Memon, Hicks (2008): Detecting Key Players in 11-M Terrorist Network: A Case Study ares, pp.1254-1259, 2008 Third International Conference on Availability, Reliability and Security, 2008, 0-7695-3102-4/08 IEEE Computer Society DOI 10.1109/ARES.2008.173 (retracted)

Fragments from the documentation of suspected plagiarism found in the thesis of Nasrullah Memon are listed below if they also show parallels to Memon's publication given above. In order to see exactly what parallel exists between the source text of the fragment and the publication, one can follow these steps:

  • Open the online text comparison tool
  • Copy the full text of the publication into the right box of the tool
  • Click on a fragment listed below and copy the source text (right hand side of the fragment) into the left box of the tool
  • Press "Texte vergleichen", text parallels between Memon's publication and the source text are now marked in colour.
Note that while great care has been taken to avoid mistakes, this documentation does not comply with the standards that are routinely applied in the VroniPlag Wiki for the documentation of plagiarism in doctoral theses. In particular, these findings have not been double-checked.
Fragments Dissertation Pages Publication Comments Source
019 01 1254 Xu & Chen 2003
019 16 1254 in large parts a literal copy Katz et al. 2004
020 01 1254 in large parts a literal copy Katz et al. 2004
093 04 1254 note page 19/20 in the thesis are (very) similar to page 93/94 in the thesis Xu & Chen 2003
094 01 1254 note page 19/20 in the thesis are (very) similar to page 93/94 in the thesis Katz et al. 2004
094 28 1254 Xu & Chen 2003
103 15 1255 Koschuetzki et al. 2005
104 02 1255 Stephenson & Zelen 1989
104 12 1256 Koschuetzki et al. 2005
118 08 1256 Latora & Marchiori 2004
138 12 1256 Freeman 1980
139 11 1257 Freeman 1980
140 01 1257 Freeman 1980
147 18 1257 Yang et al. 2005
243 23 1259 Saxena et al. 2004

The fragments listed in the table above can all be found in Memon's thesis. However, there are additional findings of plagiarism in this publication that go beyond the thesis:

  • GISS (2006): Page 13-14 of this source has been copied literally to form the chapter "Terrorism Network Analysis" of the publication (pages: 1254-1255)

Note that this publication is very similar to the publication 2008e. In comparison to 2008e, some chapters haven been left out, the chapter "Case Study" has been changed, and the chapter "conclusions" has been somewhat adapted. The rest is a literal copy of 2008e.

Störung durch Adblocker erkannt!

Wikia ist eine gebührenfreie Seite, die sich durch Werbung finanziert. Benutzer, die Adblocker einsetzen, haben eine modifizierte Ansicht der Seite.

Wikia ist nicht verfügbar, wenn du weitere Modifikationen in dem Adblocker-Programm gemacht hast. Wenn du sie entfernst, dann wird die Seite ohne Probleme geladen.

Auch bei FANDOM

Zufälliges Wiki