Abstract

Notice of Violation of IEEE Publication Principles<br><br> "Practical Algorithms and Mathematical Models for Destabilizing Terrorist Networks" <br> by Nasrullah Memon, David Hicks, Dil Muhammad Akbar Hussein, and Henrik Legind Larsen in the Proceedings of the 2007 Military Communications Conference (MILCOM), October 2007<br><br> After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. <br><br> This paper has copied portions of text from the sources cited below. The lead author, Nasrullah Memon, was found to be solely responsible for the violation. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. <br><br> "Countering Terrorism Through Information and Privacy Technologies" <br> by Robert Popp, John Poindexter<br> in IEEE Security and Privacy, Vol 4, No. 6, November 2006<br><br> Data Mining: Concepts and Techniques (second edition), <br> by Jiawei Han and Micheline Kamber<br> Morgan Kaufmann, Elsevier, 2006<br><br> "Rethinking Centrality: Methods and Examples" <br> by Stephenson, Karen and Zelen, Marvin<br> in Social Networks, 11, 1989<br><br> Chapter 3: Centrality Indices<br> by D. Koschützki, K.A. Lehmann, L. Peeters, S. Richter, D. Tenfelde- Podehl, O. Zlotowski in Network Analysis: Methodological Foundations, Springer, 2005<br><br> "How the Science of Complex Networks Can Help Developing Strategies Against Terrorism" <br> by Vito Latora, Massimo Marchiori<br> in Chaos, Solitons and Fractals, 20 Elsevier, 2004 <br><br> "The Gatekeeper, Pair-dependency and Structural Centrality" <br> by Linton C. Freeman<br> in Quality and Quantity, 14, Elsevier, 1980, pp. 585-592<br><br> "Harmony and Disharmony-Exploiting al-Qa'ida's Organizational Vulnerabilities" <br> Combating Terrorism Center, Dept of Social Sciences, US Military Academy, February 2006<br><br> "Reconstruct the Hierarchical Structure in a Complex Network" <br> by Huijie Yang, Wenxu Wang, Tao Zhou, Binghong Wang, Fangcui Zhao August 2005<br><br> <br/> We employ practical algorithms and mathematical models for destabilizing terrorist networks. We present two case studies and show how terrorist networks could be destabilized using investigative data mining.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.