{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T22:07:43Z","timestamp":1771279663329,"version":"3.50.1"},"update-to":[{"DOI":"10.1109\/aiccsa.2008.4493536","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2008,4,22]],"date-time":"2008-04-22T00:00:00Z","timestamp":1208822400000},"record-id":"10962"}],"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493536","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:37:07Z","timestamp":1209389827000},"page":"206-215","source":"Crossref","is-referenced-by-count":8,"title":["Notice of Violation of IEEE Publication Principles: Detecting high-value individuals in covert networks: 7\/7 London bombing case study"],"prefix":"10.1109","author":[{"given":"Nasrullah","family":"Memon","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark"}]},{"given":"Nicholas","family":"Harkiolakis","sequence":"additional","affiliation":[{"name":"Hellenic American University, Athens, Greece"}]},{"given":"David L.","family":"Hicks","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Aalborg Universitet Esbjerg, Niels Bohrs Vej 8, DK-6700, Denmark"}]}],"member":"263","reference":[{"key":"19","article-title":"organized crime in netherlands","author":"fijnaut cyrille","year":"1998","journal-title":"The Hauge Kulwar Law International"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.178702"},{"key":"17","article-title":"sociological skills used in the capture of saddam hussein. (accessed on 25\/3\/2006)","author":"hougham","year":"2005"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.188701"},{"key":"18","first-page":"53","article-title":"the network paradigm applied to criminal organisations: theoretical nitpicking or a relevant doctrine for investigators? recent developments in the netherlands","volume":"24","author":"klerks","year":"2002","journal-title":"Connections"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026112"},{"key":"15","first-page":"45","article-title":"mapping networks of terrorist cells","volume":"24","author":"krebs","year":"2002","journal-title":"Connections"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.098702"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2007.39"},{"key":"14","first-page":"63","article-title":"six degrees of mohamed atta","volume":"2001","author":"stewart","year":"2001","journal-title":"Business 2 0"},{"key":"37","author":"nasrullah","year":"2007","journal-title":"Investigative Data Mining Mathematical Models for Analyzing Visualizing and Destabilizing Terrorist Networks"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.4135\/9781849209373","author":"degenne","year":"1999","journal-title":"Introducing Social Networks"},{"key":"38","author":"mena","year":"2003","journal-title":"Investigative Data Mining for Security and Criminal Detection"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1972.9989806"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"41","year":"0"},{"key":"40","year":"0","journal-title":"London Bombers Roots in Gujrat"},{"key":"22","year":"0"},{"key":"23","year":"0"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1093\/jopart\/mug029"},{"key":"26","author":"svenson","year":"2005","journal-title":"Complex Networks Models and Dynamics"},{"key":"27","year":"0"},{"key":"28","year":"0"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"3","article-title":"the structural analysis of criminal networks","volume":"3","author":"mcandrew","year":"1999","journal-title":"The Social Psychology of Crime Groups Teams and Networks Offender Profiling Series"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2307\/2095954"},{"key":"10","article-title":"data mining and data analysis for counterterrorism","author":"mary","year":"2004","journal-title":"CSIS Report"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1086\/226224"},{"key":"30","year":"0"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"32","year":"0"},{"key":"5","year":"0"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(03)00429-6"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90008-H"},{"key":"9","year":"0"},{"key":"8","first-page":"136","author":"hoffrnan","year":"1998","journal-title":"Inside Terrorism"}],"updated-by":[{"DOI":"10.1109\/aiccsa.2008.4493536","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2008,4,22]],"date-time":"2008-04-22T00:00:00Z","timestamp":1208822400000},"record-id":"10962"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","location":"Doha, Qatar","start":{"date-parts":[[2008,3,31]]},"end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493536.pdf?arnumber=4493536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T21:03:59Z","timestamp":1771275839000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4493536\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493536","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}