A Novel Approach for Social Network Analysis & Web Mining for Counter Terrorism

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11

Abstract

Terrorists and extremists are increasingly utilizing Internet technology as an effective mode to enhance their ability to influence the outside world. Lack of multilingual and multimedia terrorist/extremist collections and advanced analytical methodologies; limit our experiential understanding of their Internet usage. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents and to discover hidden relationships among communities. It has been shown in the literature that content analysis gives more insight of technical sophistication, content richness; whereas the link analysis focuses on the web interactivity. A dark web attribute system has made the sincere effort on identifying and comparing terrorist website with genuine web sites by using content and link analysis still there is scope in the same area as proposed in [1]. This proposed work focuses on identifying & analyzing new web page attributes. It is aimed to compare different terrorist/extremist sites with genuine sites and accordingly prepare metrics which can be further used for identification of other sites of terrorist/extremist groups. Also proposed work focus on to visualize and analyze hidden domestic terrorism communities and intercommunity relationships among all web sites in our collection.

Authors and Affiliations

Prof. G. A. Patil , Prof. K. B. Manwade , Mr. P. S. Landge

Keywords

Related Articles

Efficient Forward Node List Algorithm for Broadcasting in symmetric Mobile Ad hoc networks

A mobile ad hoc network enables wireless communications between participating mobile nodes without the assistance of any base station. Two nodes that are out of one another’s ransmission range need the support of interm...

MSMET: A MODIFIED & SECURE MULTILANGUAGE ENCRYPTION TECHNIQUE

Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Multilanguage cryptography, an advancement of classical cryptography, may evolve as a choice of clas...

Authenticated Routing Protocol Based on Reputation System For Adhoc Networks

Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of t...

PRESERVING PRIVACY IN DATA MINING USING SEMMA METHODOLOGY

The huge amount of data available means that it is possible to learn a lot of information about individuals from public data. Here, this open data need to be sheltered from unlawful contact. The privacy-preserving data m...

The proposed quantum computational basis of deep ecology: its implications for agriculture

Quantum computation has been proposed to generate consciousness. The terms atman field and consciousness vector have also been used to describe the properties of consciousness. It has also been proposed that the human ac...

Download PDF file
  • EP ID EP108932
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

Prof. G. A. Patil, Prof. K. B. Manwade, Mr. P. S. Landge (2012). A Novel Approach for Social Network Analysis & Web Mining for Counter Terrorism. International Journal on Computer Science and Engineering, 4(11), 1816-1825. https://europub.co.uk/articles/-A-108932