While analysing the 2007 thesis by Nasrullah Memon, substantial amounts of text similarities have been found in various other publications (co-)authored by Memon with years of publication ranging from 2005 to 2011. The table below lists publications affected and provides links to subpages where the text similarities are documented in detail.
This shows on the one hand that many of Memon's publications are also affected by substantial plagiarism. On the other hand it shows that the claim that the thesis here investigated is not actually the thesis that he submitted for examination is highly implausible. (See Thesis Version for details)
In the table below, click on the year in order to obtain more information on the publication as well as a list of fragments that were originally created to document potential plagiarism in the thesis of Nasrullah Memon but which are also found in the publication under consideration (at least in part).
In some cases the last column provides a link to a detailed documentation of plagiarism and text duplication in the paper.
Nr | Year | Authors | Title | Publisher | Frag. | Analysis |
---|---|---|---|---|---|---|
1 | 2005a | Memon | Detecting Terrorist Activity Patterns Using Investigative Data Mining Tool | JAIST | 11 | |
2 | 2005b | Memon, Qureshi | Investigative Data Mining and its Application in Counterterrorism | WSEAS | 6 | |
3 | 2006a | Memon, Larsen | Structural Analysis and Mathematical Methods for Destabilizing Terrorist Networks Using Investigative Data Mining | Springer (retracted) | 11 | Nm3 |
4 | 2006b | Memon, Larsen | Practical Algorithms for Destabilizing Terrorist Networks | Springer | 1 | |
5 | 2006c | Memon, Larsen | Practical Approaches for Analysis, Visualization and Destabilizing Terrorist Networks | IEEE (officially found to be in violation of IEEE's Publication Principles) | 5 | |
6 | 2006d | Memon, Larsen | Structural Analysis and Destabilizing Terrorist Networks | CSREA Press | 11 | |
7 | 2007a | Memon, Larsen | Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks | Nato | 20 | |
8 | 2007b | Memon, Hicks, Larsen | How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks |
Springer |
27 | Nm2 |
9 | 2007c | Memon, Hicks, Larsen | Harvesting Terrorists Information from Web | IEEE (officially found to be in violation of IEEE's Publication Principles) | 20 | |
10 | 2007d | Memon, Kristoffersen, Hicks, Larsen | Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network | IEEE (officially found to be in violation of IEEE's Publication Principles) | 6 | |
11 | 2007e | Memon, Hicks, Hussain, Larsen | Practical Algorithms and Mathematical models for destabilizing terrorist networks | IEEE (officially found to be in violation of IEEE's Publication Principles) | 17 | |
12 | 2008a | Memon, Larsen, Hicks, Harkiolakis | Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies | Springer (retracted) | 12 | Nm6 |
13 | 2008b | Harkiolakis, Memon, Hicks, Atzenbeck | Revealing Topological Properties of Terrorist Networks | ICAI (Worldcomp) | 17 | |
14 | 2008c | Memon, Qureshi, Hicks, Harkiolakis | Extracting Information from Semi-structured Web Documents: A Framework | Springer (retracted) | 6 | |
15 | 2008d | Memon, Hicks, Harkiolakis | A Data Mining Approach to Intelligence Operations | SPIE | 27 | |
16 | 2008e | Memon, Harkiolakis, Hicks | Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study | IEEE (officially found to be in violation of IEEE's Publication Principles) | 28 | |
17 | 2008f | Memon, Hicks | Detecting Key Players in 11-M Terrorist Network: A Case Study | IEEE (officially found to be in violation of IEEE's Publication Principles) | 15 | |
18 | 2008g | Memon, Hicks, Harkiolakis, Rajput | Small World Terrorist Networks: A Preliminary Investigation | Springer (retracted) | 6 | Nm4 |
19 | 2009a | Memon, Qureshi, Wiil, Hicks | Novel Algorithms for Subgroup Detection in Terrorist Networks | IEEE (officially found to be in violation of IEEE's Publication Principles) | 19 | |
20 | 2009b | Qureshi, Wiil, Memon | Modeling Early Warning System to predict Terrorist Threats: preliminary results | ISKSS | 1 | |
21 | 2010a | Wiil, Gniadek, Memon | Measuring Link Importance in Terrorist Networks | IEEE | 1 | |
22 | 2010b | Wiil, Memon, Karampelas | Detecting New Trends in Terrorist Networks | IEEE (officially found to be in violation of IEEE's Publication Principles) | 3 | |
23 | 2010c | Qureshi, Memon, Wiil | EWAS: Modeling Application for Early Detection of Terrorist Threats | Springer | 1 | |
24 | 2010d | Memon, Wiil, Qureshi | Practical algorithms for subgroup detection in covert networks | Inderscience | 27 | |
25 | 2010e | Rasool, Memon, Wiil, Karampelas | Filtering the Open-source Information | IEEE | 1 | |
26 | 2011a | Memon, Wiil, Alhajj, Atzenbeck, Harkiolakis | Harvesting covert networks: a case study of the iMiner database | Inderscience | 33 | |
27 | 2011b | Wiil, Memon, Gniadek | CrimeFighter: A Toolbox for Counterterrorism | Springer | 1 | |
28 | 2011c | Memon, Wiil, Qureshi, Karampelas | Exploring the Evolution of Terrorist Networks | Springer (retracted) | 8 | Nm5 |
29 | 2011d | Wiil, Gniadek, Memon | A Novel Method to Analyze the Importance of Links in Terrorist Networks | Springer (retracted) | 1 | identical to 2010a |