VroniPlag Wiki

This Wiki is best viewed in Firefox with Adblock plus extension.

MEHR ERFAHREN

VroniPlag Wiki
Registrieren

While analysing the 2007 thesis by Nasrullah Memon, substantial amounts of text similarities have been found in various other publications (co-)authored by Memon with years of publication ranging from 2005 to 2011. The table below lists publications affected and provides links to subpages where the text similarities are documented in detail.

This shows on the one hand that many of Memon's publications are also affected by substantial plagiarism. On the other hand it shows that the claim that the thesis here investigated is not actually the thesis that he submitted for examination is highly implausible. (See Thesis Version for details)

In the table below, click on the year in order to obtain more information on the publication as well as a list of fragments that were originally created to document potential plagiarism in the thesis of Nasrullah Memon but which are also found in the publication under consideration (at least in part).

In some cases the last column provides a link to a detailed documentation of plagiarism and text duplication in the paper.

Nr Year Authors Title Publisher Frag. Analysis
1 2005a Memon Detecting Terrorist Activity Patterns Using Investigative Data Mining Tool JAIST 11
2 2005b Memon, Qureshi Investigative Data Mining and its Application in Counterterrorism WSEAS 6
3 2006a Memon, Larsen Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining Springer (retracted) 11 Nm3
4 2006b Memon, Larsen Practical Algorithms for Destabilizing Terrorist Networks Springer 1
5 2006c Memon, Larsen Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks IEEE (officially found to be in violation of IEEE's Publication Principles) 5
6 2006d Memon, Larsen Structural Analysis and Destabilizing Terrorist Networks CSREA Press 11
7 2007a Memon, Larsen Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks Nato 20
8 2007b Memon, Hicks, Larsen How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks

Springer

(retracted)

27 Nm2
9 2007c Memon, Hicks, Larsen Harvesting Terrorists Information from Web IEEE (officially found to be in violation of IEEE's Publication Principles) 20
10 2007d Memon, Kristoffersen, Hicks, Larsen Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network IEEE (officially found to be in violation of IEEE's Publication Principles) 6
11 2007e Memon, Hicks, Hussain, Larsen Practical Algorithms and Mathematical models for destabilizing terrorist networks IEEE (officially found to be in violation of IEEE's Publication Principles) 17
12 2008a Memon, Larsen, Hicks, Harkiolakis Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies Springer (retracted) 12 Nm6
13 2008b Harkiolakis, Memon, Hicks, Atzenbeck Revealing Topological Properties of Terrorist Networks ICAI (Worldcomp) 17
14 2008c Memon, Qureshi, Hicks, Harkiolakis Extracting Information from Semi-structured Web Documents: A Framework Springer (retracted) 6
15 2008d Memon, Hicks, Harkiolakis A Data Mining Approach to Intelligence Operations SPIE 27
16 2008e Memon, Harkiolakis, Hicks Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study IEEE (officially found to be in violation of IEEE's Publication Principles) 28
17 2008f Memon, Hicks Detecting Key Players in 11-M Terrorist Network: A Case Study IEEE (officially found to be in violation of IEEE's Publication Principles) 15
18 2008g Memon, Hicks, Harkiolakis, Rajput Small World Terrorist Networks: A Preliminary Investigation Springer (retracted) 6 Nm4
19 2009a Memon, Qureshi, Wiil, Hicks Novel Algorithms for Subgroup Detection in Terrorist Networks IEEE (officially found to be in violation of IEEE's Publication Principles) 19
20 2009b Qureshi, Wiil, Memon Modeling Early Warning System to predict Terrorist Threats: preliminary results ISKSS 1
21 2010a Wiil, Gniadek, Memon Measuring Link Importance in Terrorist Networks IEEE 1
22 2010b Wiil, Memon, Karampelas Detecting New Trends in Terrorist Networks IEEE (officially found to be in violation of IEEE's Publication Principles) 3
23 2010c Qureshi, Memon, Wiil EWAS: Modeling Application for Early Detection of Terrorist Threats Springer 1
24 2010d Memon, Wiil, Qureshi Practical algorithms for subgroup detection in covert networks Inderscience 27
25 2010e Rasool, Memon, Wiil, Karampelas Filtering the Open-source Information IEEE 1
26 2011a Memon, Wiil, Alhajj, Atzenbeck, Harkiolakis Harvesting covert networks: a case study of the iMiner database Inderscience 33
27 2011b Wiil, Memon, Gniadek CrimeFighter: A Toolbox for Counterterrorism Springer 1
28 2011c Memon, Wiil, Qureshi, Karampelas Exploring the Evolution of Terrorist Networks Springer (retracted) 8 Nm5
29 2011d Wiil, Gniadek, Memon A Novel Method to Analyze the Importance of Links in Terrorist Networks Springer (retracted) 1 identical to 2010a