Abstract
The publisher regrets to announce that the following chapter entitled “How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks” by Nasrullah Memon, David L. Hicks, and Henrik Legind Larsen, pp. 430-441, published in LNAI 4632 has been retracted. This chapter contains a large amount of reused and uncited material that was not published within quotation marks.
Table 1 of the paper starting on page 430 of this volume was copied, without permission, from the paper “Countering Terrorism through Information and Privacy Protection Technologies” by R. Popp and J. Poindexter, published in Security & Privacy, IEEE (Volume 4, Issue 6), 2006.
The original online version for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-73871-8_40
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Memon, N., Hicks, D.L., Larsen, H.L. (2007). Retraction Note to: How Investigative Data Mining Can Help Intelligence Agencies to Discover Dependence of Nodes in Terrorist Networks. In: Alhajj, R., Gao, H., Li, J., Li, X., Zaïane, O.R. (eds) Advanced Data Mining and Applications. ADMA 2007. Lecture Notes in Computer Science(), vol 4632. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73871-8_61
Download citation
DOI: https://doi.org/10.1007/978-3-540-73871-8_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73870-1
Online ISBN: 978-3-540-73871-8
eBook Packages: Computer ScienceComputer Science (R0)