Nasrullah Memon, PhD
Title
Cited by
Cited by
Year
Practical algorithms for destabilizing terrorist networks
N Memon, HL Larsen
International Conference on Intelligence and Security Informatics, 389-400, 2006
77*2006
Retracted: detecting hidden hierarchy in terrorist networks: some case studies
N Memon, HL Larsen, DL Hicks, N Harkiolakis
International Conference on Intelligence and Security Informatics, 477-489, 2008
692008
Verification-driven slicing of UML/OCL models
A Shaikh, R Clarisó, UK Wiil, N Memon
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
662010
The role of service oriented architecture in telemedicine healthcare system
A Shaikh, M Memon, N Memon, M Misbahuddin
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
532009
Notice of Violation of IEEE Publication Principles: Practical approaches for analysis, visualization and destabilizing terrorist networks
N Memon, HL Larsen
First International Conference on Availability, Reliability and Security …, 2006
512006
Measuring link importance in terrorist networks
UK Wiil, J Gniadek, N Memon
2010 International Conference on Advances in Social Networks Analysis and …, 2010
462010
Mathematical methods in counterterrorism
N Memon, JD Farley, DL Hicks, T Rosenorn
Springer Science & Business Media, 2009
442009
Detection of fraudulent emails by employing advanced feature abundance
S Nizamani, N Memon, M Glasdam, DD Nguyen
Egyptian Informatics Journal 15 (3), 169-174, 2014
392014
Modeling suspicious email detection using enhanced feature selection
S Nizamani, N Memon, UK Wiil, P Karampelas
arXiv preprint arXiv:1312.1971, 2013
382013
Data mining for social network data
N Memon, JJ Xu, DL Hicks, H Chen
Springer 12, 622, 2010
352010
From public outrage to the burst of public violence: An epidemic-like model
S Nizamani, N Memon, S Galam
Physica A: statistical mechanics and its applications 416, 620-630, 2014
302014
Hybrid model of content extraction
PAR Qureshi, N Memon
Journal of Computer and System Sciences 78 (4), 1248-1257, 2012
292012
Notice of Violation of IEEE Publication Principles: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network
N Memon, KC Kristoffersen, DL Hicks, HL Larsen
The Second International Conference on Availability, Reliability and …, 2007
292007
Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks
N Memon
Esbjerg Institute of Technology, Aalborg University, 2007
292007
Structural Analysis and Destabilizing Terrorist Networks.
N Memon, HL Larsen
DMIN, 296-302, 2006
292006
Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study
N Memon, N Harkiolakis, DL Hicks
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
252008
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
N Memon, DL Hicks, HL Larsen
International Conference on Advanced Data Mining and Applications, 430-441, 2007
252007
Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams
A Shaikh, UK Wiil, N Memon
Advances in Software Engineering 2011, 2011
232011
Notice of Violation of IEEE Publication Principles: Harvesting Terrorists Information from Web
N Memon, DL Hicks, HL Larsen
2007 11th International Conference Information Visualization (IV'07), 664-671, 2007
232007
CEAI: CCM-based email authorship identification model
S Nizamani, N Memon
Egyptian Informatics Journal 14 (3), 239-249, 2013
212013
The system can't perform the operation now. Try again later.
Articles 1–20