=Paper=
{{Paper
|id=None
|storemode=property
|title=Visualizing
criminal networks reconstructed from mobile phone records
|pdfUrl=https://ceur-ws.org/Vol-1210/datawiz2014_03.pdf
|volume=Vol-1210
|dblpUrl=https://dblp.org/rec/conf/ht/FerraraMCF14
}}
==Visualizing
criminal networks reconstructed from mobile phone records==
Visualizing criminal networks
reconstructed from mobile phone records
Emilio Ferrara Pasquale De Meo Salvatore Catanese,
School of Informatics and Computing Department of Ancient and Giacomo Fiumara
Indiana University Bloomington, USA Modern Civilizations Department of Mathematics
ferrarae@indiana.edu University of Messina, Italy and Computer Science
pdemeo@unime.it University of Messina, Italy
{scatanese,gfiumara}@unime.it
ABSTRACT 1. INTRODUCTION
In the fight against the racketeering and terrorism, knowl- Criminal Network Analysis allows to identify structure and
edge about the structure and the organization of criminal flow of information among the members of a criminal net-
networks is of fundamental importance for both the investi- work and to acquire the knowledge necessary to plan proac-
gations and the development of efficient strategies to prevent tive and reactive interventions. Among the more frequently
and restrain crimes. Intelligence agencies exploit informa- used analytic techniques there is the mapping of interactions
tion obtained from the analysis of large amounts of heteroge- among the members of the organization and their activities
neous data deriving from various informative sources includ- by means of a graph [25]. A graph representation allows
ing the records of phone traffic, the social networks, surveil- to overview the network structure, to identify the cliques,
lance data, interview data, experiential police data, and po- the groups, and the key players. The possibility of mapping
lice intelligence files, to acquire knowledge about criminal the attributes of data and metrics of the network using vi-
networks and initiate accurate and destabilizing actions. In sual properties of the nodes and edges makes this technique
this context, visual representation techniques coordinate the a powerful investigative tool. Often, however, visualization
exploration of the structure of the network together with the techniques become discouraging as a consequence of density
metrics of social network analysis. Nevertheless, the utility and dimensions of the network. Some obstacles such as the
of visualization tools may become limited when the dimen- overlap of nodes and the dense intersections of edges severely
sion and the complexity of the system under analysis grow reduce the readability of the graph. In other words, there
beyond certain terms. In this paper we show how we employ is a limit to the number of elements which can be distinctly
some interactive visualization techniques to represent crim- viewed from the human eye. An influential theory about
inal and terrorist networks reconstructed from phone traffic the improvement of the quality of network visualization has
data, namely foci, fisheye and geo-mapping network layouts. been suggested by Shneiderman in [31], where the so-called
These methods allow the exploration of the network through “Network Nirvana” is described. According to this theory,
animated transitions among visualization models and local some demanding targets must be pursued: i) the visibility
enlargement techniques in order to improve the comprehen- of each node; ii) the possibility of counting the degree of
sion of interesting areas. By combining the features of the each node; iii) the possibility of following each edge from
various visualization models it is possible to gain substantial the source to the destination nodes and, iv) the possibility
enhancements with respect to classic visualization models, of identifying the clusters. Although it can be challenging,
often unreadable in those cases of great complexity of the or even impossible, to satisfy all these conditions at the same
network. time as the network grows in size and complexity, an effec-
tive network analysis strategy should try to optimize the
visualization methods in order to incorporate these guide-
Categories and Subject Descriptors lines. In this work, we present three visualization techniques
[Information systems]: World Wide Web—Social net-
that yield better network representations that, in turn, allow
works; [Networks]: Network types—Social media net-
for enhanced data interpretability; we discuss these layout
works
techniques, namely fisheye, foci and network geo-mapping,
specifically in the context of criminal network analysis, but
Keywords we do not exclude a broader applicability to other domains
Mobile phone networks, criminal networks, visualization of social network analysis (SNA).
1.1 Literature on criminal network analysis
In the last thirty years academic research related to the ap-
plication of social network analysis to intelligence and study
of criminal organizations has constantly grown. One of the
most important studies is due to Malcolm Sparrow [33], re-
lated to the application of the techniques of analysis of net-
works, and their vulnerabilities, for intelligence scopes.
Sparrow defined four features peculiar of criminal networks explicitly designed to identify groups within the network,
(CNs), namely: i) limited dimension — CNs are often com- while others have been developed to show social positions of
posed of at most few thousand nodes; ii) information incom- group members. The most common graphical layouts have
pleteness — criminal or terrorist networks are unavoidably historically been the node-link and the matrix representa-
incomplete due to fragmentary available information and er- tions [17].
roneous information; iii) undefined borders — it is difficult
to determine all the relations of a node; and, iv) dynamics — Visualization has become increasingly important to gain in-
new connections imply a constant evolution of the structure formation about the structure and the dynamics of social
of the network. networks: since the introduction of sociograms, it appeared
clear that a deep understanding of a social network was not
Thanks to Sparrow’s work, other authors tried to study achievable only through some statistical network character-
criminal networks using the tools of SNA. For example, ization [35].
Baker and Faulkner [3] studied illegal networks in the field
of electric plants and Klerks [21] focused on criminal organi- For all these reasons, a number of different challenges in
zations in The Netherlands. In 2001, Silke [32] and Brennan network visualization have been proposed [30]. The study
et al. [8] acknowledged a slow growth in the fight against of network visualization focuses on the solution of the prob-
terrorism, and examined the state of the art in the field of lems related to clarity and scalability of the methods of au-
criminal network analysis. tomatic representation. The development of a visualization
system exploits various technologies and faces some funda-
Arquilla and Ronfeldt [1] summarize prior research by intro- mental aspects such as: i) the choice of the layout; ii) the
ducing the concept of Netwar and its applicability to terror- exploration dynamics; and, iii) the interactivity modes in-
ism. They illustrate the difference between social networks troduced to reduce the visual complexity.
and CNs, demonstrating the great utility of network models
to understand the nature of criminal organizations. Recent studies tried to improve the exploration of networks
by adding views, user interface techniques and modes of in-
All these early studies somehow neglected the importance teraction more advanced than the conventional node-link
of network visualization, stressing aspects related more to and force-directed [18] layouts. For example, in SocialAc-
statistical network characterization, or interpretation of in- tion [27] users are able to classify and filter the nodes of
dividuals’ roles rooted in social theory. However, in 2006, the network according to the values of their statistical prop-
a popular work by Valdis Krebs [22] applied graph analysis erties. In MatrixExplorer [20] the node-link layout is inte-
in conjunction with network visualization theory to analyze grated with the matrix layout. Nonetheless, these visual-
the Al Qaeda cell responsible of the 2001-09-11 terrorist at- ization systems have not been explicitly developed with the
tacks in the USA. This work represents a starting point of aim of the exhaustive comprehension of all properties of the
a series of academic papers in which social network analysis network. Users need to synthesize the results coming from
methods become applied to a real-world cases, differently some views and assemble metrics with the overall structure
from previous work where mostly toy models and fictitious of the network.
networks were used. Krebs’ paper is one of the more cited
papers in the field of application of social network analy- Therefore, we believe that an efficient method to enhance
sis to Criminal Networks and it inspired further research in the comprehension and the study of social networks, and in
network visualization for the design and development of bet- particular of criminal networks, is to provide a more explicit
ter SNA tools applications to support intelligence agencies and effective node-link layout algorithm. This way, impor-
in the fight against terror, and law enforcement agencies in tant insights could be obtained from a unique layout rather
their quest fighting crime. than from the synthesis derived from some different layouts.
2. THE PROBLEM We recently presented a framework, called LogAnalysis [9,
15], that incorporates various features of social network anal-
In criminology and research on terrorism, SNA has been
ysis tools, but explicitly designed to handle criminal net-
proved a powerful tool to learn the structure of a criminal
works reconstructed from phone call interactions. This frame-
organization. It allows analysts to understand the structural
work allows to visualize and analyze the phone traffic of a
relevance of single actors and the relations among members,
criminal network by integrating the node-link layout repre-
when regarded as individuals or members of (one or more)
sentation together with the navigation techniques of zoom-
subgroup(s). SNA defines the key concepts to characterize
ing and focusing and contextualizing. The reduction of the
network structure and roles, such as centrality [16], node
visual complexity is obtained by using hierarchical cluster-
and edge betweenness [16, 6, 14], and structural similarity
ing algorithms. In this paper we discuss three new network
[24]. The understanding of network structure derived from
layout methods that have been recently introduced in Lo-
these concepts would not be possible otherwise [35]. The
gAnalysis, namely fisheye, foci and geo-mapping, and we
above-mentioned structural properties are heavily employed
explain how these methods help investigators and law en-
to visually represent social and criminal networks as a sup-
forcement agents in their quest to fight crime.
port decision-making processes.
It’s worth noting that various tools to support network anal-
SNA provides key techniques including the possibility to de-
ysis exist. However, only few of them have been developed
tect clusters, identify the most important actors and their
specifically for criminal network investigations. We mention,
roles and unveil interactions through various graphical rep-
among others, commercial tools like COPLINK [10, 37], An-
resentation methodologies [40]. Some of these methods are
alyst’s Notebook1 , Xanalysis Link Explorer2 and Palantir
Government3 . Other prototypes described in academic pa-
pers include Sandbox [36] and POLESTAR [28]. Some of
these tools show similar features to LogAnalysis, but, to the
best of our knowledge, none of them yields the same effective
and scalable network visualization with support to criminal
networks reconstructed from phone call records.
2.1 Aspects of structural analysis
A central node of a criminal network may play a key role
by acting as a leader, issuing orders, providing regulations
or by effectively assuring the flow of information through
the various components of the CN. The removal of these
central nodes may efficiently fragment the organization and
interrupt the prosecution of a criminal activity. Figure 1: Phone calls network of a suspected. In-
vestigators start from some known entities, analyze
Apart from studying the roles of various members, inves- the associations they have with others and expand-
tigative officers must pay particular attention to subgroups ing the associations until some significant link is un-
or gangs each of which may be in charge of specific tasks. covered. Here are highlighted personal interactions
Members of the organization must interact and cooperate (gray arrows), links between criminal and personal
in order to accomplish their illicit activities. Therefore, the connections of the suspect (yellow) and connections
detection of subgroups whose members are tightly interre- between members of the organization (in red).
lated may increase the comprehension of the organization
of the CN. Moreover, groups may interact according to cer-
tain schemes. For example, the members of a clan could Figure 1 shows a stylized representation of a criminal net-
frequently interact with the members of another and seldom work reconstructed from phone call records. We show the
with the remaining members of the network. The detection flow of phone communications of an individual subject of
of interaction models and the relations among the subgroups investigation, and we highlight various kind of phone inter-
highlights information particularly useful about the overall actions among individuals belonging to that person’s social
structure of the network. circles, and those belonging to the same criminal organiza-
tion the individual is part of.
A significant aspect of the analysis of criminal networks is
that it requires, differently from other networks, the ability In the following we discuss three techniques that allow to effi-
of integrating information deriving from other sources in or- ciently and scalably inspect criminal networks reconstructed
der to precisely understand its structure, operation and flow from phone interactions.
of information. A typical process employed by an investi-
gator is to start from one, or a few, known entities; after
analyzing the associations these entities have with others, if 3. VISUALIZATION TECHNIQUES
any interesting association emerges, one may follow such a Typical network visualization tools rely on the popular force-
lead and keep expanding the associations until any signifi- directed layout [18]. The force-directed model represents the
cant link is uncovered between seemingly unrelated entities. structure of the graph on the same foot as a physical system,
in which nodes are physical points subject to various forces;
Mobile phone networks and online platforms are constantly nodes’ coordinates (and therefore the layout itself) derive
used to perform or coordinate criminal activities [38, 26]. from the search of an equilibrium configuration of the phys-
Phone networks can be used to connect individuals involved ical system modeled by the algorithm [7]. This particular
in criminal activities in real time, often during real-world layout arrangement has the advantage of grouping users in
criminal events, from simple robberies to terror attacks. On- clusters which can be identified according to the heightened
line platforms, instead, can be exploited to carry out illicit connectivity. The Barnes-Hut algorithm [4] associated to
activities such as frauds, identity thefts or to access classified this layout simulates a repulsive N-body system in order to
information. continuously update the position of the elements.
The analysis of a criminal network is thus aimed at uncover To optimize the visualization, it is possible to interactively
the structural schemes of the organization, its operations modify the parameters relative to the tension of the springs
and, even more importantly, the flow of communications (edges). Nodes with low degree are associated a small ten-
among its members. In modern investigative techniques the sion and the elements are located in peripheral positions
analysis of phone records represents a first approach that with respect to high degree nodes. Other parameters can be
precedes a more refined scrutiny covering financial transac- tuned, such as spring tension, gravitational force and viscos-
tions and interpersonal relations. For these reasons a struc- ity. Our goal, in the following, is to suggest two methods to
tured approach is needed. improve force-directed based layouts. As we will show, these
techniques are especially well suited for criminal network
1
ibm.com/software/products/analysts-notebook/ analysis; however, they could potentially be generalized for
2
http://www.xanalys.com/products/link-explorer/ broader usage in other domains of network analysis — for
3
http://www.palantir.com/solutions/ example, for applications in social and political sciences.
Figure 2: The left picture shows a force-directed layout of a criminal network. On the right we depict the
fisheye view of the same graph using transformation with distortion.
3.1 Focus and context based visualization 3.2 Fisheye layout
The number of edges within a network usually grows faster Focus and context is an interactive visualization technique
than the number of nodes. As a consequence, the network [23]. It allows the user to focus on one or more areas of a
layout would necessarily contain groups of nodes in which social network, to dynamically tune the layout as a func-
some local details would easily become unreadable because tion of the focus, and to improve the visualization of the
of density and overlap of the edges. As the size and complex- neighboring context. The fisheye view is a particular focus
ity of the network grow, eventually nodes and edges become and context visualization technique which has been applied
indistinguishable. This problem is known as visual over- to visualize self-organizing maps in the Web surfing [39]. It
load [2]. A commonly used technique to work around visual was first proposed by Furnas [19] and successively enriched
overload consists of employing a zoom-in function able to by Brown et al. [29]. It is known as a visualization technique
enlarge the part of the graph of interest. The drawback of that introduces distortion in the displayed information.
this operation is the detriment of the visualization of the
global structure which, during the zooming, would not be The fisheye layout is a local linear enlargement technique
displayed. However, such a compromise is reasonable in a that, without modifying the size of the visualization canvas,
number of situations including, in some cases, the domain allows to enhance the region surrounding the focus, while
of criminal network analysis. compressing the remote neighboring regions. The overall
structure of the network is nevertheless maintained. An ex-
During an investigation, it is crucial to narrow down the ample of application of this technique is show in Figure 2.
analysis to the relevant suspects, to efficiently employ human The picture shows a moderately small criminal network re-
and computational resources. Police officers typically draw constructed from phone call interactions of about 75 indi-
some hypotheses about an individual suspect of being part viduals. The layout on the left panel is obtained by using a
of a criminal organization, or of being involved (or about force-directed method implemented in our framework, Log-
to) in some crime; they concentrate the initial investigation Analysis. The analyst can inspect the nodes of the network,
on this individual, and on that person’s social circles, as a which contains known criminals, suspects, and their social
ground to build the social network object of analysis. The circles. When the focus is applied on a given node, the vi-
main role of visual analysis lies in allowing the detection sualization transitions to the fisheye layout (see the right
of unknown relations, on the base of the available limited panel). A tool-tip with additional information about the
information. A typical procedure starts from known entities, node appears when the node is selected — it shows the phone
to analyze the relations with other subjects and continue to number, personal details, address, photo, etc. The layout
expand the network inspecting first the edges appearing the causes edges among remote nodes to experience stronger
most between individuals apparently unrelated. During this distortions than local nodes. The upside of the presented
procedure, only some nodes are relevant and it is important method is the possibility to achieve the three recommen-
to focus on them rather than on the network as a whole. dations of Network Nirvana [30] when focusing on a given
node: all the nodes’ neighbors are clearly visible, the node
Nevertheless, a spring embedded layout (including force- degree is easily countable, and the edges incident on that
directed ones) does not provide any support to this kind node can be identified and followed.
of focus and analysis. In these situations, focus and context
visualization techniques are needed in order to help a user Note that fisheye and force-directed layouts can be used in
to explore a specific part of a complex network. To this a complementary way. By combining the two methods, our
purpose, we here introduce the fisheye and the foci layouts. framework efficiently yields focus and context views.
Figure 3: Foci layout.
3.3 Foci layout
The foci layout implements three network visualization mod- Figure 4: Geo-mapping layout.
els: force-directed, semantic and clustered layouts. The lat-
ter is based on the Louvain community detection algorithm
[5, 11]. Future implementations will explore other methods responding GPS entries to ascertain their distribution. This
[12, 13]. Our model supports multilayer analysis of the net- localization technique produces satisfactory results with a
work through interactive transitions from the force-directed reduction of the error amounting to a 20% with respect to
layout, with a single gravitational center, to the clustered the blind approach. Traag et al. in [34] used Bayesian inter-
one with more force centers placed in predetermined distinct ference to deduce, starting from phone traffic data, profiles
areas. This layout allows to analyze the network on various about the places and the proximity of a given social event.
layering levels depending on specified node attributes. Fig-
ure 3 shows the phone traffic network of some clans the Our framework provides network geo-mapping by using this
previous criminal network, in which the color of the nodes type of techniques to infer the spatial origin of each call. We
denotes the type of crime committed by the members. here describe the network geo-mapping visualization method
adopted in LogAnalysis. This layout allows to simultane-
In this example, the clustering truthfully reflects the known ously carry out spatial and temporal relational analysis of
territorial division among the groups belonging to the orga- phone call logs. It places nodes of the network on a map,
nization. In Figure 3 the focus is on a specific node. Using in correspondence of the coordinates of the cells linked dur-
this layout it is possible to contextually analyze the commu- ing the events recorded in the logs. Nodes are connected
nity structure, the type of committed crime in respect to the by links related to displacements. Contacts falling within
members of the clan, and the direct relations of each single the sectors of a given zone are represented with nodes of
individual. This layout integrates also the forth Network the same color. Information about displacements, routines
Nirvana recommendation, namely the possibility to identify and areas of interest for the investigation are displayed. The
clusters and to highlight the community structure. adoption of network geo-mapping has proved extremely use-
ful during real investigations. Figure 4 shows, as an exam-
ple, a case study in which larger nodes identify zones in
3.4 Network geo-mapping which, in the time period of the investigation, a high num-
It is possible to extend the phone traffic analysis to include
ber of contacts has been recorded among some members of
the phone logs recorded by the BTS (Base Transceiver Sta-
the CN. Unsurprisingly, the inspection by police officers of
tion), in which the GPS coordinates of the cell are reported.
such high-profile locations provided crucial insights on the
All base stations are provided with directional antennas and
investigation. Unfolding the temporal evolution of the geo-
each cell has two or more sectors. For each cell it is known
mapped phone traffic network also allows to reproduce in-
the azimuth (direction) corresponding to the central axis of
dividuals’ movements and communication dynamics during
each sector, together with the width of the beam of each
specific criminal events embedded in space and time, like
antenna, which determines the coverage angle of the sector.
robberies, assaults, or homicides.
These data do not allow to localize the geo-referenced posi-
tion of the phones involved in the events recorded in the logs.
Nevertheless, it is possible, within a certain approximation, 4. CONCLUSIONS
to localize the users falling within the coverage area. Criminal network analysis benefits from visualization meth-
ods used to support the investigations, especially when deal-
Zang et al. [41] described a technique based on Bayesian ing with networks reconstructed from heterogeneous data
interference to localize mobile phones using additional in- sources, characterized by increasing size and complexity. In
formation, such as the round-trip-time of data transmission this paper we integrated the spring embedded algorithm
packets and the measure of SINR (Signal to Interference plus with the fisheye and foci layouts to allow interactive ex-
Noise Ratio). The parameters obtained experimentally have ploration of criminal networks through our network analy-
been compared with the records of phone calls and the cor- sis framework. The combination of these techniques proved
helpful to support investigators in the extraction of useful dual-representation system to explore social networks.
information and critical insights, to identify key members IEEE Transactions on Visualization and Computer
in terrorist groups, and to discover specific paths of inter- Graphics, 12(5):677–684, Sept. 2006.
action among members of criminal organizations. Experi- [21] P. Klerks and E. Smeets. The network paradigm
applied to criminal organizations: Theoretical
mental results show that the combination of force-directed nitpicking or a relevant doctrine for investigators?
layouts, distortion techniques and multi-force systems yield Connections, 24:53–65, 2001.
better performance in terms of both efficiency and efficacy. [22] V. Krebs. Mapping networks of terrorist cells.
Connections, 24(3):43–52, 2002.
5. REFERENCES [23] Y. K. Leung and M. D. Apperley. A review and
[1] J. Arquilla and D. Ronfeldt. Networks and netwars: taxonomy of distortion-oriented presentation
The future of terror, crime, and militancy. Survival, techniques. ACM Trans. Comput.-Hum. Interact.,
44(2):175–176, 2001. 1(2):126–160, June 1994.
[2] J. Assa, D. Cohen-Or, and T. Milo. Displaying data in [24] F. Lorrain and H. C. White. Structural equivalence of
multidimensional relevance space with 2d visualization individuals in social networks. The Journal of
maps. In Proc. Visualization ’97, pages 127–134, 1997. Mathematical Sociology, 1(1):49–80, 1971.
[3] W. Baker and R. Faulkner. The social organization of [25] J. Mena. Investigative Data Mining for Security and
conspiracy: illegal networks in the heavy electrical Criminal Detection. Butterworth-Heinemann, 2003.
equipment industry. Am. Social. Rev., 58, 1993. [26] C. Morselli. Assessing vulnerable and strategic
[4] J. Barnes and P. Hut. A hierarchical o(n log n) force positions in a criminal network. Journal of
calculation algorithm. Nature, 324:446–449, 1986. Contemporary Criminal Justice, 26(4):382–392, 2010.
[5] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and [27] A. Perer and B. Shneiderman. Balancing systematic
E. Lefebvre. Fast unfolding of communities in large and flexible exploration of social networks. IEEE
networks. Journal of Statistical Mechanics: Theory Trans. Visual. and Computer Graphics, pages
and Experiment, 2008(10):P10008+, July 2008. 693–700, 2006.
[6] U. Brandes. A faster algorithm for betweenness [28] N. J. Pioch and J. O. Everett. Polestar: collaborative
centrality. Journal of Mathematical Sociology, knowledge management and sensemaking tools for
25(2):163–177, 2001. intelligence analysts. In Proc. 15th ACM international
conference on Information and knowledge
[7] U. Brandes. Drawing on physical analogies. In management, pages 513–521. ACM, 2006.
Drawing Graphs, pages 71–86. Springer, 2001.
[29] M. Sarkar and M. H. Brown. Graphical fisheye views.
[8] D. W. Brannan, P. F. Esler, and N. T. Comm. ACM, 37(12):73–84, 1994.
Anders Strindberg. Talking to terrorists: Towards an
independent analytical framework for the study of [30] F. Schneider, A. Feldmann, B. Krishnamurthy, and
violent substate activism. Studies in Conflict and W. Willinger. Understanding online social network
Terrorism, 24(1):3–24, 2001. usage from a network perspective. In Proc. 9th
SIGCOMM conference on Internet measurement
[9] S. Catanese, E. Ferrara, and G. Fiumara. Forensic conference, pages 35–48. ACM, 2009.
analysis of phone call networks. Social Network
Analysis and Mining, 3(1):15–33, 2013. [31] B. Shneiderman and A. Aris. Network visualization by
semantic substrates. IEEE Trans. Visual. and
[10] H. Chen, D. Zeng, H. Atabakhsh, W. Wyzga, and Computer Graphics, 12(5):733–740, Sept 2006.
J. Schroeder. Coplink: managing law enforcement
data and knowledge. Comm. ACM, 46(1):28–34, 2003. [32] A. Slike. The devil you know: Continuing problems
with research on terrorism. Terrorism and Political
[11] P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti. Violence, 13:1–14, 2001.
Generalized Louvain method for community detection
in large networks. In Proc. 11th International [33] M. K. Sparrow. The application of network analysis to
Conference on Intelligent Systems Design and criminal intelligence: An assessment of the prospects.
Applications, pages 88–93. IEEE, 2011. Social Networks, 13(3):251–274, 1991.
[12] P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti. [34] V. A. Traag, A. Browet, F. Calabrese, and F. Morlot.
Enhancing community detection using a network Social event detection in massive mobile phone data
weighting strategy. Information Sciences, 222:648–668, using probabilistic location inference. In 2011 IEEE
2013. 3rd international conference on social computing
(socialcom), pages 625–628. IEEE, 2011.
[13] P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti.
Mixing local and global information for community [35] S. Wasserman and K. Faust. Social network analysis:
detection in large networks. Journal of Computer and methods and applications. Cambridge Univ. Pr., 1994.
System Sciences, 80(1):72–87, 2014. [36] W. Wright, D. Schroh, P. Proulx, A. Skaburskis, and
[14] P. De Meo, E. Ferrara, G. Fiumara, and B. Cort. The sandbox for analysis: concepts and
A. Ricciardello. A novel measure of edge centrality in methods. In Proc. SIGCHI Conference on Human
social networks. Knowl-based Syst, 30:136–150, 2012. Factors in Computing Systems, pages 801–810, 2006.
[15] E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara. [37] J. Xu and H. Chen. Crimenet explorer: a framework
Detecting criminal organizations in mobile phone for criminal network knowledge discovery. ACM
networks. Expert Systems with Applications, Trans. on Information Systems, 23(2):201–226, 2005.
41(13):5733–5750, 2014. [38] J. Xu and H. Chen. Criminal network analysis and
[16] L. Freeman. A set of measures of centrality based on visualization. Comm. ACM, 48(6):100–107, 2005.
betweenness. Sociometry, pages 35–41, 1977. [39] C. Yang, H. Chen, and K. Hong. Visualization of large
[17] L. C. Freeman. Visualizing social networks. Journal of category map for internet browsing. Decis. Support
Social Structure, 1, 2000. Syst., 35(1):89–102, Apr. 2003.
[18] T. Fruchterman and E. Reingold. Graph drawing by [40] C. Yang, N. Liu, and M. Sageman. Analyzing the
force-directed placement. Software: Practice and terrorist social networks with visualization tools. In
Experience, 21(11):1129–1164, 1991. Intelligence & security informatics. 2006.
[19] G. W. Furnas. Generalized fisheye views. SIGCHI [41] H. Zang, F. Baccelli, and J. Bolot. Bayesian inference
Bull., 17(4):16–23, Apr. 1986. for localization in cellular networks. In 2010
Proceedings IEEE INFOCOM, pages 1–9. IEEE, 2010.
[20] N. Henry and J.-D. Fekete. Matrixexplorer: A