|
|
|
Marcus Lim, Azween Abdullah, NZ Jhanjhi and Mahadevan Supramaniam
Criminal network activities, which are usually secret and stealthy, present certain difficulties in conducting criminal network analysis (CNA) because of the lack of complete datasets. The collection of criminal activities data in these networks tends to...
ver más
|
|
|
|
|
|
|
Annamaria Ficara, Giacomo Fiumara, Salvatore Catanese, Pasquale De Meo and Xiaoyang Liu
Traditional social network analysis can be generalized to model some networked systems by multilayer structures where the individual nodes develop relationships in multiple layers. A multilayer network is called multiplex if each layer shares at least on...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Ricardo Resende de Mendonça, Daniel Felix de Brito, Ferrucio de Franco Rosa, Júlio Cesar dos Reis and Rodrigo Bonacin
Criminals use online social networks for various activities by including communication, planning, and execution of criminal acts. They often employ ciphered posts using slang expressions, which are restricted to specific groups. Although literature shows...
ver más
|
|
|
|
|
|
|
Ankita Dhar, Himadri Mukherjee, Shibaprasad Sen, Md Obaidullah Sk, Amitabha Biswas, Teresa Gonçalves and Kaushik Roy
Author identification is an important aspect of literary analysis, studied in natural language processing (NLP). It aids identify the most probable author of articles, news texts or social media comments and tweets, for example. It can be applied to othe...
ver más
|
|
|
|
|
|
|
Julio Suarez-Paez, Mayra Salcedo-Gonzalez, Alfonso Climente, Manuel Esteve, Jon Ander Gómez, Carlos Enrique Palau and Israel Pérez-Llopis
This paper shows a Novel Low Processing Time System focused on criminal activities detection based on real-time video analysis applied to Command and Control Citizen Security Centers. This system was applied to the detection and classification of crimina...
ver más
|
|
|
|
|
|
|
Efstathios Konstantinos Anastasiadis and Ioannis Antoniou
We extend network analysis to directed criminal networks in the context of asymmetric links. We computed selected centralities, centralizations and the assortativity of a drug trafficking network with 110 nodes and 295 edges. We also monitored the centra...
ver más
|
|
|
|
|
|
|
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat...
ver más
|
|
|
|
|
|
|
Khalil Al-Hussaeni, Mohamed Sameer and Ioannis Karamitsos
Due to the increasing reliance on social network platforms in recent years, hate speech has risen significantly among online users. Government and social media platforms face the challenging responsibility of controlling, detecting, and removing massivel...
ver más
|
|
|
|
|
|
|
Yuncheng Jiang, Baoyu Guo and Zhigang Yan
Lanzhou?s rapid development has raised new security challenges, and improving public safety in areas under the jurisdiction of police stations is an effective way to address the problem of public security in urban areas. Unfortunately, the existing studi...
ver más
|
|
|
|
|
|
|
Aleksandra Kuzior, Tetiana Vasylieva, Olha Kuzmenko, Vitaliia Koibichuk and Paulina Brozek
The article substantiates the existence of convergence processes in the field of digitization of countries, taking into account the number of Internet users; people with advanced skills; and indicators of infrastructure (network coverage, population cove...
ver más
|
|
|
|