Illicit network structures in cyberspace | IEEE Conference Publication | IEEE Xplore