Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Identifying a Criminal's Network of Trust (1503.04896v1)

Published 17 Mar 2015 in cs.SI and physics.soc-ph

Abstract: Tracing criminal ties and mining evidence from a large network to begin a crime case analysis has been difficult for criminal investigators due to large numbers of nodes and their complex relationships. In this paper, trust networks using blind carbon copy (BCC) emails were formed. We show that our new shortest paths network search algorithm combining shortest paths and network centrality measures can isolate and identify criminals' connections within a trust network. A group of BCC emails out of 1,887,305 Enron email transactions were isolated for this purpose. The algorithm uses two central nodes, most influential and middle man, to extract a shortest paths trust network.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (3)
  1. Pritheega Magalingam (3 papers)
  2. Asha Rao (22 papers)
  3. Stephen Davis (5 papers)
Citations (7)

Summary

We haven't generated a summary for this paper yet.