2008 |
16 | EE | Nasrullah Memon,
Nicholas Harkiolakis,
David L. Hicks:
Detecting high-value individuals in covert networks: 7/7 London bombing case study.
AICCSA 2008: 206-215 |
15 | EE | Nasrullah Memon,
David L. Hicks:
Detecting Key Players in 11-M Terrorist Network: A Case Study.
ARES 2008: 1254-1259 |
14 | | Nicholas Harkiolakis,
Nasrullah Memon,
David L. Hicks,
Claus Atzenbeck:
Revealing Topological Properties of Terrorist Networks.
IC-AI 2008: 238-244 |
13 | EE | Nasrullah Memon,
Henrik Legind Larsen,
David L. Hicks,
Nicholas Harkiolakis:
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies.
ISI Workshops 2008: 477-489 |
12 | EE | Claus Atzenbeck,
David L. Hicks,
Nasrullah Memon:
Emergent Structure and Awareness Support for Intelligence Analysis.
IV 2008: 326-332 |
2007 |
11 | EE | Nasrullah Memon,
David L. Hicks,
Henrik Legind Larsen:
How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks.
ADMA 2007: 430-441 |
10 | EE | Nasrullah Memon,
Kim C. Kristoffersen,
David L. Hicks,
Henrik Legind Larsen:
Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network.
ARES 2007: 861-870 |
9 | | Nasrullah Memon:
A First Look on iMiner' s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network.
IMECS 2007: 707-715 |
8 | EE | Nasrullah Memon,
David L. Hicks,
Henrik Legind Larsen:
Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks.
ISI 2007: 366 |
7 | EE | Nasrullah Memon,
David L. Hicks,
Henrik Legind Larsen:
Harvesting Terrorists Information from Web.
IV 2007: 664-671 |
6 | EE | Nasrullah Memon,
David L. Hicks,
Henrik Legind Larsen,
Muhammad Aslam Uqaili:
Understanding the structure of terrorist networks.
IJBIDM 2(4): 401-425 (2007) |
2006 |
5 | EE | Nasrullah Memon,
Henrik Legind Larsen:
Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining.
ADMA 2006: 1037-1048 |
4 | EE | Nasrullah Memon,
Henrik Legind Larsen:
Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks.
ARES 2006: 906-913 |
3 | | Nasrullah Memon,
Henrik Legind Larsen:
Structural Analysis and Destabilizing Terrorist Networks.
DMIN 2006: 296-302 |
2 | EE | Nasrullah Memon,
Henrik Legind Larsen:
Practical Algorithms for Destabilizing Terrorist Networks.
ISI 2006: 389-400 |
2004 |
1 | | Nasrullah Memon,
Daniel Ortiz Arroyo,
Henrik Legind Larsen:
Investigative Data Mining: A General Framework.
International Conference on Computational Intelligence 2004: 384-387 |