Practical algorithms for destabilizing terrorist networks N Memon, HL Larsen International Conference on Intelligence and Security Informatics, 389-400, 2006 | 93* | 2006 |
Retracted: detecting hidden hierarchy in terrorist networks: some case studies N Memon, HL Larsen, DL Hicks, N Harkiolakis Intelligence and Security Informatics: IEEE ISI 2008 International Workshops …, 2008 | 80 | 2008 |
Verification-driven slicing of UML/OCL models A Shaikh, R Clarisó, UK Wiil, N Memon Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010 | 72 | 2010 |
The role of service oriented architecture in telemedicine healthcare system A Shaikh, M Memon, N Memon, M Misbahuddin 2009 International Conference on Complex, Intelligent and Software Intensive …, 2009 | 62 | 2009 |
Retracted: Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining N Memon, HL Larsen International Conference on Advanced Data Mining and Applications, 1037-1048, 2006 | 62 | 2006 |
Detection of fraudulent emails by employing advanced feature abundance S Nizamani, N Memon, M Glasdam, DD Nguyen Egyptian Informatics Journal 15 (3), 169-174, 2014 | 57 | 2014 |
Measuring link importance in terrorist networks UK Wiil, J Gniadek, N Memon 2010 International Conference on Advances in Social Networks Analysis and …, 2010 | 56 | 2010 |
Notice of Violation of IEEE Publication Principles: Practical approaches for analysis, visualization and destabilizing terrorist networks N Memon, HL Larsen First International Conference on Availability, Reliability and Security …, 2006 | 54 | 2006 |
Modeling suspicious email detection using enhanced feature selection S Nizamani, N Memon, UK Wiil, P Karampelas arXiv preprint arXiv:1312.1971, 2013 | 46 | 2013 |
Mathematical methods in counterterrorism N Memon, JD Farley, DL Hicks, T Rosenorn Springer Science & Business Media, 2009 | 44 | 2009 |
From public outrage to the burst of public violence: An epidemic-like model S Nizamani, N Memon, S Galam Physica A: statistical mechanics and its applications 416, 620-630, 2014 | 41 | 2014 |
Data mining for social network data N Memon, JJ Xu, DL Hicks, H Chen Springer 12, 622, 2010 | 35 | 2010 |
Hybrid model of content extraction PAR Qureshi, N Memon Journal of Computer and System Sciences 78 (4), 1248-1257, 2012 | 32 | 2012 |
CEAI: CCM-based email authorship identification model S Nizamani, N Memon Egyptian Informatics Journal 14 (3), 239-249, 2013 | 30 | 2013 |
Retracted: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks N Memon, DL Hicks, HL Larsen Advanced Data Mining and Applications: Third International Conference, ADMA …, 2007 | 28 | 2007 |
Investigative data mining: mathematical models for analyzing, visualizing and destabilizing terrorist networks N Memon | 28 | 2007 |
Notice of Violation of IEEE Publication Principles: Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network N Memon, KC Kristoffersen, DL Hicks, HL Larsen The Second International Conference on Availability, Reliability and …, 2007 | 27 | 2007 |
Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study N Memon, N Harkiolakis, DL Hicks 2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008 | 26 | 2008 |
From sociology to computing in social networks: Theory, foundations and applications N Memon, R Alhajj Springer Science & Business Media, 2010 | 25 | 2010 |
Evaluation of tools and slicing techniques for efficient verification of UML/OCL class diagrams A Shaikh, UK Wiil, N Memon Advances in Software Engineering 2011 (1), 370198, 2011 | 24 | 2011 |