{"id":"https://openalex.org/W2146867741","doi":"https://doi.org/10.1109/aiccsa.2008.4493536","title":"Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study","display_name":"Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7/7 London bombing case study","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2146867741","doi":"https://doi.org/10.1109/aiccsa.2008.4493536","mag":"2146867741"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa.2008.4493536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103622024","display_name":"Nasrullah Memon","orcid":null},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Nasrullah Memon","raw_affiliation_strings":["Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark","Aalborg University Esbjerg"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Aalborg University Esbjerg","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091670616","display_name":"Nicholas Harkiolakis","orcid":"https://orcid.org/0000-0002-5089-6955"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nicholas Harkiolakis","raw_affiliation_strings":["Hellenic American University, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"Hellenic American University, Athens, Greece","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040810737","display_name":"David Hicks","orcid":"https://orcid.org/0000-0003-2660-6505"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"David L. Hicks","raw_affiliation_strings":["Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark","Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark#TAB#","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103622024"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":null,"apc_paid":null,"fwci":1.4233,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.82531553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"206","last_page":"215"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/notice","display_name":"Notice","score":0.8117966651916504},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5034970641136169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4763876795768738},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.44571661949157715},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4275383949279785},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4119935929775238},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.3693310618400574},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.2786095142364502},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24993804097175598}],"concepts":[{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.8117966651916504},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5034970641136169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4763876795768738},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.44571661949157715},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4275383949279785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4119935929775238},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.3693310618400574},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.2786095142364502},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24993804097175598},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aiccsa.2008.4493536","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493536","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W70663668","https://openalex.org/W81720857","https://openalex.org/W175726012","https://openalex.org/W618109169","https://openalex.org/W950821216","https://openalex.org/W1480357645","https://openalex.org/W1555711003","https://openalex.org/W1556026397","https://openalex.org/W1601646087","https://openalex.org/W1603117631","https://openalex.org/W1767515428","https://openalex.org/W1903894141","https://openalex.org/W1904672382","https://openalex.org/W1967884553","https://openalex.org/W1970913835","https://openalex.org/W1971788485","https://openalex.org/W2003987998","https://openalex.org/W2018049970","https://openalex.org/W2021264492","https://openalex.org/W2041681134","https://openalex.org/W2047940964","https://openalex.org/W2053590504","https://openalex.org/W2056944867","https://openalex.org/W2086236971","https://openalex.org/W2092755023","https://openalex.org/W2096183067","https://openalex.org/W2103471174","https://openalex.org/W2109469951","https://openalex.org/W2148427687","https://openalex.org/W2150797113","https://openalex.org/W2154897810","https://openalex.org/W2160459296","https://openalex.org/W2332975960","https://openalex.org/W4230274305","https://openalex.org/W4231203243","https://openalex.org/W4386965763","https://openalex.org/W6603265979","https://openalex.org/W6639897565","https://openalex.org/W6683677858"],"related_works":["https://openalex.org/W3018282762","https://openalex.org/W2558055997","https://openalex.org/W2791183434","https://openalex.org/W2353369313","https://openalex.org/W4400794747","https://openalex.org/W4250645680","https://openalex.org/W4300782058","https://openalex.org/W2086339586","https://openalex.org/W2394387726","https://openalex.org/W4210390481"],"abstract_inverted_index":{"Notice":[0],"of":[1,3,29,48,53,71,81,138,179,196,212,221,246,313,382,494,536,576],"Violation":[2],"IEEE":[4,164],"Publication":[5,73],"Principles<br><br>":[6],"\"Detecting":[7],"High-Value":[8],"Individuals":[9],"in":[10,69,135,163,225,243,260,280,303,328,368,387,394,397,436,463,482,487,506,556,591,624],"Covert":[11],"Networks:":[12,125],"7/7":[13],"London":[14],"Bombing":[15],"Case":[16,127],"Study\"":[17,128],"<br>":[18,129,157,229,272,279,322,343,358,389,411,431,459,492,510,538],"by":[19,56,130,158,184,230,273,289,323,344,359,390,412,432,460,511,539],"Nasrullah":[20,91],"Memon,":[21,92],"Nicholas":[22],"Harkiolakis,":[23],"and":[24,37,45,51,119,144,154,166,214,270,276,331,339,355,406,418,428,438,456,476,497,561,574,584,596,600,626],"David":[25,231,362],"L.":[26,294],"Hicks<br>":[27],"Proceedings":[28,137,245],"the":[30,49,84,100,113,136,139,244,247,254,311,398,483,488,495,503,534,557,572,611,617],"IEEE/ACS":[31],"International":[32,205,419],"Conference":[33,257],"on":[34,258,559,571],"Computer":[35,197],"Systems":[36],"Applications,":[38],"March":[39,218,500],"2008,":[40],"pp.":[41,376,443],"206-215<br><br>":[42],"After":[43],"careful":[44],"considered":[46],"review":[47],"content":[50],"authorship":[52],"this":[54,62],"paper":[55,63,77,117],"a":[57,507,603],"duly":[58],"constituted":[59],"expert":[60],"committee,":[61],"has":[64,78],"been":[65],"found":[66,94],"to":[67,95,112,451,532,586,602,606,610],"be":[68,96],"violation":[70],"IEEE's":[72],"Principles.":[74],"<br><br>":[75,122],"This":[76,568],"copied":[79,106],"portions":[80],"text":[82,104],"from":[83],"sources":[85],"cited":[86],"below.":[87],"The":[88,102,421],"lead":[89],"author,":[90],"was":[93,105],"solely":[97],"responsible":[98],"for":[99,177,202,209,409,416,473],"violation.":[101],"original":[103,114],"without":[107,120],"attribution":[108],"(including":[109],"appropriate":[110],"references":[111],"author(s)":[115],"and/or":[116],"title)":[118],"permission.":[121],"\"Untangling":[123],"Criminal":[124],"A":[126,175,528],"Jennifer":[131,546],"Xu,":[132,547],"Hsinchun":[133,554],"Chen<br>":[134,555],"First":[140],"NSF/NIJ":[141],"Symposium":[142,558],"Intelligence":[143,560],"Security":[145,165,465,562],"Informatics,":[146],"ISI,":[147],"June":[148,374],"2003<br><br>":[149],"\"Countering":[150],"Terrorism":[151,386],"Through":[152],"Information":[153],"Privacy":[155],"Technologies\"":[156],"Robert":[159],"Popp,":[160],"John":[161],"Poindexter<br>":[162],"Privacy,":[167],"Vol":[168],"4,":[169],"No.":[170],"6,":[171],"November":[172],"2006<br><br>":[173,266,352,479,501],"NetIntel:":[174],"Database":[176],"Manipulation":[178],"Rich":[180],"Social":[181,213,226,281,379,395],"Network":[182,227,304,380,446],"Data<br>":[183],"Maksim":[185],"Tsvetovat,":[186],"Jana":[187],"Diesner,":[188],"Kathleen":[189],"M.":[190],"Carley<br>":[191],"Carnegie":[192],"Mellon":[193],"University":[194],"School":[195,471],"Science":[198,312],"ISRI":[199],"-":[200,207],"Institute":[201],"Software":[203],"Research":[204],"CASOS":[206],"Center":[208,415,472],"Computational":[210],"Analysis":[211,381,408,447],"Organizational":[215],"Systems:":[216],"CMU-ISRI-04-135,":[217],"2005<br><br>":[219,309,403,523],"\"Applications":[220],"Bayesian":[222,249],"Belief":[223],"Networks":[224,315],"Analysis\"":[228],"Koelle,":[232],"Jonathan":[233],"Pfautz,":[234],"Michael":[235],"Farry,":[236],"Zach":[237],"Cox,":[238],"Geoffrey":[239],"Catto,":[240],"Joseph<br>":[241],"Campolongo<br>":[242],"4th":[248],"Modeling":[250],"Applications":[251],"Workshop":[252],"during":[253],"22nd":[255],"Annual":[256],"Uncertainty":[259],"Artificial":[261],"Intelligence:":[262],"UAI":[263],"'06,":[264],"July":[265,478],"\"Rethinking":[267],"Centrality:":[268],"Methods":[269],"Examples\"":[271],"Karen":[274],"Stephenson":[275],"Marvin":[277],"Zelen,":[278],"Networks,":[282],"11,":[283],"1989<br><br>":[284],"Chapter":[285],"3":[286],"Centrality":[287],"Indices<br>":[288],"D.":[290,298],"Kosch\u00fctzki,":[291],"K.A.":[292],"Lehmann,":[293],"Peeters,":[295],"S.":[296],"Richter,":[297],"Tenfelde-":[299],"Podehl,":[300],"O.":[301],"Zlotowski":[302],"Analysis:":[305],"Methodological":[306],"Foundations,":[307],"Springer":[308],"\"How":[310],"Complex":[314,508],"Can":[316],"Help":[317],"Developing":[318],"Strategies":[319],"Against":[320],"Terrorism\"":[321,537],"Vito":[324],"Latora,":[325],"Massimo":[326],"Marchiori<br>":[327],"Chaos,":[329],"Solitons":[330],"Fractals,":[332],"20,":[333],"Elsevier,":[334,351,441],"2004<br>":[335],"Data":[336,407],"Mining:":[337],"Concepts":[338],"Techniques":[340],"(second":[341],"edition),":[342],"Jiawei":[345],"Han,":[346],"Micheline":[347],"Kamber<br>":[348],"Morgan":[349],"Kaufmann,":[350],"\"Network":[353],"Theory":[354],"Small":[356,369],"Groups\"":[357],"Nancy":[360],"Katz,":[361],"Lazer,":[363],"Holly":[364],"Arrow,":[365],"Noshir":[366],"Contractor<br>":[367],"Group":[370],"Research,":[371],"35":[372],"(3),":[373],"2004,":[375],"307-332<br><br>":[377],"\"A":[378],"Aum":[383],"Shinrikyo:":[384],"Understanding":[385],"Australia\"":[388],"Stuart":[391],"A.":[392],"Koschade<br>":[393],"Change":[396],"21st":[399],"Century":[400],"Conference,":[401],"October":[402],"\"Data":[404],"Mining":[405],"Counterterrorism\"":[410],"Mary":[413],"DeRosa<br>":[414],"Strategic":[417],"Studies,":[420],"CSIS":[422],"Press,":[423],"2004<br><br>":[424,566],"\"The":[425],"Gatekeeper,":[426],"Pair-dependency":[427],"Structural":[429],"Centrality\"":[430],"Linton":[433],"C.":[434],"Freeman<br>":[435],"Quality":[437],"Quantity,":[439],"14,":[440],"1980,":[442],"585-592<br><br>":[444],"\"Social":[445],"as":[448],"an":[449],"Approach":[450,531],"Combat":[452],"Terrorism:":[453],"Past,":[454],"Present,":[455],"Future":[457],"Research\"":[458],"Steve":[461],"Ressler<br>":[462],"Homeland":[464,474],"Affairs,":[466],"2":[467],"(2),":[468],"Naval":[469],"Postgraduate":[470],"Defense":[475],"Security,":[477],"\"Violent":[480],"Jihad":[481],"Netherlands:":[484],"Current":[485],"Trends":[486],"Islamist":[489],"Terrorist":[490],"Threat\"":[491],"Ministry":[493],"Interior":[496],"Kingdom":[498],"Relations,":[499],"\"Reconstruct":[502],"Hierarchical":[504],"Structure":[505],"Network\"":[509],"Huijie":[512],"Yang,":[513],"Wenxu":[514],"Wang,":[515,519],"Tao":[516],"Zhou,":[517,549],"Binghong":[518],"Fangcui":[520],"Zhao":[521],"August":[522],"\"Terrorism":[524],"Knowledge":[525,529],"Discovery":[526,530],"Project:":[527],"Addressing":[533],"Threat":[535],"Edna":[540],"Reid,":[541],"Jialun":[542],"Qin,":[543],"Wingyan":[544],"Chung,":[545],"Yilu":[548],"Rob":[550],"Schumaker,":[551],"Marc":[552],"Sageman,":[553],"Informatics":[563],"(ISI2004),":[564],"Springer,":[565],"<br/>":[567],"article":[569],"focuses":[570],"study":[573,605],"development":[575],"recently":[577],"introduced":[578],"new":[579],"measures,":[580],"theories,":[581],"mathematical":[582],"models":[583,595,618],"algorithms":[585],"detect":[587],"high":[588],"value":[589],"individuals":[590],"terrorist":[592,629],"networks.":[593,630],"Specific":[594],"tools":[597],"are":[598,614],"described,":[599],"applied":[601],"case":[604],"demonstrate":[607],"their":[608],"applicability":[609],"area.":[612],"We":[613],"confident":[615],"that":[616],"described":[619],"can":[620],"help":[621],"intelligence":[622],"agencies":[623],"understanding":[625],"dealing":[627],"with":[628]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
