480
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Uncovering illicit supply networks and their interfaces to licit counterparts through graph-theoretic algorithms

ORCID Icon, ORCID Icon & ORCID Icon
Pages 224-240 | Received 16 Feb 2022, Accepted 12 Dec 2022, Published online: 31 Jan 2023

References

  • Akgun,V., Erkut, E. and Batta, R. (2000) On finding dissimilar paths. European Journal of Operational Research, 121(2), 232–246.
  • Albright, A., Brannan, P. and Scheel Stricker, A. (2010) Detecting and disrupting illicit nuclear trade after aq khan. The Washington Quarterly, 33(2), 85–106.
  • Anzoom, R., Nagi, R. and Vogiatzis, C. (2022a) A review of research in illicit supply-chain networks and new directions to thwart them. IISE Transactions, 54(2), 134–158.
  • Anzoom, R., Nagi, R. and Vogiatzis, C. (2022b) Data for “uncovering illicit supply networks and their interfaces to licit counterparts through graph theoretic algorithms”. Available at https://github.com/moonzadihsar/Dissimilar_Supply-Networks (accessed 1 November 2022).
  • Buchanan, A., Walteros, J.L., Butenko, S. and Pardalos, P.M. (2014) Solving maximum clique in sparse graphs: An O(nm + n2d/4) algorithm for d-degenerate graphs. Optimization Letters, 8(5), 1611–1617.
  • Carbonnel, J., Delahaye, D., Huchard, M. and Nebut, C. (2019) Graph-based variability modelling: Towards a classification of existing formalisms, in D. Endres, M. Alam, and D. Şotropa (eds.), Graph-Based Representation and Reasoning, ICCS 2019, Lecture Notes in Computer Science, Vol. 11530, Springer, Cham.
  • Carotenuto, P., Galiano, G., Giordani, S. and Riciardelli, S. (2004) Finding spatial dissimilar paths for hazmat shipments, in Proceedings of the Fifth Triennal Symposium on Transportation Analysis TRISTAN V Conference, Guadeloupe, 2004, CD-ROM.
  • Chauhan, S.S., Proth, J.M., Sarmiento, A.M. and Nag, R. (2006) Opportunistic supply chain formation from qualified partners for a new market demand. Journal of the Operational Research Society, 57(9), 1089–1099.
  • Chlebık, M. and Chlebıkova, J. (2008) The Steiner tree problem on graphs: Inapproximability results. Theoretical Computer Science, 406(3), 207–214.
  • Chondrogiannis, T., Bouros, P., Gamper, J., Leser, J. and Blumenthal, D.B. (2018) Finding k-dissimilar paths with minimum collective length, in Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL'18), pp. 404–407, Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/3274895.3274903.
  • Chudak, F.A., Roughgarden, T. and Williamson, D.P. (2004) Approximate kmsts and k-Steiner trees via the primal-dual method and Lagrangean relaxation. Mathematical Programming, 100(2), 411–421.
  • Coke-Hamilton, P. and Hardy, J. (2019) Illicit trade endangers the environment, the law and the sdgs. We need a global response, World Economic Forum, NY.
  • Crotty, S.M. and Bouche, V. (2018) The red-light network: Exploring the locational strategies of illicit massage businesses in Houston, Texas. Papers in Applied Geography, 4(2), 205–227.
  • Date, K., Gross, G.A. and Nagi, R. (2014) Test and evaluation of data association algorithms in hard + soft data fusion, in 17th International Conference on Information Fusion (FUSION), IEEE Press, Piscataway, NJ, pp. 1–8.
  • Dell’Olmo, P., Gentili, M. and Scozzari, A. (2005) On finding dissimilar paretooptimal paths. European Journal of Operational Research, 162(1), 70–82.
  • DeVos, M., McDonald, J. and Pivotto, I. (2016) Packing Steiner trees. Journal of Combinatorial Theory, Series B, 119, 178–213.
  • Economist Intelligence Unit (2018) Illicit Trade Environment Index. Available at http://illicittradeindex.eiu.com/.
  • Erkut, E. and Verter, V. (1998) Modeling of transport risk for hazardous materials. Operations Research, 46(5), 625–642.
  • Farrugia, S., Ellul, J. and Azzopardi, G. (2020) Detection of illicit accounts over the ethereum blockchain. Expert Systems with Applications, 150, 113318.
  • Garg, N., Konjevod, G. and Ravi, R. (2000) A polylogarithmic approximation algorithm for the group Steiner tree problem. Journal of Algorithms, 37(1), 66–84.
  • Gbadamosi, O.A. and Aremu, D.R. (2020) Design of a modified Dijkstra’s algorithm for finding alternate routes for shortest-path problems with huge costs, in 2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS), IEEE Press, Piscataway, NJ, pp. 1–6.
  • González Ordiano, J.Á., Finn, L., Winterlich, A., Moloney, G. and Simske, S. (2020) On the analysis of illicit supply networks using variable state resolution-Markov chains, in M.-J. Lesot, S. Vieira, M. Z. Reformat, J. P. Carvalho, A. Wilbik, B. Bouchon-Meunier, and R. Yager (eds.), International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, IPMU 2020, Communications in Computer and Information Science, Vol. 1237, Springer, Cham. https://doi.org/10.1007/978-3-030-50146-4_38.
  • Guanghua, W. and Zhanjiang, S. (2010) Application of ahp and Steiner tree problem in the location-selection of logistics’ distribution center, in 2010 International Conference on Networking and Digital Society, volume 1, IEEE Press, Piscataway, NJ, pp. 290–293.
  • Gurobi Optimization, LLC. (2022) Gurobi Optimizer Reference Manual. Available at https://www.gurobi.com.
  • Han, X., Liu, J., Liu, D., Liao, Q., Hu, J. and Yang, Y. (2014) Distribution network planning study with distributed generation based on Steiner tree model, in 2014 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), IEEE Press, Piscataway, NJ, pp. 1–5.
  • Hauptmann, M. and Karpinski, M. (2015) A compendium on Steiner tree problems, Department of Computer Science and Hausdorff Center for Mathematics, University of Bonn, Bonn, Germany.
  • Hegge, H.M.H. and Wortmann, J.C. (1991) Generic bill-of-material: A new product model. International Journal of Production Economics, 23(1), 117–128.
  • Hwang, F.K. and Richards, D.S. (1992) Steiner tree problems. Networks, 22(1), 55–89.
  • Ihler, E. (1991) The complexity of approximating the class Steiner tree problem, in G. Schmidt, and R. Berghammer (eds.), Graph-Theoretic Concepts in Computer Science, WG 1991, Lecture Notes in Computer Science, Vol. 570, Springer, Berlin, Heidelberg.
  • Jiao, J., Tseng, M.M., Ma, Q. and Zou, Y. (2000) Generic bill-of-materials-and-operations for high-variety production management. Concurrent Engineering, 8(4), 297–321.
  • Johnson, P.E., Joy, D.S., Clarke, D.B. and Jacobi, J.M. (1993) Highway 3.1: An enhanced highway routing model: Program description, methodology, and revised users manual. Technical report, Oak Ridge National Lab., TN, USA.
  • Kim, M., Choo, H., Mutka, M.W., Lim, H.-J. and Park, K. (2013) On QOS multicast routing algorithms using k-minimum Steiner trees. Information Sciences, 238, 190–204.
  • Ljubic, I. (2021) Solving Steiner trees: Recent advances, challenges, and perspectives. Networks, 77(2), 177–204.
  • Magliocca, N.R., McSweeney, K., Sesnie, S.E., Tellman, E., Devine, J.A., Nielsen, E.A., Pearson, Z. and Wrathall, D.J. (2019) Modeling cocaine traffickers and counterdrug interdiction forces as a complex adaptive system. Proceedings of the National Academy of Sciences, 116(16),7784–7792.
  • Mashiri, E. and Sebele-Mpofu, F.Y. (2015) Illicit trade, economic growth and the role of customs: A literature review. World Customs Journal, 9(2), 38–50.
  • Meneghini, C., Aziani, A. and Dugato, M. (2020) Modeling the structure and dynamics of transnational illicit networks: An application to cigarette trafficking. Applied Network Science, 5, 1–27.
  • Micara, A.G. (2012) Current features of the European Union regime for export control of dual-use goods. JCMS: Journal of Common Market Studies, 50(4), 578–593.
  • Moghanni, A., Pascoal, M. and Godinho, M.T. (2022) Finding shortest and dissimilar paths. International Transactions in Operational Research, 29, 1573–1601.
  • Moorman, D., Chen, Q., Tu, T.K., Boyd, Z.M. and Bertozzi, A.L. (2018) Filtering methods for subgraph matching on multiplex networks, in 2018 IEEE International Conference on Big Data (Big Data), IEEE Press, Piscataway, NJ, pp. 3980–3985.
  • Murty, K.G. (1968) An algorithm for ranking all the assignments in order of increasing cost. Operations Research, 16(3), 682–687.
  • OECD/EUIPO. (2019) Trends in Trade in Counterfeit and Pirated Goods, Illicit Trade, OECD Publishing, Paris. https://doi.org/10.1787/g2g9f533-en.
  • Pan, F. and Nagi, R. (2013) Multi-echelon supply chain network design in agile manufacturing. Omega, 41(6), 969–983.
  • Romanowski, C.J. and Nagi, R. (2004) A data mining approach to forming generic bills of materials in support of variant design activities. Journal of Computer Information Science and Engineering, 4(4), 316–328.
  • Romanowski, C.R., Nagi, R. and Sudit, M. (2006) Data mining in an engineering design environment: OR applications from graph matching. Computers & Operations Research, 33(11), 3150–3160.
  • S & P Global Market Intelligence. (2022) Panjiva Supply Chain Intelligence. Available at https://www.spglobal.com/marketintelligence/en/solutions/panjiva-supply-chain-intelligence.
  • Savoy, C.M. and Ramanujam, S.R. (2022) Diversifying supply chains: The role of development assistance and other official finance, Center For Strategic and International Studies, Washington, DC, USA. Available at https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/220610_Savoy_Diversifying_SupplyChains.pdf?VersionId=amuNJudMyT6DQd27i.9YafkUvcsSNoIp.
  • Sin, S. and Boyd, M. (2016) Searching for the nuclear silk road: Geospatial analysis of potential illicit radiological and nuclear material trafficking pathways, in, Nuclear Terrorism, Routledge, New York, pp. 159–181.
  • Wedekind, H. and Muller, T. (1981) Stucklistenorganisation bei einer grossen variantenanzahl. Angewandte Informatik, 23(9), 377–383.
  • World Economic Forum. (2012) Network of global agenda councils reports 2011-2012, NY, USA. Available at https://www.weforum.org/reports/network-global-agenda-councils-reports-2011-2012/.
  • World Population Review. (2022) Crime Rate By State 2022. Available at https://worldpopulationreview.com/state-rankings/crime-rate-by-state.
  • Zhao, M. (2019) The illicit distribution of precursor chemicals in China: A qualitative and quantitative analysis. International Journal for Crime, Justice and Social Democracy, 8(2), 106–120.
  • Zhu, S., Cheng, D., Xue, K. and Zhang, X. (2007) A unified bill of material based on step/xml, in W. Shen, J. Luo, Z. Lin, JP.A. Barthès, and Q. Hao (eds.), Computer Supported Cooperative Work in Design III, CSCWD 2006, Lecture Notes in Computer Science, Vol. 4402, Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72863-4_28.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.