7 results on '"Fiumara G."'
Search Results
2. Correlation Analysis of Node and Edge Centrality Measures in Artificial Complex Networks
- Author
-
Giacomo Fiumara, Annamaria Ficara, Antonio Liotta, Pasquale De Meo, Yang, XS, Sherratt, S, Dey, N, Joshi, A, Ficara A., Fiumara G., De Meo P., and Liotta A.
- Subjects
Theoretical computer science ,Settore INF/01 - Informatica ,Computational complexity theory ,Social network ,Computer science ,business.industry ,Node (networking) ,Complex networks ,Complex network ,Social network analysis ,K-path ,Betweenness centrality ,Centrality measures ,Correlation coefficients ,Centrality ,business ,Clustering coefficient - Abstract
The role of an actor in a social network is identified through a set of measures called centrality. Degree centrality, betweenness centrality, closeness centrality, and clustering coefficient are the most frequently used metrics to compute the node centrality. Their computational complexity in some cases makes unfeasible, when not practically impossible, their computations. For this reason, we focused on two alternative measures, WERW-Kpath and Game of Thieves, which are at the same time highly descriptive and computationally affordable. Our experiments show that a strong correlation exists between WERW-Kpath and Game of Thieves and the classical centrality measures. This may suggest the possibility of using them as useful and more economic replacements of the classical centrality measures.
- Published
- 2021
- Full Text
- View/download PDF
3. Correlations among Game of Thieves and other centrality measures in complex networks
- Author
-
Antonio Liotta, Giacomo Fiumara, Pasquale De Meo, Annamaria Ficara, Fortino, G, Liotta, A, Gravina, R, Longheu, A, Ficara A., Fiumara G., De Meo P., and Liotta A.
- Subjects
Social and Information Networks (cs.SI) ,FOS: Computer and information sciences ,Theoretical computer science ,Centrality measure ,Degree (graph theory) ,Settore INF/01 - Informatica ,Computer science ,Closeness ,Social network analysi ,Computer Science - Social and Information Networks ,Complex network ,Betweenness centrality ,Correlation coefficients ,Centrality ,Time complexity ,Social network analysis ,Clustering coefficient - Abstract
Social Network Analysis (SNA) is used to study the exchange of resources among individuals, groups, or organizations. The role of individuals or connections in a network is described by a set of centrality metrics which represent one of the most important results of SNA. Degree, closeness, betweenness and clustering coefficient are the most used centrality measures. Their use is, however, severely hampered by their computation cost. This issue can be overcome by an algorithm called Game of Thieves (GoT). Thanks to this new algorithm, we can compute the importance of all elements in a network (i.e. vertices and edges), compared to the total number of vertices. This calculation is done not in a quadratic time, as when we use the classical methods, but in polylogarithmic time. Starting from this we present our results on the correlation existing between GoT and the most widely used centrality measures. From our experiments emerge that a strong correlation exists, which makes GoT eligible as a centrality measure for large scale complex networks.
- Published
- 2020
4. Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia
- Author
-
Pasquale De Meo, Giacomo Fiumara, Wei Song, Ovidiu Bagdasar, Salvatore Catanese, Lucia Cavallaro, Antonio Liotta, Annamaria Ficara, Cavallaro L., Ficara A., De Meo P., Fiumara G., Catanese S., Bagdasar O., Song W., and Liotta A.
- Subjects
FOS: Computer and information sciences ,Economics ,Computer science ,0211 other engineering and technologies ,Social Sciences ,Criminology ,02 engineering and technology ,computer.software_genre ,Social Networking ,Sociology ,Statistics - Machine Learning ,Centrality ,Criminals ,Humans ,Sicily ,Social network analysis ,Human Capital ,Multidisciplinary ,Settore INF/01 - Informatica ,05 social sciences ,Computer Science - Social and Information Networks ,Police ,Professions ,Social Networks ,Medicine ,Crime ,Network Analysis ,Research Article ,Network analysis ,Computer and Information Sciences ,Science ,Machine Learning (stat.ML) ,Computer security ,Network Resilience ,Human capital ,Betweenness centrality ,Resilience (network) ,0505 law ,Block (data storage) ,Social and Information Networks (cs.SI) ,021110 strategic, defence & security studies ,Social network ,business.industry ,Node (networking) ,Communications ,People and Places ,050501 criminology ,Population Groupings ,business ,computer - Abstract
Compared to other types of social networks, criminal networks present hard challenges, due to their strong resilience to disruption, which poses severe hurdles to law-enforcement agencies. Herein, we borrow methods and tools from Social Network Analysis to (i) unveil the structure of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently disrupt them. Mafia networks have peculiar features, due to the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts are also faced with the difficulty in collecting reliable datasets that accurately describe the gangs' internal structure and their relationships with the external world, which is why earlier studies are largely qualitative, elusive and incomplete. An added value of our work is the generation of two real-world datasets, based on raw data derived from juridical acts, relating to a Mafia organization that operated in Sicily during the first decade of 2000s. We created two different networks, capturing phone calls and physical meetings, respectively. Our network disruption analysis simulated different intervention procedures: (i) arresting one criminal at a time (sequential node removal); and (ii) police raids (node block removal). We measured the effectiveness of each approach through a number of network centrality metrics. We found Betweeness Centrality to be the most effective metric, showing how, by neutralizing only the 5% of the affiliates, network connectivity dropped by 70%. We also identified that, due the peculiar type of interactions in criminal networks (namely, the distribution of the interactions frequency) no significant differences exist between weighted and unweighted network analysis. Our work has significant practical applications for tackling criminal and terrorist networks., 12 pages, 4 figures, paper submitted to PLOS ONE Journal
- Published
- 2020
5. Social Network Analysis of Sicilian Mafia Interconnections
- Author
-
Giacomo Fiumara, Ovidiu Bagdasar, Annamaria Ficara, Salvatore Catanese, Lucia Cavallaro, Pasquale De Meo, Antonio Liotta, Cherifi, H, Gaito, S, Mendes, JF, Moro, E, Rocha, LM, Ficara A., Cavallaro L., De Meo P., Fiumara G., Catanese S., Bagdasar O., and Liotta A.
- Subjects
Focus (computing) ,Settore INF/01 - Informatica ,Computer science ,Social network analysis (criminology) ,Complex networks ,Graph theory ,Complex network ,Data science ,Criminal networks ,language.human_language ,Phone ,Terrorism ,Social Network Analysis ,language ,Sicilian - Abstract
In this paper, we focus on the study of Sicilian Mafia organizations through Social Network Analysis. We analyse datasets reflecting two different Mafia Families, based on examinations of digital trails and judicial documents, respectively. The first dataset includes the phone calls logs among suspected individuals. The second one is based on police traces of meeting that have taken place among different types of criminals. Our breakthrough is twofold. First in the method followed to generate these new datasets. Second, in the method used to carry out a quantitative phenomena investigation that are hard to evaluate. Our networks are weighted ones, with each weight catching the frequency of interactions between criminals. Therefore, our analysis focuses on weight and shortest paths distributions in both networks. We identify new types of unusual interactions in the Mafia networks, leading to substantial differences between Mafia networks and other types of criminal or terrorist networks.
- Published
- 2020
6. Robust link prediction in criminal networks: A case study of the Sicilian Mafia
- Author
-
Giacomo Fiumara, Pasquale De Meo, Annamaria Ficara, Salvatore Catanese, Francesco Calderoni, Calderoni F., Catanese S., De Meo P., Ficara A., and Fiumara G.
- Subjects
0209 industrial biotechnology ,Computer science ,Settore SPS/12 - SOCIOLOGIA GIURIDICA, DELLA DEVIANZA E MUTAMENTO SOCIALE ,Network science ,02 engineering and technology ,Machine learning ,computer.software_genre ,Criminal networks ,Social group ,Social network analysis ,020901 industrial engineering & automation ,Artificial Intelligence ,Link prediction in uncertain graphs ,0202 electrical engineering, electronic engineering, information engineering ,Link (knot theory) ,Settore INF/01 - Informatica ,business.industry ,General Engineering ,Law enforcement ,Settore ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI ,16. Peace & justice ,language.human_language ,Computer Science Applications ,language ,Topological graph theory ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Sicilian ,computer - Abstract
Link prediction exercises may prove particularly challenging with noisy and incomplete networks, such as criminal networks. Also, the link prediction effectiveness may vary across different relations within a social group. We address these issues by assessing the performance of different link prediction algorithms on a mafia organization. The analysis relies on an original dataset manually extracted from the judicial documents of operation “Montagna”, conducted by the Italian law enforcement agencies against individuals affiliated with the Sicilian Mafia. To run our analysis, we extracted two networks: one including meetings and one recording telephone calls among suspects, respectively. We conducted two experiments on these networks. First, we applied several link prediction algorithms and observed that link prediction algorithms leveraging the full graph topology (such as the Katz score) provide very accurate results even on very sparse networks. Second, we carried out extensive simulations to investigate how the noisy and incomplete nature of criminal networks may affect the accuracy of link prediction algorithms. The experimental findings suggest the soundness of link predictions is relatively high provided that only a limited amount of knowledge about connections is hidden or missing, and the unobserved edges follow some kind of generative law. The different results on the meeting and telephone call networks indicate that the specific features of a network should be taken into careful consideration.
- Published
- 2020
- Full Text
- View/download PDF
7. An empirical comparison of algorithms to find communities in directed graphs and their application in Web Data Analytics
- Author
-
Giacomo Fiumara, Athanasios V. Vasilakos, Giuseppe M. L. Sarné, Sebastiano Piccolo, Santa Agreste, Pasquale De Meo, Domenico Rosaci, Giuseppe Piccione, Agreste, S, DE MEO, P, Fiumara, G, Piccione, G, Piccolo, S, Rosaci, D, Sarne', G, and Vasilakos, A
- Subjects
community detection and clustering ,Information Systems and Management ,Theoretical computer science ,Empirical comparison ,Computer science ,Microblogging ,Big data ,02 engineering and technology ,computer.software_genre ,graph analytics ,Web data analytics ,Graph Analytic ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Social media ,Eigenvalues and eigenvectors ,Web data analytics, graph analytics, community detection and clustering, directed graphs ,business.industry ,Directed graph ,directed graphs ,Web Data Analytic ,Scalability ,Data analysis ,020201 artificial intelligence & image processing ,Algorithm design ,Data mining ,business ,Algorithm ,computer ,MathematicsofComputing_DISCRETEMATHEMATICS ,Information Systems - Abstract
Detecting communities in graphs is a fundamental tool to understand the structure of Web-based systems and predict their evolution. Many community detection algorithms are designed to process undirected graphs (i.e., graphs with bidirectional edges) but many graphs on the Web-e.g., microblogging Web sites, trust networks or the Web graph itself-are often directed . Few community detection algorithms deal with directed graphs but we lack their experimental comparison. In this paper we evaluated some community detection algorithms across accuracy and scalability. A first group of algorithms (Label Propagation and Infomap) are explicitly designed to manage directed graphs while a second group (e.g., WalkTrap) simply ignores edge directionality; finally, a third group of algorithms (e.g., Eigenvector) maps input graphs onto undirected ones and extracts communities from the symmetrized version of the input graph. We ran our tests on both artificial and real graphs and, on artificial graphs, WalkTrap achieved the highest accuracy, closely followed by other algorithms; Label Propagation has outstanding performance in scalability on both artificial and real graphs. The Infomap algorithm showcased the best trade-off between accuracy and computational performance and, therefore, it has to be considered as a promising tool for Web Data Analytics purposes.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.