Follow
Nasrullah Memon, PhD
Title
Cited by
Cited by
Year
Practical algorithms for destabilizing terrorist networks
N Memon, HL Larsen
International Conference on Intelligence and Security Informatics, 389-400, 2006
87*2006
Retracted: detecting hidden hierarchy in terrorist networks: some case studies
N Memon, HL Larsen, DL Hicks, N Harkiolakis
Intelligence and Security Informatics: IEEE ISI 2008 International Workshops …, 2008
802008
Verification-driven slicing of UML/OCL models
A Shaikh, R Clarisó, UK Wiil, N Memon
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
722010
The role of service oriented architecture in telemedicine healthcare system
A Shaikh, M Memon, N Memon, M Misbahuddin
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
602009
Detection of fraudulent emails by employing advanced feature abundance
S Nizamani, N Memon, M Glasdam, DD Nguyen
Egyptian Informatics Journal 15 (3), 169-174, 2014
562014
Measuring link importance in terrorist networks
UK Wiil, J Gniadek, N Memon
2010 International Conference on Advances in Social Networks Analysis and …, 2010
542010
Retracted: Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining
N Memon, HL Larsen
International Conference on Advanced Data Mining and Applications, 1037-1048, 2006
542006
Notice of Violation of IEEE Publication Principles: Practical approaches for analysis, visualization and destabilizing terrorist networks
N Memon, HL Larsen
First International Conference on Availability, Reliability and Security …, 2006
542006
Mathematical methods in counterterrorism
N Memon, JD Farley, DL Hicks, T Rosenorn
Springer Science & Business Media, 2009
472009
Modeling suspicious email detection using enhanced feature selection
S Nizamani, N Memon, UK Wiil, P Karampelas
arXiv preprint arXiv:1312.1971, 2013
442013
From public outrage to the burst of public violence: An epidemic-like model
S Nizamani, N Memon, S Galam
Physica A: statistical mechanics and its applications 416, 620-630, 2014
372014
Data mining for social network data
N Memon, JJ Xu, DL Hicks, H Chen
Springer 12, 622, 2010
342010
Hybrid model of content extraction
PAR Qureshi, N Memon
Journal of Computer and System Sciences 78 (4), 1248-1257, 2012
332012
CEAI: CCM-based email authorship identification model
S Nizamani, N Memon
Egyptian Informatics Journal 14 (3), 239-249, 2013
292013
Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks
N Memon
Esbjerg Institute of Technology, Aalborg University, 2007
282007
Notice of Violation of IEEE Publication Principles: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network
N Memon, KC Kristoffersen, DL Hicks, HL Larsen
The Second International Conference on Availability, Reliability and …, 2007
272007
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
N Memon, DL Hicks, HL Larsen
Advanced Data Mining and Applications: Third International Conference, ADMA …, 2007
272007
From sociology to computing in social networks: Theory, foundations and applications
N Memon, R Alhajj
Springer Science & Business Media, 2010
262010
Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study
N Memon, N Harkiolakis, DL Hicks
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
252008
Notice of Violation of IEEE Publication Principles: Harvesting Terrorists Information from Web
N Memon, DL Hicks, HL Larsen
2007 11th International Conference Information Visualization (IV'07), 664-671, 2007
242007
The system can't perform the operation now. Try again later.
Articles 1–20