Skip to main content

Retraction Note to: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies

  • Erratum
  • Conference paper
Intelligence and Security Informatics (ISI 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5075))

Included in the following conference series:

  • 1912 Accesses

Abstract

The publisher regrets to announce that the following chapter entitled “Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies” by Nasrullah Memon, Henrik Legind Larsen, David L. Hicks, and Nicholas Harkiolakis, pp. 477-489, published in LNCS 5075 has been retracted. This chapter contains a large amount of reused and uncited material that was not published within quotation marks.

The original online version for this chapter can be found at http://dx.doi.org/10.1007/978-3-540-69304-8_50

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Memon, N., Larsen, H.L., Hicks, D.L., Harkiolakis, N. (2008). Retraction Note to: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69304-8_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69136-5

  • Online ISBN: 978-3-540-69304-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics