DocumentCode :
1918266
Title :
Notice of Violation of IEEE Publication Principles
Detecting New Trends in Terrorist Networks
Author :
Wiil, U.K. ; Memon, N. ; Karampelas, P.
Author_Institution :
Maersk Mc-Kinney Moller Inst., Univ. of Southern Denmark, Odense, Denmark
fYear :
2010
fDate :
9-11 Aug. 2010
Firstpage :
435
Lastpage :
440
Abstract :
Notice of Violation of IEEE Publication Principles

"Detecting New Trends in Terrorist Networks,"
by Uffe Kock Wiil, Nasrullah Memon, and Panagiotis Karampelas
in the Proceedings of the 2010 International Conference on Advances in Social Networks
Analysis and Mining (ASONAM), August 2010, pp.435-440

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

This paper has copied portions of text from the sources cited below. The lead author, Nasrullah Memon, was found to be solely responsible for the violation. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

"Social Network Analysis and Information Fusion for AntiTerrorism"
by Pontus Svenson, Per Svensson, and Hugo Tullberg
in the Proceedings of the 2006 Conference on Civil and Military Readiness (CIMI), May 2006

and

Data Mining: Concepts and Techniques (second edition),
by Jiawei Han and Micheline Kamber
Morgan Kaufmann, Elsevier, 2006
This paper discusses new trends in terrorist networks. We investigate a new case study regarding the recent Denmark terror plan and present analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network surrounding the recent Denmark terror plan is studied through publicly available information. We are able to map a piece of the network centered on David Headley, who recently confessed to have planned a terrorist attack to take place on Danish soil. The map gives us an insight into the organizations and people involved.
Keywords :
data mining; social networking (online); terrorism; Denmark terror plan; clandestine network mapping; covert network; data mining; terrorist network; Algorithm design and analysis; Communities; Data mining; Industries; Organizations; Surveillance; Terrorism; David Headley case; open source information; subgroup detection; terrorist network analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on
Conference_Location :
Odense
Print_ISBN :
978-1-4244-7787-6
Type :
conf
DOI :
10.1109/ASONAM.2010.73
Filename :
5563064
Link To Document :
بازگشت