Finding conspirators in criminal network | IEEE Conference Publication | IEEE Xplore