{"id":"https://openalex.org/W2146867741","doi":"https://doi.org/10.1109/aiccsa.2008.4493536","title":"Notice of Violation of IEEE Publication Principles - Detecting high-value individuals in covert networks: 7/7 London bombing case study","display_name":"Notice of Violation of IEEE Publication Principles - Detecting high-value individuals in covert networks: 7/7 London bombing case study","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2146867741","doi":"https://doi.org/10.1109/aiccsa.2008.4493536","mag":"2146867741"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493536","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041548828","display_name":"Nasrullah Memon","orcid":null},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"N. Memon","raw_affiliation_string":"Aalborg University Esbjerg#TAB#","raw_affiliation_strings":["Aalborg University Esbjerg#TAB#"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091670616","display_name":"Nicholas Harkiolakis","orcid":null},"institutions":[],"countries":["GR"],"is_corresponding":false,"raw_author_name":"N. Harkiolakis","raw_affiliation_string":"Hellenic American University; Athens Greece","raw_affiliation_strings":["Hellenic American University; Athens Greece"]},{"author_position":"last","author":{"id":"https://openalex.org/A5040699656","display_name":"David Hicks","orcid":"https://orcid.org/0000-0001-5813-6785"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"D.L. Hicks","raw_affiliation_string":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark","raw_affiliation_strings":["Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark"]}],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":14,"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":true,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Statistical Mechanics of Complex Networks","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Statistical Mechanics of Complex Networks","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Impact of Social Structure on Crime and Delinquency","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"keyword":"covert networks","score":0.6173},{"keyword":"ieee publication principles","score":0.3789},{"keyword":"high-value","score":0.25}],"concepts":[{"id":"https://openalex.org/C2779913896","wikidata":"https://www.wikidata.org/wiki/Q7063001","display_name":"Notice","level":2,"score":0.8210008},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.49907303},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.46977207},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.4374224},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.42628893},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39733905},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.36227226},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.2762552},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24794012},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa.2008.4493536","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.76}],"grants":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W70663668","https://openalex.org/W950821216","https://openalex.org/W1970913835","https://openalex.org/W2018049970","https://openalex.org/W2021264492","https://openalex.org/W2041681134","https://openalex.org/W2047940964","https://openalex.org/W2056944867","https://openalex.org/W2086236971","https://openalex.org/W2092755023","https://openalex.org/W2096183067","https://openalex.org/W2103471174","https://openalex.org/W2148427687","https://openalex.org/W2150797113","https://openalex.org/W4230274305","https://openalex.org/W4231203243"],"related_works":["https://openalex.org/W3018282762","https://openalex.org/W2558055997","https://openalex.org/W2791183434","https://openalex.org/W2353369313","https://openalex.org/W2086339586","https://openalex.org/W4300782058","https://openalex.org/W2394387726","https://openalex.org/W2378724474","https://openalex.org/W1472269183","https://openalex.org/W4389146154"],"ngrams_url":"https://api.openalex.org/works/W2146867741/ngrams","abstract_inverted_index":{"Notice":[0],"of":[1,3,29,48,53,71,81,138,179,196,212,221,246,313,382,494,536,576],"Violation":[2],"IEEE":[4,164],"Publication":[5,73],"Principles
":[6],"\"Detecting":[7],"High-Value":[8],"Individuals":[9],"in":[10,69,135,163,225,243,260,280,303,328,368,387,394,397,436,463,482,487,506,556,591,624],"Covert":[11],"Networks:":[12,125],"7/7":[13],"London":[14],"Bombing":[15],"Case":[16,127],"Study\"":[17,128],"
":[18,129,157,229,272,279,322,343,358,389,411,431,459,492,510,538],"by":[19,56,130,158,184,230,273,289,323,344,359,390,412,432,460,511,539],"Nasrullah":[20,91],"Memon,":[21,92],"Nicholas":[22],"Harkiolakis,":[23],"and":[24,37,45,51,119,144,154,166,214,270,276,331,339,355,406,418,428,438,456,476,497,561,574,584,596,600,626],"David":[25,231,362],"L.":[26,294],"Hicks
":[27],"Proceedings":[28,137,245],"the":[30,49,84,100,113,136,139,244,247,254,311,398,483,488,495,503,534,557,572,611,617],"IEEE/ACS":[31],"International":[32,205,419],"Conference":[33,257],"on":[34,258,559,571],"Computer":[35,197],"Systems":[36],"Applications,":[38],"March":[39,218,500],"2008,":[40],"pp.":[41,376,443],"206-215
":[42],"After":[43],"careful":[44],"considered":[46],"review":[47],"content":[50],"authorship":[52],"this":[54,62],"paper":[55,63,77,117],"a":[57,507,603],"duly":[58],"constituted":[59],"expert":[60],"committee,":[61],"has":[64,78],"been":[65],"found":[66,94],"to":[67,95,112,451,532,586,602,606,610],"be":[68,96],"violation":[70],"IEEE's":[72],"Principles.":[74],"
":[75,122],"This":[76,568],"copied":[79,106],"portions":[80],"text":[82,104],"from":[83],"sources":[85],"cited":[86],"below.":[87],"The":[88,102,421],"lead":[89],"author,":[90],"was":[93,105],"solely":[97],"responsible":[98],"for":[99,177,202,209,409,416,473],"violation.":[101],"original":[103,114],"without":[107,120],"attribution":[108],"(including":[109],"appropriate":[110],"references":[111],"author(s)":[115],"and/or":[116],"title)":[118],"permission.":[121],"\"Untangling":[123],"Criminal":[124],"A":[126,175,528],"Jennifer":[131,546],"Xu,":[132,547],"Hsinchun":[133,554],"Chen
":[134,555],"First":[140],"NSF/NIJ":[141],"Symposium":[142,558],"Intelligence":[143,560],"Security":[145,165,465,562],"Informatics,":[146],"ISI,":[147],"June":[148,374],"2003
":[149],"\"Countering":[150],"Terrorism":[151,386],"Through":[152],"Information":[153],"Privacy":[155],"Technologies\"":[156],"Robert":[159],"Popp,":[160],"John":[161],"Poindexter
":[162],"Privacy,":[167],"Vol":[168],"4,":[169],"No.":[170],"6,":[171],"November":[172],"2006
":[173,266,352,479,501],"NetIntel:":[174],"Database":[176],"Manipulation":[178],"Rich":[180],"Social":[181,213,226,281,379,395],"Network":[182,227,304,380,446],"Data
":[183],"Maksim":[185],"Tsvetovat,":[186],"Jana":[187],"Diesner,":[188],"Kathleen":[189],"M.":[190],"Carley
":[191],"Carnegie":[192],"Mellon":[193],"University":[194],"School":[195,471],"Science":[198,312],"ISRI":[199],"-":[200,207],"Institute":[201],"Software":[203],"Research":[204],"CASOS":[206],"Center":[208,415,472],"Computational":[210],"Analysis":[211,381,408,447],"Organizational":[215],"Systems:":[216],"CMU-ISRI-04-135,":[217],"2005
":[219,309,403,523],"\"Applications":[220],"Bayesian":[222,249],"Belief":[223],"Networks":[224,315],"Analysis\"":[228],"Koelle,":[232],"Jonathan":[233],"Pfautz,":[234],"Michael":[235],"Farry,":[236],"Zach":[237],"Cox,":[238],"Geoffrey":[239],"Catto,":[240],"Joseph
":[241],"Campolongo
":[242],"4th":[248],"Modeling":[250],"Applications":[251],"Workshop":[252],"during":[253],"22nd":[255],"Annual":[256],"Uncertainty":[259],"Artificial":[261],"Intelligence:":[262],"UAI":[263],"'06,":[264],"July":[265,478],"\"Rethinking":[267],"Centrality:":[268],"Methods":[269],"Examples\"":[271],"Karen":[274],"Stephenson":[275],"Marvin":[277],"Zelen,":[278],"Networks,":[282],"11,":[283],"1989
":[284],"Chapter":[285],"3":[286],"Centrality":[287],"Indices
":[288],"D.":[290,298],"Kosch\u00fctzki,":[291],"K.A.":[292],"Lehmann,":[293],"Peeters,":[295],"S.":[296],"Richter,":[297],"Tenfelde-":[299],"Podehl,":[300],"O.":[301],"Zlotowski":[302],"Analysis:":[305],"Methodological":[306],"Foundations,":[307],"Springer":[308],"\"How":[310],"Complex":[314,508],"Can":[316],"Help":[317],"Developing":[318],"Strategies":[319],"Against":[320],"Terrorism\"":[321,537],"Vito":[324],"Latora,":[325],"Massimo":[326],"Marchiori
":[327],"Chaos,":[329],"Solitons":[330],"Fractals,":[332],"20,":[333],"Elsevier,":[334,351,441],"2004
":[335],"Data":[336,407],"Mining:":[337],"Concepts":[338],"Techniques":[340],"(second":[341],"edition),":[342],"Jiawei":[345],"Han,":[346],"Micheline":[347],"Kamber
":[348],"Morgan":[349],"Kaufmann,":[350],"\"Network":[353],"Theory":[354],"Small":[356,369],"Groups\"":[357],"Nancy":[360],"Katz,":[361],"Lazer,":[363],"Holly":[364],"Arrow,":[365],"Noshir":[366],"Contractor
":[367],"Group":[370],"Research,":[371],"35":[372],"(3),":[373],"2004,":[375],"307-332
":[377],"\"A":[378],"Aum":[383],"Shinrikyo:":[384],"Understanding":[385],"Australia\"":[388],"Stuart":[391],"A.":[392],"Koschade
":[393],"Change":[396],"21st":[399],"Century":[400],"Conference,":[401],"October":[402],"\"Data":[404],"Mining":[405],"Counterterrorism\"":[410],"Mary":[413],"DeRosa
":[414],"Strategic":[417],"Studies,":[420],"CSIS":[422],"Press,":[423],"2004
":[424,566],"\"The":[425],"Gatekeeper,":[426],"Pair-dependency":[427],"Structural":[429],"Centrality\"":[430],"Linton":[433],"C.":[434],"Freeman
":[435],"Quality":[437],"Quantity,":[439],"14,":[440],"1980,":[442],"585-592
":[444],"\"Social":[445],"as":[448],"an":[449],"Approach":[450,531],"Combat":[452],"Terrorism:":[453],"Past,":[454],"Present,":[455],"Future":[457],"Research\"":[458],"Steve":[461],"Ressler
":[462],"Homeland":[464,474],"Affairs,":[466],"2":[467],"(2),":[468],"Naval":[469],"Postgraduate":[470],"Defense":[475],"Security,":[477],"\"Violent":[480],"Jihad":[481],"Netherlands:":[484],"Current":[485],"Trends":[486],"Islamist":[489],"Terrorist":[490],"Threat\"":[491],"Ministry":[493],"Interior":[496],"Kingdom":[498],"Relations,":[499],"\"Reconstruct":[502],"Hierarchical":[504],"Structure":[505],"Network\"":[509],"Huijie":[512],"Yang,":[513],"Wenxu":[514],"Wang,":[515,519],"Tao":[516],"Zhou,":[517,549],"Binghong":[518],"Fangcui":[520],"Zhao":[521],"August":[522],"\"Terrorism":[524],"Knowledge":[525,529],"Discovery":[526,530],"Project:":[527],"Addressing":[533],"Threat":[535],"Edna":[540],"Reid,":[541],"Jialun":[542],"Qin,":[543],"Wingyan":[544],"Chung,":[545],"Yilu":[548],"Rob":[550],"Schumaker,":[551],"Marc":[552],"Sageman,":[553],"Informatics":[563],"(ISI2004),":[564],"Springer,":[565],"
":[567],"article":[569],"focuses":[570],"study":[573,605],"development":[575],"recently":[577],"introduced":[578],"new":[579],"measures,":[580],"theories,":[581],"mathematical":[582],"models":[583,595,618],"algorithms":[585],"detect":[587],"high":[588],"value":[589],"individuals":[590],"terrorist":[592,629],"networks.":[593,630],"Specific":[594],"tools":[597],"are":[598,614],"described,":[599],"applied":[601],"case":[604],"demonstrate":[607],"their":[608],"applicability":[609],"area.":[612],"We":[613],"confident":[615],"that":[616],"described":[619],"can":[620],"help":[621],"intelligence":[622],"agencies":[623],"understanding":[625],"dealing":[627],"with":[628]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2146867741","counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2024-03-21T18:31:37.966707","created_date":"2016-06-24"}