DocumentCode :
1923294
Title :
Notice of Violation of IEEE Publication Principles
Novel Algorithms for Subgroup Detection in Terrorist Networks
Author :
Memon, N. ; Qureshi, A.R. ; Wiil, U.K. ; Hicks, D.L.
Author_Institution :
Dept. of Comput. Sci. & Eng., Aalborg Univ., Esbjerg
fYear :
2009
fDate :
16-19 March 2009
Firstpage :
572
Lastpage :
577
Abstract :
Notice of Violation of IEEE Publication Principles

"Novel Algorithms for Subgroup Detection in Terrorist Networks"
by Nasrullah Memon, Abdul Rasool Qureshi, Uffe Kock Wiil, and David L. Hicks
in the Proceedings of the 2009 International Conference on Availability, Reliability and Security, March 2009, pp. 572-577

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

This paper contains significant portions of original text from the papers cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper titles) and without permission. The lead author, Nasrullah Memon, was found to be solely responsible for the violation.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:

"Balancing Systematic and Flexible Exploration of Social Networks"
by Adam Perer, Ben Shneiderman
in the IEEE Transactions on Visualization and Computer Graphics, Vol. 12, No. 5
Sept/Oct 2006, pp. 693-700
"Mining for Offender Group Detection and Story of a Police Operation"
by Fatih Ozgul, Julian Bondy, Hakan Aksoy
in the Proceedings of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 70, December 2007, pp. 185-189

"The Exploratory Construction of Database Views"
by M.N. Smith, P.J.H. King
in Research Report BBKCS-02-02, School of Computer Science and Information Systems, Birbeck College, University of London. 2002. http://www.dcs.bbk.ac.uk/TriStarp/pubs/ECoDV2002.pdf

Discovery of the organizational structure of terrorist networks leads investigators- to terrorist cells. Therefore, detection of covert networks from terrorists\´ data is important to terrorism investigation and prevention of future terrorist activity. In this paper, we discuss this important area of subgroup detection in terrorist networks, propose novel algorithms for subgroup detection, and present a demonstration system that we have implemented.
Keywords :
data mining; social sciences computing; terrorism; covert networks; organizational structure; subgroup detection; terrorism investigation; terrorist activity; terrorist cells; terrorist networks; Algorithm design and analysis; Availability; Computer network reliability; Data analysis; Data mining; Intelligent networks; Law enforcement; Prototypes; Social network services; Terrorism; counterterrorism; iMiner; investigative data mining; subgroup detection; terrorist networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-3572-2
Type :
conf
DOI :
10.1109/ARES.2009.168
Filename :
5066528
Link To Document :
بازگشت