Notice of Violation of IEEE Publication Principles
"Detecting New Trends in Terrorist Networks," by Uffe Kock Wiil, Nasrullah Memon, and Panagiotis Karampelas in the Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2010, pp.435-440
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.
This paper has copied portions of text from the sources cited below. The lead author, Nasrullah Memon, was found to be solely responsible for the violation. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
"Social Network Analysis and Information Fusion for AntiTerrorism" by Pontus Svenson, Per Svensson, and Hugo Tullberg in the Proceedings of the 2006 Conference on Civil and Military Readiness (CIMI), May 2006
Data Mining: Concepts and Techniques (second edition), by Jiawei Han and Micheline Kamber Morgan Kaufmann, Elsevier, 2006 This paper discusses new trends in terrorist networks. We investigate a new case study regarding the recent Denmark terror plan and present analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network surrounding the recent Denmark terror plan is studied through publicly available information. We are able to map a piece of the network centered on David Headley, who recently confessed to have planned a terrorist attack to take place on Danish soil. The map gives us an insight into the organizations and people involved.