Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nasrullah Memon is active.

Publication


Featured researches published by Nasrullah Memon.


availability, reliability and security | 2007

Notice of Violation of IEEE Publication Principles Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network

Nasrullah Memon; Kim C. Kristoffersen; David L. Hicks; Henrik Legind Larsen

This paper presents the study of structural cohesion which is discussed in social network analysis (SNA), but can also be used in several other important application areas including investigative data mining for destabilizing terrorist networks. Structural cohesion is defined as the number of actors who, if removed from a group, would disconnect the group. In this paper we discuss structural cohesion concepts, such as cliques, n-cliques, n-clans and k-plex to determine familiarity, robustness and reachability within subgroups of the 9/11 terrorist network. Moreover we also propose a methodology of detecting critical regions in covert networks; removing/capturing those nodes will disrupt most of the network


advanced data mining and applications | 2006

Structural analysis and mathematical methods for destabilizing terrorist networks using investigative data mining

Nasrullah Memon; Henrik Legind Larsen

This paper uses measures of structural cohesion from social network analysis (SNA) literature to discuss how to destabilize terrorist networks by visualizing participation index of various terrorists in the dataset. Structural cohesion is defined as the minimum number of terrorists, who if removed from the group, would disconnect the group. We tested bottom-up measures from SNA (cliques, n-cliques, n-clans and k-plex) using dataset of 9-11 terrorist network, and found that Mohamed Atta, who was known as ring leader of the plot, participated maximum number of groups generated by the structural cohesion measures. n nWe discuss the results of recently introduced algorithms for constructing hierarchy of terrorist networks, so that investigators can view the structure of non-hierarchical organizations, in order to destabilize terrorist networks. Based upon the degree centrality, eigenvector centrality, and dependence centrality measures, a method is proposed to construct the hierarchical structure of complex networks. It is tested on the September 11, 2001 terrorist network constructed by Valdis Krebs. In addition we also briefly discuss various roles in the network i.e., position role index, which discovers various positions in the network, for example, leaders / brokers and followers.


advanced data mining and applications | 2007

How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

Nasrullah Memon; David L. Hicks; Henrik Legind Larsen

A new model of dependence centrality is proposed. The centrality measure is based on shortest paths between the pair of nodes. We apply this measure with the demonstration of a small network example. The comparisons are made with betweenness centrality. We discuss how intelligence investigation agencies could benefit from the proposed measure. In addition to that we argue about the investigative data mining techniques we are using, and a comparison is provided with traditional data mining techniques.


acs ieee international conference on computer systems and applications | 2008

Detecting high-value individuals in covert networks: 7/7 London bombing case study

Nasrullah Memon; Nicholas Harkiolakis; David L. Hicks

This article focuses on the study and development of recently introduced new measures, theories, mathematical models and algorithms to detect high value individuals in terrorist networks. Specific models and tools are described, and applied to a case study to demonstrate their applicability to the area. We are confident that the models described can help intelligence agencies in understanding and dealing with terrorist networks.


availability, reliability and security | 2009

Novel Algorithms for Subgroup Detection in Terrorist Networks

Nasrullah Memon; Abdul Rasool Qureshi; Uffe Kock Wiil; David L. Hicks; Niels Bohrs Vej; Maersk Mc-Kinney

Discovery of the organizational structure of terrorist networks leads investigators to terrorist cells. Therefore, detection of covert networks from terrorists data is important to terrorism investigation and prevention of future terrorist activity. In this paper, we discuss this important area of subgroup detection in terrorist networks, propose novel algorithms for subgroup detection, and present a demonstration system that we have implemented.


military communications conference | 2007

Notice of Violation of IEEE Publication Principles Practical Algorithms and Mathematical Models for Destabilizing Terrorist Networks

Nasrullah Memon; David L. Hicks; Dil Muhammad Akbar Hussain; Henrik Legind Larsen

In this paper we employ practical algorithms and mathematical models for destabilizing terrorist networks. We present two case studies and show how terrorist networks could be destabilized using investigative data mining.


Apweb 2008 International Workshops | 2008

Extracting Information from Semi-structured Web Documents

Nasrullah Memon; Abdul Rasool Qureshi; David L. Hicks; Nicholas Harkiolakis

This article aims to automate the extraction of information from semi-structured web documents by minimizing the amount of hand coding. Extraction of information from the WWW can be used to structure the huge amount of data buried in web documents, so that data mining techniques can be applied. To achieve this target, automated extraction should be utilized to the extent possible since it must keep pace with a dynamic and chaotic Web on which analysis can be carried out using investigative data mining or social network analysis techniques. To achieve that goal a proposed framework called Spiner will be presented and analyzed in this paper.


intelligence and security informatics | 2008

Retraction Note to: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

Nasrullah Memon; Henrik Legind Larsen; David L. Hicks; Nicholas Harkiolakis

The publisher regrets to announce that the following chapter entitled “Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies” by Nasrullah Memon, Henrik Legind Larsen, David L. Hicks, and Nicholas Harkiolakis, pp. 477-489, published in LNCS 5075 has been retracted. This chapter contains a large amount of reused and uncited material that was not published within quotation marks.


Apweb 2008 International Workshops | 2008

Advanced Web and Network Technologies, and Applications

Nasrullah Memon; Abdul Rasool Qureshi; David L. Hicks; Nicholas Harkiolakis

This article aims to automate the extraction of information from semi-structured web documents by minimizing the amount of hand coding. Extraction of information from the WWW can be used to structure the huge amount of data buried in web documents, so that data mining techniques can be applied. To achieve this target, automated extraction should be utilized to the extent possible since it must keep pace with a dynamic and chaotic Web on which analysis can be carried out using investigative data mining or social network analysis techniques. To achieve that goal a proposed framework called Spiner will be presented and analyzed in this paper.


DMIN | 2006

Structural Analysis and Destabilizing Terrorist Networks.

Nasrullah Memon; Henrik Legind Larsen

Collaboration


Dive into the Nasrullah Memon's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jonathan David Farley

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge