Retraction

Detecting high-value individuals in covert networks: 7/7 London bombing case study

Paper Information

Retraction Details

Nature of Retraction:

Retraction

Additional Notes:

Date of retraction unknown, estimated from conference date.

Citations (8)

8
Total Citations
5
Post-Retraction
(62.5%)
0
Pre-Retraction
0
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
0 Within 1 year
5 After 2+ years
5862 Days since retraction (latest)
Paper citing Detecting Hidden Hierarchy in Terrorist Networks: ...
Unknown Authors
Unknown Journal
Published: Unknown
Paper citing Detecting Hidden Hierarchy in Terrorist Networks: ...
Unknown Authors
Unknown Journal
Published: Unknown
Paper citing Detecting high-value individuals in covert network...
Unknown Authors
Unknown Journal
Published: Unknown
Paper citing Detecting high-value individuals in covert network...
Unknown Authors
Unknown Journal
Published: May 2024
5862 days after retraction
Paper citing Detecting Hidden Hierarchy in Terrorist Networks: ...
Unknown Authors
Unknown Journal
Published: Mar 2018
3627 days after retraction
Paper citing Detecting high-value individuals in covert network...
Unknown Authors
Unknown Journal
Published: Aug 2014
2319 days after retraction
Paper citing Detecting Key Players in 11-M Terrorist Network: A...
Unknown Authors
Unknown Journal
Published: Aug 2014
2292 days after retraction
Paper citing Detecting high-value individuals in covert network...
Unknown Authors
Unknown Journal
Published: Apr 2012
1440 days after retraction
Quick Stats
Total Citations: 8
Years Since Retraction: 17.6 years
Open Access: Yes
Last Checked: Never
Related Papers
An Insurgency of Things: Foray into the World of Improvised…
International Political Sociology • 25 citations
Detecting New Trends in Terrorist Networks
2010 International Conference on Advances in Social Networks Analysis and Mining • 5 citations
Small World Terrorist Networks: A Preliminary Investigation
Applications and Innovations in Intelligent Systems • 0 citations
Detecting Key Players in 11-M Terrorist Network: A Case Stu…
2009 International Conference on Availability, Reliability and Security • 5 citations
Detecting Critical Regions in Covert Networks: A Case Study…
2007 2nd International Conference on Availability, Reliability and Security • 9 citations