<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Survey of Influential Nodes Detection Methods in Mobile Phone Network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elizabeth N. Onwuka</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bala A. Salihu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sheriff Murtala</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Telecommunications Engineering, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>213</fpage>
      <lpage>219</lpage>
      <abstract>
        <p>-The number of mobile phone users is increasing tremendously. The social interaction between these mobile phone users can be represented using social network graphs. This type of study has very important applications in various areas especially in the detection of criminal groups who also use these devices to interact and plan their activities. Moreover, the study of identifying influential nodes in social network of any kind is currently receiving attention in the research arena. This is because identification of influential nodes of any network is significant to understanding the network. This becomes very important if the network in question is a criminal network, considering the insecurities of the current time. In this paper, a survey of influential nodes detection methods is carried out, we first define the problems associated with influential nodes detection and then examine various methods of identifying influential nodes. We also consider techniques employed in analysing users in the mobile phone network.</p>
      </abstract>
      <kwd-group>
        <kwd>social network</kwd>
        <kwd>mobile phone influential nodes detection</kwd>
        <kwd>centrality measures</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Since the invention of mobile communication and other
services attached to it, many people find it better and cheaper
to communicate using the medium than wired
communication thereby attracting more subscribers to use
mobile communication network. A survey carried out by
international telecommunication union (ITU) shows that the
population of mobile phone subscribers increased from 738
million in the year 2000 to 7 billion in 2015 and within this
same time the proportion of population covered by a 2G
mobile cellular network increased from 58% to 95% with
more remote areas captured [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In developing countries, at
least one member of every household communicates using a
mobile phone. Each subscriber enjoys making calls and
receiving calls from other users and enjoys the same for short
messages and Internet services. Telecommunication
networks have really made the world a global village in the
sense that peoples‘ social reach has expanded even across
borders. The log of activities of each user is stored on the
user‘s phone and also recorded with the Mobile Network
Operators (MNOs). The information collected by the MNOs
is referred to as Call Detail Record (CDR).
      </p>
      <p>
        CDR contains metadata that describes a specific instance
of a telecommunication transaction (calls, messages and
Internet services) but does not include the content of that
transaction, for example, CDR for a particular call contains
both the caller and receiver‘s number, the time stamp (date
and time), the duration of the call, the base station ID of the
caller‘s location and other related information. CDR may
capture thousands or millions of users within a specific time
and place and it can be used to create a network of mobile
phone subscribers. CDR is a huge repository of human
behavioural data and it belongs to the group of data being
currently described as Big Data. The information from CDR
reveals the inter-relationship network between mobile phone
subscribers at various spheres, generally called social
networks. A mobile phone network is a social structure that
represents the interconnection of mobile phone subscribers
based on call detail record (CDR). An example of a social
network of mobile phone users is shown in Fig. 1. The idea
of forming a social interaction between mobile phone users
support researchers in the different area of studies like
personal mobility prediction, fraud detection in
telecommunication [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], urban planning and development,
geographical partitioning [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and intelligence gathering for
national security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>Human beings normally form groups or clusters based on
certain commonalities. These groups (called communities)
also reflected on the communication data. Networks are
made up of communities and in each community, there are
nodes with varying degrees of influence, these nodes are
called influential nodes. A good area of application of mobile
phone network is in the detection of influential mobile
subscribers. For instance, a network of mobile phone
subscribers which is created by collecting call record
information from a reasonable number of actors (that act as
seeds) will consist of different communities and some users
within these communities will influence other users either
positively or negatively. The major problem in this area is
how to accurately determine the genuine influential
individuals in a social network. In this paper, we present an
overview of various ways of finding influential nodes in a
social network.</p>
      <p>The remainder of this paper is organised as follows:
Section II provides a brief background and review of related
works. Section III describes different methods of identifying
influential nodes in a mobile phone network. Finally, we
conclude this paper in Section IV.</p>
      <p>II.</p>
      <p>RELATED WORK
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        There is a rapidly growing literature on influential nodes
discovery in social networks, which indicates that a lot of
study had been carried out in this field [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], [9], [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ],
[
        <xref ref-type="bibr" rid="ref10">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">17</xref>
        ]. However, due to the
challenges of getting mobile phone data, little studies have
been carried out on discovering communities and important
mobile subscribers in the mobile phone network. A mobile
phone network is treated like any other social network that
has a tree network structure. Social network is usually
modelled as a graph, G=(V,E), where V is a set containing
all nodes (actors) in the network and E is also a set
containing all edges (links) between two elements (pairs) of
set V. If the direction of the edges is considered the graph is
said to be directed or undirected if otherwise. Also, when the
corresponding weight, W of the edges is considered, the
graph, G=(V,E,W) is said to be weighted or binary
(unweighted) if otherwise. A simple description of how an
undirected and weighted graph is modelled from set V, E and
W is shown in Fig. 2.
      </p>
      <p>
        Exploring social network data requires basic concepts of
graph representation, analysis and visualisation [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ]. These
concepts include centrality measures, shortest path problems,
clustering techniques and network density. This is necessary
when interpreting the result in order to have a good
understanding of the social interactions between nodes in a
network. Due to the rich resources in social network
analysis, it serves as a tool for analysing and visualising big
data [
        <xref ref-type="bibr" rid="ref18">19</xref>
        ]. Some major areas of study in the social network
analysis are community structure, detection of cliques and
discovery of key nodes and neighbours. Recently, more
attention has been given to the detection of influential nodes
in the social network. This is added to the fact that
researchers and investigators have taken full advantage of
social network analysis to unravel the operation of terrorists
and criminals [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Crime investigation application becomes
more necessary now that communication networks have
changed the way people live and transact business. It is
intuitively believed that criminals rely on this network for
planning criminal activities of all sorts.
      </p>
      <p>In our study, we focus on identifying important and
interesting nodes in a mobile phone network and we discuss
some of the previous studies that have been done in this
research area by first looking at the major problems and
concepts employed in the detection of important nodes and
different approaches that had been applied so far.
Vertex list, V</p>
      <p>A
B
C
D
E
F
G</p>
      <p>Edge List, E
C B
F G
D F
A E
E D
A F
C E
E F
A B
A G
B E
C A
D B</p>
      <p>
        Influential nodes are set of nodes whose roles are very
important in the spread of influence across the network.
These nodes have the tendency to influence other nodes
either constructively or destructively. Influential nodes and
―key nodes‖ seem to be the same. According to Borgatti [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ],
influential nodes‘ problem can either be a key player
problem positive (KPP-Pos.) or key player problem negative
(KPP-Neg.). KPP-Pos. is defined with respect to the way key
nodes are connected and integrated into the network, while
KPP-Neg. is defined in relation to the network reliance on its
key nodes to sustain its connectedness.
      </p>
      <p>
        Recently, [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ][
        <xref ref-type="bibr" rid="ref15">16</xref>
        ] presented an overview of existing
techniques of finding important and influential nodes in
social networks. In this paper, we extend the study of Probst
by reviewing more novel approaches in finding prominent
nodes in the social network with emphasis on mobile phone
network. For clarity, we classify some of the previous work
on influential nodes detection into two categories: centrality
and non-centrality measures.
      </p>
      <p>
        1) Centrality measures
In graph theory and network analysis, the most important
tool is centrality measure. Centrality measures are
considered as structural measures of influence that indicate
bridge along the shortest path between two other nodes. The
betweenness centrality of a user, v is given by
(4)
(5)
(6)
BC(v)  
stvV
 st (v)
 st
where  st is the number of shortest paths in the graph, G
between nodes ―s‖ and ―t‖;  st (v) is the number of
shortest paths in the graph, G between nodes ―s‖ and ―t‖ that
pass through user ―v‖. Nodes with high betweenness are
responsible for controlling the spread of information across
the graph. However, they might not be responsible for
causing maximum disconnection (fragment) within the
network [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Brandes also presented an algorithm for
computing the betweenness index of a large number of
nodes [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ].
      </p>
      <p>
        d) Eigenvector Centrality: Eigenvector centrality (also
called eigencentrality) is a measure of how well a particular
user is connected to other influential nodes. This is one of
the oldest centrality measures developed to assist the social
analyst in recognising the behaviour of people [
        <xref ref-type="bibr" rid="ref25">26</xref>
        ]. To
determine eigenvector centrality, it is imperative to first find
the adjacency matrix, A of the graph, G. Given
A  a(v, u) for a binary network.
      </p>
      <p>
        Where:
a v, u   
1,
0,
if the link between node v and u exist,
otherwise.
a user‘s position in a social network. Degree centrality,
betweenness centrality, closeness centrality, and eigenvector
centrality are the four widely used centrality measures in
determining the relative importance of a user within a
network. Although these measures have limitations, they
have been proven to be the basis of other methods of
identifying key nodes based on specific purposes within a
social network [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ].
      </p>
      <p>a) Degree Centrality: is defined as the number of
edges incident upon a user. In other words, this measure
indicates how many nodes can be directly reached by a
particular node. The degree centrality of a user, v is given
by:</p>
      <p>DC(v)  deg(v)
deg(v, G) | {u V : (u, v)  E} |</p>
      <p>Nodes with high degree centrality score might be
considered influential. The flaw of this centrality measure is
that it relies on direct connections between nodes. Using this
individual centrality alone to determine the key nodes will
result in the selection of nodes that only have a high number
of direct connections.</p>
      <p>
        b) Closeness Centrality: According to Bavelas,
closeness centrality of a user as the reciprocal of the sum of
its distances from all other nodes [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ]. This measure is
effective in describing the hierarchy among members of a
group and can also be used to indicate how fast a user can
reach every other user in the network. The closeness
centrality of a user, v is given by:
(1)
(2)
(3)
 
CC(v)    d (v, u) 
 u 
1
where (u, v)  E and  d (v, u) is the sum of the length
of all shortest paths froum all other nodes from node ―v‖.
Okamoto et al. [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ] introduced an efficient algorithm for
discovering the top k-highest closeness centrality nodes
called TOPRANK. The algorithm is made up of the
approximate algorithm and exact algorithm. The
approximate algorithm is applied to identify the top nodes
with high centrality scores while the exact algorithm is used
to rank the detected nodes. [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ] presented a closeness
centrality algorithm that efficiently determines the closeness
scores of each user any time the social network structure is
modified. The changes involve the insertion of a new edge
or the removal of an existing edge.
      </p>
      <p>
        c) Betweenness Centrality: Betweenness-based
centrality measures were first introduced by Freeman in
[
        <xref ref-type="bibr" rid="ref23">24</xref>
        ]. The author discovered that it is important to generalise
the concept of point centrality and structural properties of
the social network from past study[
        <xref ref-type="bibr" rid="ref20">21</xref>
        ]. Betweenness
centrality expresses the number of times a user acts as a
The eigenvector centrality of a node, v is mathematically
defined as:
      </p>
      <p>The boundary of the summation, is all members of the
set of neighbours of v, M(v). In matrix representation,
eigenvector centrality is expressed mathematically as:
xv 
1</p>
      <p> xu
 uM (v)
xv 
1
</p>
      <p>Axu</p>
      <p>
        Where  is the eigenvalue (constant) and xv is the
corresponding eigenvector of the adjacency matrix, A.
Eigenvector centrality is much related to Katz centrality
[
        <xref ref-type="bibr" rid="ref26">27</xref>
        ], a universality of degree centrality. Katz centrality
measures the relative influence of nodes within a social
network by determining the number of the immediate
neighbours (first-degree nodes) and also all further nodes in
the network that connect to the node under consideration
through these close neighbours.
      </p>
      <p>
        e) Other Centrality-Based Approaches: The number of
centrality measures extends beyond the four metrics
discussed earlier. It is quite interesting that most of the new
measures were related one way or the other to the four most
popular centrality measures with a little modification.
Stephenson and Zelen suggested a new centrality measure
called Information centrality [
        <xref ref-type="bibr" rid="ref27">28</xref>
        ]. This centrality has
statistical theory background that considers all the path
signals in a social network. Although this centrality is
applied to undirected networks only, it supersedes other
traditional centrality measures in identifying the most
central nodes. In [
        <xref ref-type="bibr" rid="ref28">29</xref>
        ], the authors proposed an optimal
intercentrality measure, which takes into account both the user‘s
centrality and its impact on the centrality of the other nodes.
Using a criminal network, the authors‘ findings indicated
that the key criminal is criminal with the highest optimal
inter-centrality in the network and the removal of this
criminal would greatly reduce the crime rate. In [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ] and
[
        <xref ref-type="bibr" rid="ref30">31</xref>
        ], the authors extended the work of Ballester et al., by
presenting an inter-centrality with key group dimension.
The modified inter-centrality explores the key group whose
nodes are different from the nodes with highest individual
inter-centralities.
      </p>
      <p>
        Ilyas and Radha introduced a new centrality called
principal component centrality (PCC), a variant of
eigenvector centrality [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ]. PCC is based on principal
component analysis (PCA) and karhunen loeve transform
(KLT) which handles graph adjacency matrix as a
covariance matrix. Contrary to eigenvector centrality, PCC
provides more features for centrality computation. Moreover,
an investigation was carried out to detect influential nodes in
two separate datasets using eigenvector centrality and
principal component centrality [
        <xref ref-type="bibr" rid="ref32">33</xref>
        ]. Their results showed
that eigenvector centrality considered the most influential
node within the largest community in a network and
consequently ranks the neighbours of the influential node
and ignores other nodes in the remaining small communities
that have low eigenvector scores. In the case of PCC, it
considered both the nodes in the largest community and
other nodes with zero eigenvalues in small communities.
      </p>
      <p>
        Despite the introduction of these new centrality
measures, the fact still remains that an individual centrality
measure might not be the most appropriate for identifying
influential nodes in a social network. A centrality measure is
applied depending on a specific role of nodes in the network.
For instance, nodes that are influential gossipers or most
spreaders of virus function as information regulators in the
network. Another different purpose is identifying nodes that
can maximally disrupt the social network. The irregularities
in some of these individual centrality measures have open up
fascinating research fields on group and improved centrality
measures that can be universal in identifying the most
influential nodes [
        <xref ref-type="bibr" rid="ref33">34</xref>
        ][
        <xref ref-type="bibr" rid="ref34">35</xref>
        ]. Some studies also considered
combining two or more centralities measures in getting a
general set of influential nodes. Sathik and Rasheed
proposed an algorithm to identify sets of key players based
on centrality measures [
        <xref ref-type="bibr" rid="ref35">36</xref>
        ]. The authors addressed the key
player problems [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], using closeness centrality, degree
centrality and betweenness centrality. Zaman [
        <xref ref-type="bibr" rid="ref36">37</xref>
        ] in his
(unpublished) PhD thesis recommended a new centrality
measure known as rumor centrality that determines the
source of rumor (gossip) and how influence (gossip) spread
across a microblogging website (twitter).
      </p>
      <p>
        Lately, in order to adequately discover real influential
nodes. Ahsan et al. described a scheme that combines
closeness centrality, betweenness centrality and eigenvector
centrality to determine the influence factor of actors in an
online social network obtained from Facebook [9]. The study
shows that these three centrality measures are important in
measuring the influence of each user and as well as the
influence of the entire social network. Srinivas and
Velusamy [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ] presented an algorithm that combines degree
centrality and clustering coefficient to discover influential
nodes in three different datasets collected from Facebook.
The clustering coefficient feature is used to enhance the
traditional degree centrality. According to their study, the
nodes with the least degree indicated that they are more
connected and thus, the most influential. The algorithm is
found to be effective in discovering important nodes. In [
        <xref ref-type="bibr" rid="ref37">38</xref>
        ],
a criminal network is constructed and analysed using
PageRank and other centrality measures to identify key
criminals.
      </p>
    </sec>
    <sec id="sec-3">
      <title>2) Non-centrality measures</title>
      <p>In this subsection, we consider previous studies that
employed other techniques different from centrality
approach in detecting influential nodes.</p>
      <p>
        a) Information theory: Shetty and Adibi [
        <xref ref-type="bibr" rid="ref38">39</xref>
        ] presented
an information theory approach called graph entropy to
discover the dominant nodes within a social network. The
graph entropy of the entire network is determined every
time a user is removed from the network. The removal of
nodes that cause great disorder in the graph entropy are seen
as influential nodes. Furthermore, [
        <xref ref-type="bibr" rid="ref39">40</xref>
        ] described an entropy
measure based on Shannon measure of uncertainty. This
entropy is applied to networks whose traffic moves along
paths by transference. One great advantage of this measure
is nodes with betweenness score of zero can actually have
reasonable entropy values. In another developmental study,
Ortiz-Arroyo et al. [
        <xref ref-type="bibr" rid="ref40">41</xref>
        ] proposed two entropy-based
measures called connectivity entropy and centrality entropy.
The authors further demonstrated how the entropy-based
measure can effectively solve the two key player problems
[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Although their result is similar to that of combinatorial
optimisation algorithms the major setback for entropy
approach is it cannot work on large graphs. The approach is
computationally difficult to implement because it requires a
path finding algorithm to simplify the operation of the
entropy centrality.
      </p>
      <p>
        b) Activity Based: This measure focuses on the
activities between nodes in a social network. Goldenberg et
al.[
        <xref ref-type="bibr" rid="ref41">42</xref>
        ] claimed that some individuals are more important
than others based on their activity. The authors proposed an
activity based measure for identifying influential nodes by
selecting hub with high in-degree and out-degree in a
directed network. Heidemann et al. revealed that not all
connection links are active in a social network and the
active links are insignificant [
        <xref ref-type="bibr" rid="ref42">43</xref>
        ]. They proposed an
undirected activity based measure by modifying the
PageRank algorithm for discovering important nodes in the
network. The modified PageRank also considers the
weighted edges between the nodes.
      </p>
      <p>
        c) User Preferences and Attributes: Zhang et al.[
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]
developed an algorithm while trying to solve the influence
maximisation problem called greedy algorithm based on
user preferences (GAUP). The algorithm is applied along
with an extended independent cascade (EIC) model and
takes the user preferences into the influence diffusion
process, thus making it the first algorithm that mines the
top-k influential nodes based on user preferences while
trying to solve influence maximisation problem. This
algorithm surpasses the existing greedy algorithm that uses
independent cascade (IC) model. Canali and Lancellotti [
        <xref ref-type="bibr" rid="ref43">44</xref>
        ]
presented a numerical method of detecting key nodes in a
social network by considering the nodes‘ attributes
(personal information, nodes preferences, activities,
uploaded contents, content accesses). The desired attributes
of the nodes were collected and summed up using principal
component analysis (PCA). The dimension of the PCA is
matched with the nodes attributes and the dimension that
greatly reflect the nodes‘ attributes is considered in defining
a metric that determines the influential nodes in the social
network. For each metric selected, the authors ranked the
nodes and selected the top influential nodes accordingly.
      </p>
      <p>
        d) Profile based characteristics: Nodes interactions are
characterised as either popular, active or both. Eirinaki et al.
introduced a measure named ProfRank [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ], that uses the
popularity and activity characteristics to identify the most
influential nodes within a social network. The authors also
showed that the measure performed better than betweenness
centrality and Pagerank.
      </p>
      <p>
        e) Influence Graph: Agarwal et al.[
        <xref ref-type="bibr" rid="ref12">13</xref>
        ] argued that
influential bloggers are not necessarily active bloggers
(nodes) on a blogging website. The authors defined
statistical properties (recognition, activity generation,
novelty and eloquence) that are related to influence between
a blog post and proposed an influence graph model that
measures the influence of each blog post across the
community blog site. The influence is dependent on the
influence flow and additive weight function that regulates a
number of comments. The influence score is assigned to
each blog‘s post. The maximum influence score is selected
as the reference and its influence score as the blogger index.
Using this index, the bloggers are ranked accordingly to the
index and the most influential bloggers are the top ranked.
      </p>
      <p>
        f) ShaPley value-based: Narayanam and Narahari,
while trying to solve the influence maximisation problem
proposed an algorithm called ShaPley value-based
Influential Nodes (SPINs)[
        <xref ref-type="bibr" rid="ref13">14</xref>
        ]. Eventually, SPINs solved
the top-k nodes problem and -coverage problem. The
topk problem involves the discovery of a set of influential
nodes for maximising the spread of information. The
coverage problem focuses on the identifying the set of
influential nodes having least cardinality with which it is
possible to influence a fixed percentage, of the nodes in
the social network through the process of diffusion. The
authors showed that SPIN is computationally efficient when
compared to other existing greedy algorithms.
      </p>
      <p>
        g) Association Rule Learning: Erlandsson et al.
discovered influential nodes in a social network by applying
asocial rule learning. ―Association rule learning is a
machine learning technique that aims to find out how one
item affects another by analysing how frequently certain
items appear together in a specific dataset [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ]. ‗Association
rule learning is carried out by applying two norms, namely,
support and confidence. Support specifies the proportion of
such items, while confidence specifies how many times
those rules in the whole dataset are accurate. The influential
nodes are listed as nodes with a confidence level of 95% and
above. The technique is easy to implement and proven to be
similar to PageRank and degree centrality.
      </p>
      <p>III. IDENTIFYING INFLUENTIAL NODES IN A MOBILE PHONE</p>
      <p>NETWORK</p>
      <p>
        In this section, research methods that are applied in
detecting influential nodes in mobile phone networks were
discussed. Over time, researchers attempted to study and
analyse Call Detail Record (CDR) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ][
        <xref ref-type="bibr" rid="ref44">45</xref>
        ]. However, Mobile
Network Operator(s) (MNOs) are strongly reluctant to
release mobile phone data to the public due to privacy issue.
In cases where CDR is released to third parties, MNOs might
conceal the identity of their users or non-disclosure
agreement (NDA's) contract is involved in protecting
customers' privacy. But if the agreement fails, another way to
collect CDR from mobile phone users is to develop a
programme that extract users‘ log of activities. The
programme is usually installed on user‘s mobile phone and
each information retrieved from the user is stored in a
dedicated database [
        <xref ref-type="bibr" rid="ref45">46</xref>
        ]. The process is expensive and takes
longer time but the result worth it.
      </p>
      <p>
        Kiss and Bichler [
        <xref ref-type="bibr" rid="ref46">47</xref>
        ] compared the performances of
seven existing centrality measures including SenderRank, a
new technique which was developed by the authors, to
identify influential users in a social network constructed
from a dataset collected from a telecom company.
SenderRank and Out-degree centrality performed well in
determining the most central nodes in a network of calls
from a telecommunication company. In [
        <xref ref-type="bibr" rid="ref47">48</xref>
        ], degree
centrality and betweenness centrality were combined with
various seeding strategies to discover prominent nodes in an
anonymized mobile phone network and two other social
networks.
      </p>
      <p>
        Catanese et al. [
        <xref ref-type="bibr" rid="ref48">49</xref>
        ] proposed a tool called LogAnalysis
for scientific analysis of real phone call networks. This social
network analysis tool provides both statistical and visual
representation of real mobile phone network. Different
centrality measures are featured in the statistical operation of
this tool and they are used in ranking users according to how
important they are in the phone call networks. The
application of this tools is not only restricted to phone call
networks but can also be applied in investigating criminal
networks [
        <xref ref-type="bibr" rid="ref49">50</xref>
        ].
      </p>
      <p>
        Han et al. [
        <xref ref-type="bibr" rid="ref16">17</xref>
        ] presented a program called iWander that
runs on the mobile device of users (nodes). Random walk
messages are sent to the users at fixed length of time.
iWander determines the most influential users by computing
the centrality of each node based on the total random walk
messages received by each node. The authors carried out a
theoretical analysis of the program and showed that
influential nodes identified by iWander can regulate the
spread of communicable diseases and can further be used to
avoid a total epidemic. We summarised these methods in
Table 1.
      </p>
      <p>INFLUENTIAL NODES DETECTION TECHNIQUES IN MOBILE</p>
      <p>PHONE NETWORK</p>
      <p>We presented a background study on the detection of
influential nodes and considered the key player problems as
our focus in this study. We also discussed some of the
previous studies related to discovering the most important
and interesting nodes in a social network. We observed that
centrality measures are more general and effective in the
detection of influential nodes in social networks and mobile
phone network. Though, results of using non-centrality
measures are comparable to centrality measures approach.
Thus, the idea of combining two or more centrality measures
would improve detection and solve the influential nodes‘
detection problem.</p>
      <p>It would be quite interesting if this study can cover other
areas of communication network of wireless sensors, internet
hubs and access points.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] ‗The world in 2014: ICT Facts and Figures</article-title>
          . International Telecommunication Union.'
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C. A. R.</given-names>
            <surname>Pinheiro</surname>
          </string-name>
          , ‗Community Detection to Identify Fraud Events in Telecommunications Networks',
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. D.</given-names>
            <surname>Blondel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Decuyper</surname>
          </string-name>
          , and G. Krings, ‗
          <article-title>A survey of results on mobile phone datasets analysis'</article-title>
          ,
          <source>EPJ Data Science</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>1</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Farley</surname>
          </string-name>
          , ‗
          <article-title>Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)'</article-title>
          ,
          <source>Studies in Conflict &amp; Terrorism</source>
          , vol.
          <volume>26</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>399</fpage>
          -
          <lpage>411</lpage>
          , Nov.
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.-P.</given-names>
            <surname>Onnela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Saramäki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hyvönen</surname>
          </string-name>
          , G. Szabó,
          <string-name>
            <surname>M. A. De Menezes</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Kaski</surname>
            ,
            <given-names>A.-L.</given-names>
          </string-name>
          <string-name>
            <surname>Barabási</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kertész</surname>
          </string-name>
          , ‗
          <article-title>Analysis of a large-scale weighted network of one-to-one human communication'</article-title>
          ,
          <source>New Journal of Physics</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>6</issue>
          , p.
          <fpage>179</fpage>
          ,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Borgatti</surname>
          </string-name>
          , ‗
          <article-title>Identifying sets of key players in a social network', Computational</article-title>
          and Mathematical Organization Theory, vol.
          <volume>12</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>34</lpage>
          , Apr.
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Probst</surname>
          </string-name>
          , ‗Customer Relationship Management in a Digitally Connected World',
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , ‗
          <article-title>Identifying influential users in complex networks with community structure</article-title>
          .
          <source>KnowledgeBased Systems', Knowledge-Based Systems</source>
          , vol.
          <volume>42</volume>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2013</year>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahsan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and M.</given-names>
            <surname>Kumari</surname>
          </string-name>
          , ‗
          <article-title>Influential user detection in social network during community detection'</article-title>
          ,
          <source>in Cognitive Computing and Information Processing (CCIP)</source>
          , 2015 International Conference on,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Srinivas</surname>
          </string-name>
          and
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Velusamy</surname>
          </string-name>
          , ‗
          <article-title>Identification of influential users from social networks based on Enhanced Degree Centrality Measure'</article-title>
          ,
          <source>in Advance Computing Conference (IACC)</source>
          ,
          <year>2015</year>
          IEEE International,
          <year>2015</year>
          , pp.
          <fpage>1179</fpage>
          -
          <lpage>1184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Xia</surname>
          </string-name>
          , ‗
          <article-title>Identifying Key Users for Targeted Marketing by Mining Online Social Network'</article-title>
          ,
          <year>2010</year>
          , pp.
          <fpage>644</fpage>
          -
          <lpage>649</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Eirinaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. P. S.</given-names>
            <surname>Monga</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sundaram</surname>
          </string-name>
          , ‗
          <article-title>Identification of influential social networkers'</article-title>
          ,
          <source>Int. J. Web Based Communities</source>
          , vol.
          <volume>8</volume>
          , no.
          <source>No. 2</source>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>158</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Yu</surname>
          </string-name>
          , ‗
          <article-title>Identifying the influential bloggers in a community'</article-title>
          ,
          <source>in Proceedings of the 2008 international conference on web search and data mining</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>207</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Narayanam</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Narahari</surname>
          </string-name>
          , ‗
          <article-title>A Shapley Value-Based Approach to Discover Influential Users in Social Networks'</article-title>
          ,
          <source>IEEE Transactions on Automation Science and Engineering</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>147</lpage>
          , Jan.
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Erlandsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bródka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Borg</surname>
          </string-name>
          , and H. Johnson, ‗
          <article-title>Finding Influential Users in Social Media Using Association Rule Learning'</article-title>
          ,
          <source>Entropy</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>5</issue>
          , p.
          <fpage>164</fpage>
          ,
          <string-name>
            <surname>Apr</surname>
          </string-name>
          .
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mishra</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , ‗
          <article-title>Survey of various techniques for determining influential users in social networks'</article-title>
          ,
          <source>in Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)</source>
          , 2013 International Conference on,
          <year>2013</year>
          , pp.
          <fpage>398</fpage>
          -
          <lpage>403</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Srinivasan</surname>
          </string-name>
          , ‗
          <article-title>Your friends have more friends than you do: Identifying influential mobile users through random-walk sampling'</article-title>
          ,
          <source>IEEE/ACM Transactions on Networking</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>1389</fpage>
          -
          <lpage>1400</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Abraham</surname>
          </string-name>
          , Ed.,
          <source>Computational Social Networks</source>
          . London: Springer London,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lieberman</surname>
          </string-name>
          , ‗
          <article-title>Visualising big data: Social network analysis'</article-title>
          , in Digital research conference,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>D. M. B. Friedl</surname>
            and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Heidemann</surname>
          </string-name>
          , ‗
          <article-title>A critical review of centrality measures in social networks</article-title>
          .',
          <source>Business &amp; Information Systems Engineering</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>371</fpage>
          -
          <lpage>385</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bavelas</surname>
          </string-name>
          , ‗
          <article-title>Communication patterns in task-oriented groups</article-title>
          .,
          <volume>22</volume>
          (
          <issue>6</issue>
          )'.
          <source>J. Acoust. Soc. Am</source>
          ,
          <year>1950</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Okamoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.-Y.</given-names>
            <surname>Li</surname>
          </string-name>
          , ‗
          <article-title>Ranking of closeness centrality for large-scale social networks'</article-title>
          , in International Workshop on Frontiers in Algorithmics,
          <year>2008</year>
          , pp.
          <fpage>186</fpage>
          -
          <lpage>195</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Ahmet</given-names>
            <surname>Erdem</surname>
          </string-name>
          <article-title>Sarýyu¨ce, Kamer Kaya</article-title>
          , Erik Saule, and U¨ mit V.
          <article-title>C¸ atalyu¨rek, ‗Incremental closeness centrality in distributed memory.', Parallel Computing</article-title>
          , vol.
          <volume>47</volume>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>18</lpage>
          .,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L. C.</given-names>
            <surname>Freeman</surname>
          </string-name>
          , ‗
          <article-title>A Set of Measures of Centrality Based on Betweenness'</article-title>
          ,
          <source>Sociometry</source>
          , vol.
          <volume>40</volume>
          , no.
          <issue>1</issue>
          , p.
          <fpage>35</fpage>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>U.</given-names>
            <surname>Brandes</surname>
          </string-name>
          , ‗
          <article-title>A faster algorithm for betweenness centrality*'</article-title>
          ,
          <source>Journal of mathematical sociology</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>163</fpage>
          -
          <lpage>177</lpage>
          ,
          <year>2001</year>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Seeley</surname>
          </string-name>
          , ‗
          <article-title>The net of reciprocal influence: A problem in treating sociometric data</article-title>
          .',
          <source>Canadian Journal of Psychology</source>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>240</lpage>
          ,
          <year>1949</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>L.</given-names>
            <surname>Katz</surname>
          </string-name>
          , ‗
          <article-title>A new status index derived from sociometric analysis'</article-title>
          ,
          <source>Psychometrika</source>
          , vol.
          <volume>18</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>43</lpage>
          ,
          <year>1953</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>K.</given-names>
            <surname>Stephenson</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zelen</surname>
          </string-name>
          , ‗
          <article-title>Rethinking centrality: Methods and examples', Social Networks</article-title>
          , vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ballester</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Calv</surname>
          </string-name>
          <article-title>´o-</article-title>
          <string-name>
            <surname>Armengol</surname>
            , and
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Zenou</surname>
          </string-name>
          , ‗
          <article-title>―Who‖s who in crime networks. Wanted: the key player'</article-title>
          .', Discussion Paper 4421., vol.
          <volume>4421</volume>
          , no.
          <source>CERP</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sarangi</surname>
          </string-name>
          and E. Unlu, ‗
          <article-title>Key players and key groups in teams: A network approach using soccer data</article-title>
          .'
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>U.</given-names>
            <surname>Temurshoev</surname>
          </string-name>
          , ‗
          <article-title>Who's Who in Networks-Wanted: The Key Group'</article-title>
          ,
          <source>Available at SSRN 1285752</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>M. U.</given-names>
            <surname>Ilyas</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Radha</surname>
          </string-name>
          , ‗
          <article-title>A KLT-inspired user centrality for identifying influential neighborhoods in graphs'</article-title>
          ,
          <source>in Information Sciences and Systems (CISS)</source>
          ,
          <year>2010</year>
          44th Annual Conference on,
          <year>2010</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>M. U.</given-names>
            <surname>Ilyas</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Radha</surname>
          </string-name>
          , ‗
          <article-title>Identifying influential users in online social networks using principal component centrality'</article-title>
          ,
          <source>in Communications (ICC)</source>
          ,
          <year>2011</year>
          IEEE International Conference on,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Everett</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. P.</given-names>
            <surname>Borgatti</surname>
          </string-name>
          , ‗
          <article-title>The centrality of groups and classes'</article-title>
          ,
          <source>The Journal of mathematical sociology</source>
          , vol.
          <volume>23</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>201</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sheikhahmadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Nematbakhsh</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Shokrollahi</surname>
          </string-name>
          , ‗
          <article-title>Improving detection of influential nodes in complex networks'</article-title>
          ,
          <string-name>
            <surname>Physica</surname>
            <given-names>A</given-names>
          </string-name>
          :
          <string-name>
            <surname>Statistical</surname>
            <given-names>Mechanics</given-names>
          </string-name>
          <source>and its Applications</source>
          , vol.
          <volume>436</volume>
          , pp.
          <fpage>833</fpage>
          -
          <lpage>845</lpage>
          , Oct.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [36]
          <string-name>
            <surname>M. M. Sathik</surname>
            and
            <given-names>A. A.</given-names>
          </string-name>
          <string-name>
            <surname>Rasheed</surname>
          </string-name>
          , ‗
          <article-title>A centrality approach to identify sets of key players in an online weblog'</article-title>
          ,
          <source>International Journal of Recent Trends in Engineering</source>
          , vol.
          <volume>2</volume>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Zaman</surname>
          </string-name>
          , ‗
          <article-title>Information extraction with network centralities: finding rumor sources, measuring influence, and learning community structure'</article-title>
          , Massachusetts Institute of Technology,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>H.</given-names>
            <surname>Sarvari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Abozinadah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mbaziira</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Mccoy</surname>
          </string-name>
          , ‗Constructing and Analyzing Criminal Networks',
          <year>2014</year>
          , pp.
          <fpage>84</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shetty</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Adibi</surname>
          </string-name>
          , ‗
          <article-title>Discovering important users through graph entropy the case of enron email database'</article-title>
          ,
          <source>in Proceedings of the 3rd international workshop on Link discovery</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>F.</given-names>
            <surname>Tutzauer</surname>
          </string-name>
          , ‗
          <article-title>Entropy as a measure of centrality in networks characterized by path-transfer flow', Social Networks</article-title>
          , vol.
          <volume>29</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>249</fpage>
          -
          <lpage>265</lpage>
          , May
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ortiz-Arroyo</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. M. A.</given-names>
            <surname>Hussain</surname>
          </string-name>
          , ‗
          <article-title>An Information Theory Approach to Identify Sets of Key Players'</article-title>
          ,
          <source>in Intelligence and Security Informatics</source>
          , vol.
          <volume>5376</volume>
          ,
          <string-name>
            <surname>D.</surname>
            Ortiz-Arroyo,
            <given-names>H. L.</given-names>
          </string-name>
          <string-name>
            <surname>Larsen</surname>
            ,
            <given-names>D. D.</given-names>
          </string-name>
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Hicks</surname>
          </string-name>
          , and G. Wagner, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg,
          <year>2008</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>26</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>J.</given-names>
            <surname>Goldenberg</surname>
          </string-name>
          , S. Han,
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Lehmann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Hong</surname>
          </string-name>
          , ‗
          <article-title>The role of hubs in the adoption process'</article-title>
          ,
          <source>Journal of Marketing</source>
          , vol.
          <volume>73</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          ,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>J.</given-names>
            <surname>Heidemann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Klier</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Probst</surname>
          </string-name>
          , ‗
          <article-title>Identifying key users in online social networks: A PageRank based approach</article-title>
          ',
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>C.</given-names>
            <surname>Canali</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Lancellotti</surname>
          </string-name>
          , ‗
          <article-title>A quantitative methodology based on component analysis to identify key users in social networks'</article-title>
          ,
          <source>International Journal of Social Network Mining</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>50</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>F. C.</given-names>
            <surname>Perkins</surname>
          </string-name>
          <string-name>
            <surname>III</surname>
          </string-name>
          ,
          <article-title>System and method for processing call detail records</article-title>
          .
          <source>Google Patents</source>
          ,
          <year>2002</year>
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>A.</given-names>
            <surname>McDiarmid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Irvine</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Banford</surname>
          </string-name>
          , ‗Nodobo:
          <article-title>Detailed mobile phone usage dataset', Unpublished paper</article-title>
          , accessed at http://nodobo. com/papers/iet-el.
          <source>pdf on</source>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kiss</surname>
          </string-name>
          and Bichler Martin, ‗
          <article-title>Identification of influencers-measuring influence in customer networks', Decision Support Systems</article-title>
          , vol.
          <volume>46</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>233</fpage>
          -
          <lpage>253</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>O.</given-names>
            <surname>Hinz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Skiera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Barrot</surname>
          </string-name>
          , and J. U. Becker, ‗
          <article-title>Seeding strategies for viral marketing: An empirical comparison'</article-title>
          ,
          <source>Journal of Marketing</source>
          , vol.
          <volume>75</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>71</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>S.</given-names>
            <surname>Catanese</surname>
          </string-name>
          , E. Ferrara, and G. Fiumara, ‗
          <article-title>Forensic analysis of phone call networks', Social Network Analysis and Mining</article-title>
          , vol.
          <volume>3</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>33</lpage>
          , Mar.
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>E.</given-names>
            <surname>Ferrara</surname>
          </string-name>
          , P. De Meo,
          <string-name>
            <given-names>S.</given-names>
            <surname>Catanese</surname>
          </string-name>
          , and G. Fiumara, ‗
          <article-title>Detecting criminal organizations in mobile phone networks'</article-title>
          ,
          <source>Expert Systems with Applications</source>
          , vol.
          <volume>41</volume>
          , no.
          <issue>13</issue>
          , pp.
          <fpage>5733</fpage>
          -
          <lpage>5750</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>