Identifying threatening networks from transactional data | IEEE Conference Publication | IEEE Xplore