Nasrullah Memon

According to our database1, Nasrullah Memon authored at least 50 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Crime Analysis using Open Source Information.
CoRR, 2019

2013
Social network and high performance in smart communications.
J. Supercomput., 2013

Modeling Suspicious Email Detection using Enhanced Feature Selection.
CoRR, 2013

From Public Outrage to the Burst of Public Violence: An Epidemic-Like Model.
CoRR, 2013

CEAI: CCM based Email Authorship Identification Model.
CoRR, 2013

PSN: Portfolio Social Network.
CoRR, 2013

2012
Hybrid model of content extraction.
J. Comput. Syst. Sci., 2012

Semantic Analysis of FBI News Reports.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

2011
Cluster Based Text Classification Model.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Detection of Illegitimate Emails Using Boosting Algorithm.
Proceedings of the Counterterrorism and Open Source Intelligence, 2011

Introduction to the first issue of Social Network Analysis and Mining journal.
Soc. Netw. Anal. Min., 2011

Introduction to the second issue of <i>Social Network Analysis and Mining</i> journal: scientific computing for social network analysis and dynamicity.
Soc. Netw. Anal. Min., 2011

Harvesting covert networks: a case study of the iMiner database.
Int. J. Netw. Virtual Organisations, 2011

Supporting reasoning and communication for intelligence officers.
Int. J. Netw. Virtual Organisations, 2011

Evaluation of Tools and Slicing Techniques for Efficient Verification of UML/OCL Class Diagrams.
Adv. Softw. Eng., 2011

Extended approximate string matching algorithms to detect name aliases.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

heteroHarvest: Harvesting information from heterogeneous sources.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

LanguageNet: A novel framework for processing unstructured text information.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Harvesting Information from Heterogeneous Sources.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Statistical Model for Content Extraction.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

Evolution of Terrorist Network Using Clustered Approach: A Case Study.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

CCM: A Text Classification Model by Clustering.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
SOA Security Aspects in Web-based Architectural Design.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

EWAS: Modeling Application for Early Detection of Terrorist Threats.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Social Networks: A Powerful Model for Serving a Wide Range of Domains.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Social Network Data Mining: Research Questions, Techniques, and Applications.
Proceedings of the Data Mining for Social Network Data, 2010

Practical algorithms for subgroup detection in covert networks.
Int. J. Bus. Intell. Data Min., 2010

Detecting Terrorism Evidence in Text Documents.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

UOST: UML/OCL Aggressive Slicing Technique for Efficient Verification of Models.
Proceedings of the System Analysis and Modeling: About Models - 6th International Workshop, 2010

Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Verification-driven slicing of UML/OCL models.
Proceedings of the ASE 2010, 2010

Knowledge Management Tools for Terrorist Network Analysis.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2010

CrimeFighter Assistant - A Knowledge Management Tool for Terrorist Network Analysis.
Proceedings of the KMIS 2010, 2010

Measuring Link Importance in Terrorist Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
The Security Aspects in Web-Based Architectural Design Using Service Oriented Architecture.
Proceedings of the 13th International Conference on Information Visualisation, 2009

Supporting emergent knowledge and team communication in police investigations.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

CrimeFighter: A Toolbox for Counterterrorism.
Proceedings of the Knowledge Discovery, Knowlege Engineering and Knowledge Management, 2009

Knowledge Management Processes, Tools and Techniques for Counterterrorism.
Proceedings of the KMIS 2009 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Funchal, 2009

The Role of Service Oriented Architecture in Telemedicine Healthcare System.
Proceedings of the 2009 International Conference on Complex, 2009

Strengths and Weaknesses of Maturity Driven Process Improvement Effort.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Emergent Structure and Awareness Support for Intelligence Analysis.
Proceedings of the 12th International Conference on Information Visualisation, 2008

Revealing Topological Properties of Terrorist Networks.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

A data mining approach to intelligence operations.
Proceedings of the Data Mining, 2008

2007
Understanding the structure of terrorist networks.
Int. J. Bus. Intell. Data Min., 2007

Detecting Core Members in Terrorist Networks: A Case Study.
Proceedings of the Mining Massive Data Sets for Security, 2007

Dependence Centrality: Identifying Dependence of Nodes in Terrorist Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

A First Look on iMiner' s Knowledge Base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

2006
Practical Algorithms for Destabilizing Terrorist Networks.
Proceedings of the Intelligence and Security Informatics, 2006

Structural Analysis and Destabilizing Terrorist Networks.
Proceedings of the 2006 International Conference on Data Mining, 2006

2004
Investigative Data Mining: A General Framework.
Proceedings of the International Conference on Computational Intelligence, 2004


  Loading...