DocumentCode
1923294
Title
Notice of Violation of IEEE Publication Principles
Novel Algorithms for Subgroup Detection in Terrorist Networks
Author
Memon, N. ; Qureshi, A.R. ; Wiil, U.K. ; Hicks, D.L.
Author_Institution
Dept. of Comput. Sci. & Eng., Aalborg Univ., Esbjerg
fYear
2009
fDate
16-19 March 2009
Firstpage
572
Lastpage
577
Abstract
Notice of Violation of IEEE Publication Principles
"Novel Algorithms for Subgroup Detection in Terrorist Networks"
by Nasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks
in the Proceedings of the 2009 International Conference on Availability, Reliability and Security, March 2009, pp. 572-577
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the papers cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper titles) and without permission. The lead author, Nasrullah Memon, was found to be solely responsible for the violation.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:
"Balancing Systematic and Flexible Exploration of Social Networks"
by Adam Perer, Ben Shneiderman
in the IEEE Transactions on Visualization and Computer Graphics, Vol. 12, No. 5
Sept/Oct 2006, pp. 693-700
"Mining for Offender Group Detection and Story of a Police Operation"
by Fatih Ozgul, Julian Bondy, Hakan Aksoy
in the Proceedings of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 70, December 2007, pp. 185-189
"The Exploratory Construction of Database Views"
by M.N. Smith, P.J.H. King
in Research Report BBKCS-02-02, School of Computer Science and Information Systems, Birbeck College, University of London. 2002. http://www.dcs.bbk.ac.uk/TriStarp/pubs/ECoDV2002.pdf
Discovery of the organizational structure of terrorist networks leads investigators- to terrorist cells. Therefore, detection of covert networks from terrorists\´ data is important to terrorism investigation and prevention of future terrorist activity. In this paper, we discuss this important area of subgroup detection in terrorist networks, propose novel algorithms for subgroup detection, and present a demonstration system that we have implemented.
"Novel Algorithms for Subgroup Detection in Terrorist Networks"
by Nasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks
in the Proceedings of the 2009 International Conference on Availability, Reliability and Security, March 2009, pp. 572-577
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the papers cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper titles) and without permission. The lead author, Nasrullah Memon, was found to be solely responsible for the violation.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:
"Balancing Systematic and Flexible Exploration of Social Networks"
by Adam Perer, Ben Shneiderman
in the IEEE Transactions on Visualization and Computer Graphics, Vol. 12, No. 5
Sept/Oct 2006, pp. 693-700
"Mining for Offender Group Detection and Story of a Police Operation"
by Fatih Ozgul, Julian Bondy, Hakan Aksoy
in the Proceedings of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 70, December 2007, pp. 185-189
"The Exploratory Construction of Database Views"
by M.N. Smith, P.J.H. King
in Research Report BBKCS-02-02, School of Computer Science and Information Systems, Birbeck College, University of London. 2002. http://www.dcs.bbk.ac.uk/TriStarp/pubs/ECoDV2002.pdf
Discovery of the organizational structure of terrorist networks leads investigators- to terrorist cells. Therefore, detection of covert networks from terrorists\´ data is important to terrorism investigation and prevention of future terrorist activity. In this paper, we discuss this important area of subgroup detection in terrorist networks, propose novel algorithms for subgroup detection, and present a demonstration system that we have implemented.
Keywords
data mining; social sciences computing; terrorism; covert networks; organizational structure; subgroup detection; terrorism investigation; terrorist activity; terrorist cells; terrorist networks; Algorithm design and analysis; Availability; Computer network reliability; Data analysis; Data mining; Intelligent networks; Law enforcement; Prototypes; Social network services; Terrorism; counterterrorism; iMiner; investigative data mining; subgroup detection; terrorist networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location
Fukuoka
Print_ISBN
978-1-4244-3572-2
Type
conf
DOI
10.1109/ARES.2009.168
Filename
5066528
Link To Document