Follow
Nasrullah Memon, PhD
Title
Cited by
Cited by
Year
Practical algorithms for destabilizing terrorist networks
N Memon, HL Larsen
International Conference on Intelligence and Security Informatics, 389-400, 2006
84*2006
Retracted: Detecting hidden hierarchy in terrorist networks: Some case studies
N Memon, HL Larsen, DL Hicks, N Harkiolakis
International Conference on Intelligence and Security Informatics, 477-489, 2008
752008
Verification-driven slicing of UML/OCL models
A Shaikh, R Clarisó, UK Wiil, N Memon
Proceedings of the IEEE/ACM international conference on Automated software …, 2010
682010
The role of service oriented architecture in telemedicine healthcare system
A Shaikh, M Memon, N Memon, M Misbahuddin
2009 International Conference on Complex, Intelligent and Software Intensive …, 2009
572009
Notice of Violation of IEEE Publication Principles: Practical approaches for analysis, visualization and destabilizing terrorist networks
N Memon, HL Larsen
First International Conference on Availability, Reliability and Security …, 2006
512006
Detection of fraudulent emails by employing advanced feature abundance
S Nizamani, N Memon, M Glasdam, DD Nguyen
Egyptian Informatics Journal 15 (3), 169-174, 2014
472014
Measuring link importance in terrorist networks
UK Wiil, J Gniadek, N Memon
2010 International Conference on Advances in Social Networks Analysis and …, 2010
472010
Mathematical methods in counterterrorism
N Memon, JD Farley, DL Hicks, T Rosenorn
Springer Science & Business Media, 2009
432009
Modeling suspicious email detection using enhanced feature selection
S Nizamani, N Memon, UK Wiil, P Karampelas
arXiv preprint arXiv:1312.1971, 2013
402013
Data mining for social network data
N Memon, JJ Xu, DL Hicks, H Chen
Springer 12, 622, 2010
372010
From public outrage to the burst of public violence: An epidemic-like model
S Nizamani, N Memon, S Galam
Physica A: statistical mechanics and its applications 416, 620-630, 2014
322014
Notice of Violation of IEEE Publication Principles: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network
N Memon, KC Kristoffersen, DL Hicks, HL Larsen
The Second International Conference on Availability, Reliability and …, 2007
302007
Hybrid model of content extraction
PAR Qureshi, N Memon
Journal of Computer and System Sciences 78 (4), 1248-1257, 2012
292012
Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks
N Memon
Esbjerg Institute of Technology, Aalborg University, 2007
292007
Structural analysis and destabilizing terrorist networks.
N Memon, HL Larsen
DMIN, 296-302, 2006
292006
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks
N Memon, DL Hicks, HL Larsen
International Conference on Advanced Data Mining and Applications, 430-441, 2007
262007
Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study
N Memon, N Harkiolakis, DL Hicks
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
252008
Notice of Violation of IEEE Publication Principles: Harvesting Terrorists Information from Web
N Memon, DL Hicks, HL Larsen
2007 11th International Conference Information Visualization (IV'07), 664-671, 2007
252007
Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams
A Shaikh, UK Wiil, N Memon
Advances in Software Engineering 2011, 2011
232011
Retracted: Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining
N Memon, HL Larsen
International Conference on Advanced Data Mining and Applications, 1037-1048, 2006
222006
The system can't perform the operation now. Try again later.
Articles 1–20