminal networks. J. Int. Wildlife Law Policy. 16, 57\u201380 (2013)","journal-title":"J. Int. Wildlife Law Policy."},{"issue":"3","key":"18_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/96602.96604","volume":"22","author":"AP Sheth","year":"1990","unstructured":"AP Sheth, JA Larson, Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM. Comput. Surveys. (CSUR). 22(3), 183\u2013236 (1990). doi:10.1145\/96602.96604","journal-title":"ACM. Comput. Surveys. (CSUR)."},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/17440570701362208","volume":"8","author":"C Morselli","year":"2007","unstructured":"C Morselli, K Petit, Law enforcement disruption of a drug importation network. Global. Crime. 8, 109\u2013130 (2007)","journal-title":"Global. Crime."},{"key":"18_CR26","unstructured":"United Nations, Police information and intelligence systems. Office on Drugs and Crime (2006). http:\/\/www.unodc.org\/documents\/justice-and-prison-reform\/cjat_eng\/4_Police_Information_Intelligence_Systems.pdf . Accessed 26 March 2015."},{"key":"18_CR27","doi-asserted-by":"crossref","DOI":"10.4135\/9781412985864","volume-title":"Social network analyses","author":"D Knoke","year":"2008","unstructured":"D Knoke, S Yang, Social network analyses, 2nd edn. (Sage Publications, London, 2008)","edition":"2"},{"key":"18_CR28","doi-asserted-by":"publisher","first-page":"192","DOI":"10.3957\/056.041.0206","volume":"41","author":"S Ferreira","year":"2011","unstructured":"S Ferreira, CC Greaver, MH Knight, Assessing the population performance of the black rhinoceros in Kruger National Park. South. African. J. Wildlife. Res. 41, 192\u2013204 (2011)","journal-title":"South. African. J. Wildlife. Res."},{"key":"18_CR29","unstructured":"Maggs K. Rhino poaching in South Africa. K2C Rhino Forum Workshop, Hoedspruit, South Africa, 30 September 2011. https:\/\/www.environment.gov.za\/sites\/default\/files\/docs\/nationalrhino_conservation_hawks_sanparks_0.pdf . Accessed 26 March 2015."},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1093\/bjc\/azh053","volume":"45","author":"M Innes","year":"2005","unstructured":"M Innes, N Fielding, N Cope, The appliance of science? The theory and practice of crime intelligence analysis. British. J. Criminol. 45, 39\u201357 (2005)","journal-title":"British. J. Criminol."},{"key":"18_CR31","first-page":"15","volume":"2","author":"P Bell","year":"2013","unstructured":"P Bell, M Congram, Intelligence-Led policing (ILP) as a strategic planning resource in the fight against transnational organized crime (TOC). Int. J. Business. Commerce. 2, 15\u201328 (2013)","journal-title":"Int. J. Business. Commerce."},{"key":"18_CR32","first-page":"23","volume":"4","author":"K Faust","year":"1992","unstructured":"K Faust, S Wasserman, Centrality and prestige: a review and synthesis. J. Quantitative. Anthropol. 4, 23\u201378 (1992)","journal-title":"J. Quantitative. Anthropol."},{"key":"18_CR33","unstructured":"Axantum. AxCrypt - Password protect files with strong encryption. 2014. www.axantum.com\/AxCrypt\/Default.html . Accessed 28 Jan 2014."},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Haase P, Math a\u03b2 T, Ziller M. An evaluation of approaches to federated query processing over linked data. I-SEMANTICS\u201910 Proceedings of the 6th International Conference on Semantic Systems. Article No. 5, September 1\u20133, Graz, Austria.","DOI":"10.1145\/1839707.1839713"},{"key":"18_CR35","first-page":"1","volume":"24","author":"CT Butts","year":"2008","unstructured":"CT Butts, Social network analysis with sna. J. Stat. Software 24, 1\u201351 (2008). 2010. http:\/\/dl.acm.org\/citation.cfm?id=1839713 . Accessed 8 Nov 2013","journal-title":"J. Stat. Software"},{"key":"18_CR36","unstructured":"Mehta A, Williams D. SQL and Outlook: Enable database access and updates through exchange and any E-mail client. MSDN Magazine, Microsoft Corp. 2002. www.msdn.microsoft.com\/en-us\/magazine\/cc301799.aspx . Accessed 8 Nov 2013."},{"key":"18_CR37","unstructured":"IBM. i2 Analyst\u2019s Notebook. 2013. www.ibm.com\/software\/products\/en\/analysts-notebook . Accessed 24 December 2013."},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Bhattacharya I, Getoor L. Relational Clustering for Multi-type Entity Resolution. Proceedings of the Fourth International Workshop on Multi-Relational Data Mining (MRDM-2005), Aug 21, 2005, Chicago, 2005. http:\/\/www.umiacs.umd.edu\/~getoor\/Publications\/mrdm05.pdf . Accessed 26 March 2015.","DOI":"10.1145\/1090193.1090195"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Hull R. Managing semantic heterogeneity in databases: a theoretical perspective. PODS '97 Proceedings of the sixteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems. 1997. p. 51\u201361. http:\/\/groups.lis.illinois.edu\/amag\/langevgroup\/localpapers\/hull-managing-semantic-heterogeneity-pods-1997.pdf . Accessed 17 Jan 2015.","DOI":"10.1145\/263661.263668"},{"key":"18_CR40","volume-title":"Fighting crime together: The challenges of policing and security networks","author":"G Wardlaw","year":"2006","unstructured":"G Wardlaw, J Boughton, Intelligence-Led policing: the AFP approach, in Fighting crime together: The challenges of policing and security networks, ed. by J Fleming, J Woods (University of New South Wales Press, Sydney, Australia., 2006)"},{"key":"18_CR41","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.socnet.2006.05.001","volume":"29","author":"C Morselli","year":"2007","unstructured":"C Morselli, C Gigu\u00e8re, K Petit, The efficiency\/security trade-off in criminal networks. Social. Networks 29, 143\u2013153 (2007)","journal-title":"Social. Networks"},{"key":"18_CR42","first-page":"43","volume":"24","author":"VE Krebs","year":"2002","unstructured":"VE Krebs, Mapping networks of terrorist cells. Connections. 24, 43\u201352 (2002)","journal-title":"Connections."},{"key":"18_CR43","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.socnet.2004.11.008","volume":"27","author":"SP Borgatti","year":"2005","unstructured":"SP Borgatti, Centrality and network flow. Social. Networks. 27, 55\u201371 (2005)","journal-title":"Social. Networks."},{"key":"18_CR44","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.socnet.2010.03.006","volume":"32","author":"T Opsahl","year":"2010","unstructured":"T Opsahl, F Agneessens, J Skvoretz, Node centrality in weighted networks: generalizing degree and shortest paths. Social. Networks. 32, 245\u2013251 (2010)","journal-title":"Social. Networks."},{"key":"18_CR45","volume-title":"Social computing, behavioral modeling and prediction","author":"K Steinhaeuser","year":"2008","unstructured":"K Steinhaeuser, NV Chawla, Community detection in a large real-world social network, in Social computing, behavioral modeling and prediction, ed. by H Liu, JJ Salerno, MJ Young (Springer US, New York, 2008)"},{"key":"18_CR46","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s003579900004","volume":"14","author":"TAB Snijders","year":"1997","unstructured":"TAB Snijders, K Nowicki, Estimation and prediction for stochastic blockmodels for graphs with latent block structure. J. Classification. 14, 5\u2013100 (1997)","journal-title":"J. Classification."},{"key":"18_CR47","volume-title":"Proceedings of the twenty-seventh conference on uncertainty in artificial intelligence, July 14\u201317, Barcelona, Spain","author":"M Kim","year":"2011","unstructured":"M Kim, J Leskovec, Modeling social networks with node attributes using the multiplicative attribute graph model, in Proceedings of the twenty-seventh conference on uncertainty in artificial intelligence, July 14\u201317, Barcelona, Spain, ed. by FG Cozman, A Politecnica, A Pfeffer (AUAI Press, Corvallis, OR, 2011)"},{"key":"18_CR48","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.ijlcj.2009.10.003","volume":"37","author":"J Ayling","year":"2009","unstructured":"J Ayling, Criminal organizations and resilience. Int. J. Law. Crime. Justice. 37, 182\u2013196.31 (2009)","journal-title":"Int. J. Law. Crime. Justice."},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Yuan J, Cao J, Xia B. Arresting strategy based on dynamic criminal networks changing over time. Discrete Dynamics in Nature and Society. 2013;2013. www.hindawi.com\/journals\/ddns\/2013\/296729\/ . Accessed 29 Aug 2013.","DOI":"10.1155\/2013\/296729"},{"key":"18_CR50","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1177\/1043986210377105","volume":"26","author":"C Morselli","year":"2010","unstructured":"C Morselli, Assessing vulnerable and strategic positions in a criminal network. J Contemporary. Criminal. Justice. 26, 382\u2013392 (2010)","journal-title":"J Contemporary. Criminal. Justice."},{"key":"18_CR51","first-page":"27","volume":"3","author":"D Penzar","year":"2005","unstructured":"D Penzar, A Srbljinovi\u0107, About modeling of complex networks with applications to terrorist group modeling. Interdisciplinary. Description. Complex Systems. 3, 27\u201343 (2005)","journal-title":"Interdisciplinary. Description. Complex Systems."},{"key":"18_CR52","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511996368","volume-title":"Exploratory social network analysis with Pajek","author":"W Nooy de","year":"2011","unstructured":"W de Nooy, A Mrvar, V Batagelj, Exploratory social network analysis with Pajek, 2nd edn. (Cambridge University Press. Software freely, Cambridge, U.K., 2011). available from http:\/\/mrvar.fdv.uni-lj.si\/pajek\/be2.htm . Accessed 26 March 2015","edition":"2"},{"key":"18_CR53","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1882471.1882477","volume":"12","author":"GMS Namata Jr","year":"2010","unstructured":"GMS Namata Jr, L Getoor, Identifying graphs from noisy and incomplete data. ACM. SIGKDD. Explorations. Newsletter. 12, 33\u201339 (2010)","journal-title":"ACM. SIGKDD. Explorations. Newsletter."},{"key":"18_CR54","volume-title":"Handbook of computational approaches to counterterrorism","author":"M Fire","year":"2013","unstructured":"M Fire, R Puzis, Y Elovici, Link prediction in highly fractional data sets, in Handbook of computational approaches to counterterrorism, ed. by VS Subrahmanian (Springer, New York, 2013)"},{"key":"18_CR55","doi-asserted-by":"publisher","first-page":"22073","DOI":"10.1073\/pnas.0908366106","volume":"106","author":"R Guimer\u00e0","year":"2009","unstructured":"R Guimer\u00e0, M Sales-Pardo, Missing and spurious interactions and the reconstruction of complex networks. Proc. Natl. Acad. Sci. U. S. A. 106, 22073\u201322078 (2009)","journal-title":"Proc. Natl. Acad. Sci. U. S. A."},{"key":"18_CR56","first-page":"3","volume":"23","author":"R Thomas","year":"2010","unstructured":"R Thomas, Surge in rhinoceros poaching in South Africa. TRAFFIC. Bulletin. 23, 3 (2010)","journal-title":"TRAFFIC. Bulletin."},{"key":"18_CR57","volume-title":"African rhino: Status, survey and conservation action plan","author":"RH Emslie","year":"1999","unstructured":"RH Emslie, M Brooks, African rhino: Status, survey and conservation action plan (IUCN\/SSC African Rhino Specialist Group, IUCN, Gland, Switzerland, 1999)"},{"key":"18_CR58","doi-asserted-by":"crossref","unstructured":"Ferreira SM, Pfab M, Knight M. Management strategies to curb rhino poaching: an exploration of alternative options. South African Journal of Science. 110, 5\/6 (2014). Article #2012-0055, 8 pages. http:\/\/dx.doi.org\/10.1590\/sajs.2014\/20120055 . Accessed 26 March 2015.","DOI":"10.1590\/sajs.2014\/20120055"},{"key":"18_CR59","doi-asserted-by":"crossref","unstructured":"Jacomy M, Heymann S, Venturini T, Bastian M. ForceAtlas2: A continuous graph layout algorithm for handy network visualization. 2012. http:\/\/www.medialab.sciences-po.fr\/publications\/Jacomy_Heymann_Venturini-Force_Atlas2.pdf . Accessed 2 Jan 2014.","DOI":"10.1371\/journal.pone.0098679"},{"key":"18_CR60","doi-asserted-by":"crossref","unstructured":"Haas TC. Analyzing wildlife trafficking criminal networks. Online resource. 2014. http:\/\/www4.uwm.edu\/people\/haas\/sna . Accessed 19 Jan 2015.","DOI":"10.1186\/s13388-015-0018-8"},{"key":"18_CR61","volume-title":"Regional crime analysis data-sharing with ArcIMS: Kansas city regional crime analysis GIS","author":"S Hick","year":"2003","unstructured":"S Hick, C Grubb, Regional crime analysis data-sharing with ArcIMS: Kansas city regional crime analysis GIS (Proceedings of the Twenty-Third Annual ESRI International User Conference, San Diego, United States, 2003). http:\/\/proceedings.esri.com\/library\/userconf\/proc03\/p1079.pdf . Accessed 19 Jan 2015"},{"key":"18_CR62","unstructured":"Softonic. MySQL Free Download. 2014. http:\/\/mysql.en.softonic.com\/download . Accessed 20 Jan 2015."},{"key":"18_CR63","unstructured":"Daemen J, Rijmen V. The Rijndael Block Cipher. AES Proposal. 2003. http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/Rijndael-ammended.pdf . Accessed 20 Dec 2013."},{"key":"18_CR64","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.amc.2006.11.185","volume":"188","author":"M Dehmer","year":"2007","unstructured":"M Dehmer, F Emmert-Streib, Comparing large graphs efficiently by means of feature vectors. Appl. Mathematics. Comput. 188, 1699\u20131710 (2007)","journal-title":"Appl. Mathematics. Comput."},{"key":"18_CR65","unstructured":"Ntrepid. Tartan Plug-In for Analyst\u2019s Notebook. www.ntrepidcorp.com\/tartan\/analysts-notebook-plugin.php . 2013. Accessed 2 Dec 2013."},{"key":"18_CR66","unstructured":"FMS. Sentinel visualizer provides advanced link analysis, data visualization, geospatial mapping, and social network analysis (SNA). 2014. www.fmsasg.com . Accessed 6 Jan 2014."}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0018-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-015-0018-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0018-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0018-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:55:16Z","timestamp":1747907716000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-015-0018-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,12]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["18"],"URL":"https:\/\/doi.org\/10.1186\/s13388-015-0018-8","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,12]]},"assertion":[{"value":"18 September 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"2"}}