dblp.uni-trier.dewww.uni-trier.de

Nasrullah Memon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EENasrullah Memon, Nicholas Harkiolakis, David L. Hicks: Detecting high-value individuals in covert networks: 7/7 London bombing case study. AICCSA 2008: 206-215
15EENasrullah Memon, David L. Hicks: Detecting Key Players in 11-M Terrorist Network: A Case Study. ARES 2008: 1254-1259
14 Nicholas Harkiolakis, Nasrullah Memon, David L. Hicks, Claus Atzenbeck: Revealing Topological Properties of Terrorist Networks. IC-AI 2008: 238-244
13EENasrullah Memon, Henrik Legind Larsen, David L. Hicks, Nicholas Harkiolakis: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. ISI Workshops 2008: 477-489
12EEClaus Atzenbeck, David L. Hicks, Nasrullah Memon: Emergent Structure and Awareness Support for Intelligence Analysis. IV 2008: 326-332
2007
11EENasrullah Memon, David L. Hicks, Henrik Legind Larsen: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. ADMA 2007: 430-441
10EENasrullah Memon, Kim C. Kristoffersen, David L. Hicks, Henrik Legind Larsen: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. ARES 2007: 861-870
9 Nasrullah Memon: A First Look on iMiner' s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network. IMECS 2007: 707-715
8EENasrullah Memon, David L. Hicks, Henrik Legind Larsen: Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks. ISI 2007: 366
7EENasrullah Memon, David L. Hicks, Henrik Legind Larsen: Harvesting Terrorists Information from Web. IV 2007: 664-671
6EENasrullah Memon, David L. Hicks, Henrik Legind Larsen, Muhammad Aslam Uqaili: Understanding the structure of terrorist networks. IJBIDM 2(4): 401-425 (2007)
2006
5EENasrullah Memon, Henrik Legind Larsen: Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining. ADMA 2006: 1037-1048
4EENasrullah Memon, Henrik Legind Larsen: Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks. ARES 2006: 906-913
3 Nasrullah Memon, Henrik Legind Larsen: Structural Analysis and Destabilizing Terrorist Networks. DMIN 2006: 296-302
2EENasrullah Memon, Henrik Legind Larsen: Practical Algorithms for Destabilizing Terrorist Networks. ISI 2006: 389-400
2004
1 Nasrullah Memon, Daniel Ortiz Arroyo, Henrik Legind Larsen: Investigative Data Mining: A General Framework. International Conference on Computational Intelligence 2004: 384-387

Coauthor Index

1Daniel Ortiz Arroyo [1]
2Claus Atzenbeck [12] [14]
3Nicholas Harkiolakis [13] [14] [16]
4David L. Hicks [6] [7] [8] [10] [11] [12] [13] [14] [15] [16]
5Kim C. Kristoffersen [10]
6Henrik Legind Larsen [1] [2] [3] [4] [5] [6] [7] [8] [10] [11] [13]
7Muhammad Aslam Uqaili [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)