2000 character limit reached
Identifying a Criminal's Network of Trust (1503.04896v1)
Published 17 Mar 2015 in cs.SI and physics.soc-ph
Abstract: Tracing criminal ties and mining evidence from a large network to begin a crime case analysis has been difficult for criminal investigators due to large numbers of nodes and their complex relationships. In this paper, trust networks using blind carbon copy (BCC) emails were formed. We show that our new shortest paths network search algorithm combining shortest paths and network centrality measures can isolate and identify criminals' connections within a trust network. A group of BCC emails out of 1,887,305 Enron email transactions were isolated for this purpose. The algorithm uses two central nodes, most influential and middle man, to extract a shortest paths trust network.
- Pritheega Magalingam (3 papers)
- Asha Rao (22 papers)
- Stephen Davis (5 papers)