{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:12:54Z","timestamp":1775898774359,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T00:00:00Z","timestamp":1534464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13388-018-0031-9","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T12:16:30Z","timestamp":1534508190000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["The detection of criminal groups in real-world fused data: using the graph-mining algorithm \u201cGraphExtract\u201d"],"prefix":"10.1186","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8345-0351","authenticated-orcid":false,"given":"David","family":"Robinson","sequence":"first","affiliation":[]},{"given":"Chris","family":"Scogings","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,17]]},"reference":[{"key":"31_CR1","first-page":"87","volume-title":"Cyber security and policy: a substantive dialogue","author":"D Robinson","year":"2017","unstructured":"Robinson D, Scogings C (2017) Picking high-level fruit in dark trees: using complex systems analytics to detect and understand crime. In: Colarik A, Jang-Jaccard J, Mathrani A (eds) Cyber security and policy: a substantive dialogue. Massey University Press, Auckland, pp 87\u2013108"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1177\/001872087501700206","volume":"17","author":"WR Harper","year":"1975","unstructured":"Harper WR, Harris DH (1975) The application of link analysis to police intelligence. Hum Factors 17(2):157\u2013164","journal-title":"Hum Factors"},{"issue":"6","key":"31_CR3","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1002\/asi.20552","volume":"58","author":"J Schroeder","year":"2007","unstructured":"Schroeder J, Xu J, Chen H, Chau M (2007) Automated criminal link analysis based on domain knowledge. J Am Soc Inf Sci 58(6):842\u2013855","journal-title":"J Am Soc Inf Sci"},{"key":"31_CR4","unstructured":"Maeno Y (2007) Node discovery problem for a social network. arXiv:07104975 . http:\/\/arxiv.org\/abs\/0710.4975 . Accessed 10 Jun 2015"},{"key":"31_CR5","unstructured":"Turner JC (1991) Social influence. Thomson Brooks\/Cole Publishing Co. http:\/\/doi.apa.org\/psycinfo\/1992-97487-000 . Accessed 19 Apr 2015"},{"issue":"3","key":"31_CR6","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0378-8733(91)90008-H","volume":"13","author":"M Sparrow","year":"1991","unstructured":"Sparrow M (1991) The application of network analysis to criminal intelligence: an assessment of the prospects. Soc Netw 13(3):251\u2013274","journal-title":"Soc Netw"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4324\/9781315885018","volume-title":"Crime and networks","author":"JM McGloin","year":"2013","unstructured":"McGloin JM, Nguyen H (2013) The importance of studying co-offending networks for criminological theory and policy. In: Morselli C (ed) Crime and networks. Taylor and Francis, United States, pp 13\u201327. https:\/\/doi.org\/10.4324\/9781315885018"},{"issue":"3","key":"31_CR8","first-page":"53","volume":"24","author":"P Klerks","year":"2001","unstructured":"Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3):53\u201365","journal-title":"Connections"},{"issue":"4","key":"31_CR9","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1093\/bjc\/41.4.580","volume":"41","author":"N Coles","year":"2001","unstructured":"Coles N (2001) It\u2019s not what you know\u2014it\u2019s who you know that counts. analysing serious crime groups as social networks. Br J Criminol 41(4):580\u2013594","journal-title":"Br J Criminol"},{"key":"31_CR10","doi-asserted-by":"publisher","DOI":"10.3138\/9781442673304","volume-title":"Contacts, opportunities, and criminal enterprise","author":"C Morselli","year":"2005","unstructured":"Morselli C (2005) Contacts, opportunities, and criminal enterprise. University of Toronto Press, Toronto"},{"issue":"2","key":"31_CR11","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1080\/17440572.2011.567832","volume":"12","author":"A Malm","year":"2011","unstructured":"Malm A, Bichler G, Nash R (2011) Co-offending between criminal enterprise groups. Global Crime 12(2):112\u2013128","journal-title":"Global Crime"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-1-84628-970-5","volume-title":"Graph theory","author":"JA Bondy","year":"2008","unstructured":"Bondy JA, Murty USR (2008) Graph theory. Springer, New York, p 651"},{"issue":"1","key":"31_CR13","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00778-008-0098-x","volume":"18","author":"O Benjelloun","year":"2009","unstructured":"Benjelloun O, Garcia-Molina H, Menestrina D, Su Q, Whang SE, Widom J (2009) Swoosh: a generic approach to entity resolution. VLDB J 18(1):255\u2013276","journal-title":"VLDB J"},{"key":"31_CR14","doi-asserted-by":"publisher","unstructured":"Robinson D (2016) The use of reference graphs in the entity resolution of criminal networks. In: Chau M, Wang GA, Chen H (eds) Intelligence and security informatics. Springer, Berlin (cited 2016 May 24), pp 3\u201318 (Lecture Notes in Computer Science). https:\/\/doi.org\/10.1007\/978-3-319-31863-9_1","DOI":"10.1007\/978-3-319-31863-9_1"},{"issue":"10","key":"31_CR15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1400181.1400198","volume":"51","author":"J Xu","year":"2008","unstructured":"Xu J, Chen H (2008) The topology of dark networks. Commun ACM 51(10):58","journal-title":"Commun ACM"},{"issue":"4","key":"31_CR16","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1002\/asi.21008","volume":"60","author":"D Hu","year":"2009","unstructured":"Hu D, Kaza S, Chen H (2009) Identifying significant facilitators of dark network evolution. J Am Soc Inform Sci Technol 60(4):655\u2013665","journal-title":"J Am Soc Inform Sci Technol"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Junttila T, Kaski P (2007) Engineering an efficient canonical labeling tool for large and sparse graphs. In: 2007 proceedings of the ninth workshop on algorithm engineering and experiments (ALENEX). Society for Industrial and Applied Mathematics, pp 135\u201349 (Proceedings). http:\/\/epubs.siam.org\/doi\/abs\/10.1137\/1.9781611972870.13","DOI":"10.1137\/1.9781611972870.13"},{"issue":"9","key":"31_CR18","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/TKDE.2012.154","volume":"25","author":"A Prado","year":"2013","unstructured":"Prado A, Plantevit M, Robardet C, Boulicaut JF (2013) Mining graph topological patterns: finding covariations among vertex descriptors. IEEE Trans Knowl Data Eng 25(9):2090\u20132104","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"7043","key":"31_CR19","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G Palla","year":"2005","unstructured":"Palla G, Der\u00e9nyi I, Farkas I, Vicsek T (2005) Uncovering the overlapping community structure of complex networks in nature and society. Nature 435(7043):814\u2013818","journal-title":"Nature"},{"key":"31_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"issue":"6","key":"31_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1064830.1064834","volume":"48","author":"J Xu","year":"2005","unstructured":"Xu J, Chen H (2005) Criminal network analysis and visualization. Commun ACM 48(6):100\u2013107","journal-title":"Commun ACM"},{"issue":"4","key":"31_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. Computer 37(4):50\u201356","journal-title":"Computer"},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Xu J, Chen H (2003) Untangling criminal networks: a case study. In: Chen H, Miranda R, Zeng DD, Demchak C, Schroeder J, Madhusudan T (eds) Intelligence and security informatics. Springer, Berlin (cited 2015 Mar 26). pp 232\u2013248 (Lecture Notes in Computer Science). https:\/\/doi.org\/10.1007\/3-540-44853-5_18","DOI":"10.1007\/3-540-44853-5_18"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Shakarian P, Martin M, Bertetto JA, Fischl B, Hannigan J, Hernandez G et al (2015) Criminal social network intelligence analysis with the gang software. https:\/\/asu.pure.elsevier.com\/en\/publications\/criminal-social-network-intelligence-analysis-with-the-gang-softw . Accessed 21 Nov 2017","DOI":"10.1017\/CBO9781316212639.010"},{"issue":"10","key":"31_CR25","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech Theory Exp 2008(10):P10008","journal-title":"J Stat Mech Theory Exp"},{"key":"31_CR26","unstructured":"Michalak K, Korczak J (2011) Graph mining approach to suspicious transaction detection. In: 2011 Federated conference on computer science and information systems (FedCSIS), pp 69\u201375"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"Mookiah L, Eberle W, Holder L (2014) Detecting suspicious behavior using a graph-based approach. Visual analytics science and technology (VAST), 2014 IEEE Conference, pp 357\u2013358","DOI":"10.1109\/VAST.2014.7042564"},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"19161","DOI":"10.1109\/ACCESS.2018.2816564","volume":"6","author":"D Huang","year":"2018","unstructured":"Huang D, Mu D, Yang L, Cai X (2018) CoDetect: financial fraud detection with anomaly feature detection. IEEE Access 6:19161\u201319174","journal-title":"IEEE Access"},{"key":"31_CR29","doi-asserted-by":"publisher","unstructured":"Shaikh MA, Wang J, Yang Z, Song Y (2007) Graph structural mining in terrorist networks. In: Advanced data mining and applications. Springer, Berlin, pp 570\u2013577 (Lecture notes in computer science). https:\/\/doi.org\/10.1007\/978-3-540-73871-8_54 . Accessed 29 Oct 29","DOI":"10.1007\/978-3-540-73871-8_54"},{"key":"31_CR30","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13601-6_1","volume-title":"Intelligence and security informatics","author":"F Ozgul","year":"2010","unstructured":"Ozgul F, Erdem Z, Bowerman C, Bondy J (2010) Combined detection model for criminal network detection. In: Chen H, Chau M, Li S, Urs S, Srinivasa S, Wang GA (eds) Intelligence and security informatics. Lecture notes in computer science. Springer, Berlin, pp. 1\u201314. https:\/\/doi.org\/10.1007\/978-3-642-13601-6_1"},{"issue":"1","key":"31_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1089\/big.2014.0021","volume":"3","author":"T Wang","year":"2015","unstructured":"Wang T, Rudin C, Wagner D, Sevieri R (2015) Finding patterns with a rotten core: data mining for crime series with cores. Big Data 3(1):3\u201321","journal-title":"Big Data"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"Li X, Cao X, Qiu X, Zhao J, Zheng J (2017) Intelligent anti-money laundering solution based upon novel community detection in massive transaction networks on spark. In: 2017 fifth international conference on advanced cloud and big data (CBD), pp 176\u2013181","DOI":"10.1109\/CBD.2017.38"},{"issue":"3\u20135","key":"31_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3\u20135):75\u2013174","journal-title":"Phys Rep"},{"key":"31_CR34","unstructured":"Carley KM, Reminga J, Kamneva N (1998) Destabilizing terrorist networks. Dynamics networks project in CASOS at CMU. http:\/\/repository.cmu.edu\/cgi\/viewcontent.cgi?article=1031&context=isr . Accessed 19 Apr 2015"},{"issue":"3","key":"31_CR35","first-page":"43","volume":"24","author":"VE Krebs","year":"2002","unstructured":"Krebs VE (2002) Mapping networks of terrorist cells. Connections 24(3):43\u201352","journal-title":"Connections"},{"issue":"4","key":"31_CR36","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1177\/1043986210377105","volume":"26","author":"C Morselli","year":"2010","unstructured":"Morselli C (2010) Assessing vulnerable and strategic positions in a criminal network. J Contemp Crim Justice 26(4):382\u2013392","journal-title":"J Contemp Crim Justice"},{"key":"31_CR37","first-page":"482","volume-title":"Disrupting dark networks","author":"DSF Everton","year":"2013","unstructured":"Everton DSF (2013) Disrupting dark networks. Cambridge University Press, New York, p 482"},{"key":"31_CR38","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1515\/9781626372573-005","volume-title":"Disrupting criminal networks: network analysis in crime prevention","author":"C Morselli","year":"2015","unstructured":"Morselli C, Grund T, Boivin R (2015) Network stability issues in a co-offending population. In: Bichler G, Malm AE (eds) Disrupting criminal networks: network analysis in crime prevention. First Forum Press, Boulder, pp 47\u201366"},{"key":"31_CR39","unstructured":"Carley KM (2003) Dynamic network analysis. Citeseer. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.299.8946&rep=rep1&type=pdf . Accessed 27 Jun 2015"},{"issue":"1","key":"31_CR40","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10588-006-7083-y","volume":"12","author":"KM Carley","year":"2006","unstructured":"Carley KM (2006) Destabilization of covert networks. Comput Math Organiz Theor 12(1):51\u201366","journal-title":"Comput Math Organiz Theor"},{"key":"#cr-split#-31_CR41.1","doi-asserted-by":"crossref","unstructured":"Morselli C (2009) Inside criminal networks. Springer, New York (Studies of organized crime","DOI":"10.1007\/978-0-387-09526-4"},{"key":"#cr-split#-31_CR41.2","unstructured":"vol 8). http:\/\/link.springer.com\/10.1007\/978-0-387-09526-4 , Accessed 27 Mar 2015"},{"issue":"4","key":"31_CR42","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall M, Bergstrom CT (2008) Maps of random walks on complex networks reveal community structure. Proc Natl Acad Sci 105(4):1118\u20131123","journal-title":"Proc Natl Acad Sci"},{"issue":"1","key":"31_CR43","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in Social Networks. Ann Rev Sociol 27(1):415\u2013444","journal-title":"Ann Rev Sociol"},{"key":"31_CR44","first-page":"89","volume-title":"Fernandez RM","author":"RV Gould","year":"1989","unstructured":"Gould RV (1989) Fernandez RM. A formal approach to brokerage in transaction networks. Sociological methodology, Structures of mediation, pp 89\u2013126"},{"issue":"1","key":"31_CR45","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1111\/j.1745-9125.2008.00103.x","volume":"46","author":"C Morselli","year":"2008","unstructured":"Morselli C, Roy J (2008) Brokerage qualifications in ringing operations*. Criminology 46(1):71\u201398","journal-title":"Criminology"},{"issue":"4","key":"31_CR46","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1140\/epjb\/e2009-00335-8","volume":"71","author":"T Zhou","year":"2009","unstructured":"Zhou T, L\u00fc L, Zhang Y-C (2009) Predicting missing links via local information. Eur Phys J B 71(4):623\u2013630","journal-title":"Eur Phys J B"},{"issue":"6","key":"31_CR47","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0047-2484(92)90081-J","volume":"22","author":"RIM Dunbar","year":"1992","unstructured":"Dunbar RIM (1992) Neocortex size as a constraint on group size in primates. J Hum Evol 22(6):469\u2013493","journal-title":"J Hum Evol"},{"key":"31_CR48","unstructured":"Hernando A, Villuendas D, Vesperinas C, Abad M, Plastino A (2009) Unravelling the size distribution of social groups with information theory on complex networks. https:\/\/arxiv.org\/abs\/0905.3704 . Accessed 2 Mar 2018"},{"issue":"5439","key":"31_CR49","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"issue":"5","key":"31_CR50","doi-asserted-by":"publisher","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme P, Kim BJ, Yoon CN, Han SK (2002) Attack vulnerability of complex networks. Phys Rev E 65(5):056109","journal-title":"Phys Rev E"},{"key":"31_CR51","unstructured":"Simmel G, Wolff KH (1950) The sociology of georg simmel. Vol 92892. Simon and Schuster. Accessed 22 Jun 2015"},{"key":"31_CR52","unstructured":"Csardi G, Nepusz T (2006) The igraph software package for complex network research. InterJournal Complex Syst. http:\/\/igraph.org . Accessed 6 Dec 2017"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-018-0031-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-018-0031-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-018-0031-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T17:03:14Z","timestamp":1661792594000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-018-0031-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,17]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["31"],"URL":"https:\/\/doi.org\/10.1186\/s13388-018-0031-9","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,17]]},"assertion":[{"value":"2 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"2"}}