IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Applying Graph Theory to Detect Cases of Money Laundering and Terrorism Financing

Applying Graph Theory to Detect Cases of Money Laundering and Terrorism Financing
View Sample PDF
Author(s): Natalia G. Miloslavskaya (National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Russia), Andrey Nikiforov (National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Russia), Kirill Plaksiy (National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Russia) and Alexander Tolstoy (National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Russia)
Copyright: 2020
Pages: 23
Source title: Handbook of Research on Advanced Applications of Graph Theory in Modern Society
Source Author(s)/Editor(s): Madhumangal Pal (Vidyasagar University, India), Sovan Samanta (Tamralipta Mahavidyalaya, India) and Anita Pal (National Institute of Technology Durgapur, India)
DOI: 10.4018/978-1-5225-9380-5.ch012

Purchase

View Applying Graph Theory to Detect Cases of Money Laundering and Terrorism Financing on the publisher's website for pricing and purchasing information.

Abstract

A technique to automate the generation of criminal cases for money laundering and financing of terrorism (ML/FT) based on typologies is proposed. That will help an automated system from making a decision about the exact coincidence when comparing the case objects and their links with those in the typologies. Several types of subgraph changes (mutations) are examined. The main goal to apply these mutations is to consider other possible ML/FT variants that do not correspond explicitly to the typologies but have a similar scenario. Visualization methods like the graph theory are used to order perception of data and to reduce its volumes. This work also uses the foundations of information and financial security. The research demonstrates possibilities of applying the graph theory and big data tools in investigating information security incidents. A program has been written to verify the technique proposed. It was tested on case graphs built on the typologies under consideration.

Related Content

Arunaben Prahladbhai Gurjar, Shitalben Bhagubhai Patel. © 2022. 30 pages.
Meghna Babubhai Patel, Jagruti N. Patel, Upasana M. Bhilota. © 2022. 10 pages.
Vo Ngoc Phu, Vo Thi Ngoc Tran. © 2022. 27 pages.
Steven Walczak. © 2022. 17 pages.
Priyanka P. Patel, Amit R. Thakkar. © 2022. 26 pages.
Vo Ngoc Phu, Vo Thi Ngoc Tran. © 2022. 34 pages.
Sarat Chandra Nayak, Subhranginee Das, Bijan Bihari Misra. © 2022. 20 pages.
Body Bottom