Practical algorithms for destabilizing terrorist networks N Memon, HL Larsen International Conference on Intelligence and Security Informatics, 389-400, 2006 | 84* | 2006 |
Retracted: Detecting hidden hierarchy in terrorist networks: Some case studies N Memon, HL Larsen, DL Hicks, N Harkiolakis International Conference on Intelligence and Security Informatics, 477-489, 2008 | 75 | 2008 |
Verification-driven slicing of UML/OCL models A Shaikh, R Clarisó, UK Wiil, N Memon Proceedings of the IEEE/ACM international conference on Automated software …, 2010 | 68 | 2010 |
The role of service oriented architecture in telemedicine healthcare system A Shaikh, M Memon, N Memon, M Misbahuddin 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 57 | 2009 |
Notice of Violation of IEEE Publication Principles: Practical approaches for analysis, visualization and destabilizing terrorist networks N Memon, HL Larsen First International Conference on Availability, Reliability and Security …, 2006 | 51 | 2006 |
Detection of fraudulent emails by employing advanced feature abundance S Nizamani, N Memon, M Glasdam, DD Nguyen Egyptian Informatics Journal 15 (3), 169-174, 2014 | 47 | 2014 |
Measuring link importance in terrorist networks UK Wiil, J Gniadek, N Memon 2010 International Conference on Advances in Social Networks Analysis and …, 2010 | 47 | 2010 |
Mathematical methods in counterterrorism N Memon, JD Farley, DL Hicks, T Rosenorn Springer Science & Business Media, 2009 | 43 | 2009 |
Modeling suspicious email detection using enhanced feature selection S Nizamani, N Memon, UK Wiil, P Karampelas arXiv preprint arXiv:1312.1971, 2013 | 40 | 2013 |
Data mining for social network data N Memon, JJ Xu, DL Hicks, H Chen Springer 12, 622, 2010 | 37 | 2010 |
From public outrage to the burst of public violence: An epidemic-like model S Nizamani, N Memon, S Galam Physica A: statistical mechanics and its applications 416, 620-630, 2014 | 32 | 2014 |
Notice of Violation of IEEE Publication Principles: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network N Memon, KC Kristoffersen, DL Hicks, HL Larsen The Second International Conference on Availability, Reliability and …, 2007 | 30 | 2007 |
Hybrid model of content extraction PAR Qureshi, N Memon Journal of Computer and System Sciences 78 (4), 1248-1257, 2012 | 29 | 2012 |
Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks N Memon Esbjerg Institute of Technology, Aalborg University, 2007 | 29 | 2007 |
Structural analysis and destabilizing terrorist networks. N Memon, HL Larsen DMIN, 296-302, 2006 | 29 | 2006 |
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks N Memon, DL Hicks, HL Larsen International Conference on Advanced Data Mining and Applications, 430-441, 2007 | 26 | 2007 |
Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study N Memon, N Harkiolakis, DL Hicks 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 25 | 2008 |
Notice of Violation of IEEE Publication Principles: Harvesting Terrorists Information from Web N Memon, DL Hicks, HL Larsen 2007 11th International Conference Information Visualization (IV'07), 664-671, 2007 | 25 | 2007 |
Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams A Shaikh, UK Wiil, N Memon Advances in Software Engineering 2011, 2011 | 23 | 2011 |
Retracted: Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining N Memon, HL Larsen International Conference on Advanced Data Mining and Applications, 1037-1048, 2006 | 22 | 2006 |