Title: Notice of Violation of IEEE Publication Principles - Detecting high-value individuals in covert networks: 7/7 London bombing case study
Abstract: Notice of Violation of IEEE Publication Principles<br><br> "Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study" <br> by Nasrullah Memon, Nicholas Harkiolakis, and David L. Hicks<br> Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, March 2008, pp. 206-215<br><br> After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. <br><br> This paper has copied portions of text from the sources cited below. The lead author, Nasrullah Memon, was found to be solely responsible for the violation. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. <br><br> "Untangling Criminal Networks: A Case Study" <br> by Jennifer Xu, Hsinchun Chen<br> in the Proceedings of the First NSF/NIJ Symposium Intelligence and Security Informatics, ISI, June 2003<br><br> "Countering Terrorism Through Information and Privacy Technologies" <br> by Robert Popp, John Poindexter<br> in IEEE Security and Privacy, Vol 4, No. 6, November 2006<br><br> NetIntel: A Database for Manipulation of Rich Social Network Data<br> by Maksim Tsvetovat, Jana Diesner, Kathleen M. Carley<br> Carnegie Mellon University School of Computer Science ISRI - Institute for Software Research International CASOS - Center for Computational Analysis of Social and Organizational Systems: CMU-ISRI-04-135, March 2005<br><br> "Applications of Bayesian Belief Networks in Social Network Analysis" <br> by David Koelle, Jonathan Pfautz, Michael Farry, Zach Cox, Geoffrey Catto, Joseph<br> Campolongo<br> in the Proceedings of the 4th Bayesian Modeling Applications Workshop during the 22nd Annual Conference on Uncertainty in Artificial Intelligence: UAI '06, July 2006<br><br> "Rethinking Centrality: Methods and Examples" <br> by Karen Stephenson and Marvin Zelen, <br> in Social Networks, 11, 1989<br><br> Chapter 3 Centrality Indices<br> by D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. Zlotowski in Network Analysis: Methodological Foundations, Springer 2005<br><br> "How the Science of Complex Networks Can Help Developing Strategies Against Terrorism" <br> by Vito Latora, Massimo Marchiori<br> in Chaos, Solitons and Fractals, 20, Elsevier, 2004<br> Data Mining: Concepts and Techniques (second edition), <br> by Jiawei Han, Micheline Kamber<br> Morgan Kaufmann, Elsevier, 2006<br><br> "Network Theory and Small Groups" <br> by Nancy Katz, David Lazer, Holly Arrow, Noshir Contractor<br> in Small Group Research, 35 (3), June 2004, pp. 307-332<br><br> "A Social Network Analysis of Aum Shinrikyo: Understanding Terrorism in Australia" <br> by Stuart A. Koschade<br> in Social Change in the 21st Century Conference, October 2005<br><br> "Data Mining and Data Analysis for Counterterrorism" <br> by Mary DeRosa<br> Center for Strategic and International Studies, The CSIS Press, 2004<br><br> "The Gatekeeper, Pair-dependency and Structural Centrality" <br> by Linton C. Freeman<br> in Quality and Quantity, 14, Elsevier, 1980, pp. 585-592<br><br> "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research" <br> by Steve Ressler<br> in Homeland Security Affairs, 2 (2), Naval Postgraduate School Center for Homeland Defense and Security, July 2006<br><br> "Violent Jihad in the Netherlands: Current Trends in the Islamist Terrorist Threat" <br> Ministry of the Interior and Kingdom Relations, March 2006<br><br> "Reconstruct the Hierarchical Structure in a Complex Network" <br> by Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao August 2005<br><br> "Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threat of Terrorism" <br> by Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker, Marc Sageman, Hsinchun Chen<br> in the Symposium on Intelligence and Security Informatics (ISI2004), Springer, 2004<br><br> <br/> This article focuses on the study and development of recently introduced new measures, theories, mathematical models and algorithms to detect high value individuals in terrorist networks. Specific models and tools are described, and applied to a case study to demonstrate their applicability to the area. We are confident that the models described can help intelligence agencies in understanding and dealing with terrorist networks.
Publication Year: 2008
Publication Date: 2008-03-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 20
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot