Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2018, Vol 20, Issue 5

Abstract

In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout in the top list that has nearly 313 million dynamic clients on a monthly basis with a whopping 500 million of tweets each day. The commonly shared information on Twitter varies from current affairs, occasions, superstars in every field to government or political issues. Therefore, there is a need to conduct targeted research on identifying approaches for vulnerable user identification in twitter. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. The proposed system is used in identifying the maximum set of profile data that are necessary for identifying vulnerable user in twitter and identify the appropriate data mining approach for such task. This research has been proposed with data mining techniques of Tweet Description Logic Rule Generation algorithm for finding and analysis to the vulnerable user and attackers. Such profiles are distinguished by implementing the above algorithm which considers the targeted user followers and the sharing Threshold Limit as its parameters. Trial results assures of following: The suggested technique beats different models in regard of accuracy, efficiency and least time. Also, the assessment reveals that the identification rate of current method is significantly more compared to other methods.

Authors and Affiliations

S. Revathi, Dr. M. Suriakala

Keywords

Related Articles

 A Survey on Word Sense Disambiguation

 Ambiguity has been always interwoven with human language and its evolution. Some argue that ambiguity of the human languages is a byproduct of its complexity, with words that are frequently used in language of...

 Agent Based Distributed Tutoring System modeling using Extended Tropos approach

 Due to the availability of enormous amount of resources for the tutoring system, there is a need for the distribution of the resources when developing such tutoring system.There are several users inthe distribute...

Cyber Security in the Era of Networking: A Review

Abstract: Cyber security is an intricate issue, affecting many application domains and straddling many disciplines and fields. Securing the critical infrastructures entails protecting not only the physical systems but, j...

 A Reflective Swarm Intelligence Algorithm

 Swarm Intelligence (SI) algorithms are heuristics for finding the optimal solutions of optimization problems. They are made up of groups of swarms that interact with one another in the search effort within their...

 Enhancement in Weighted PageRank Algorithm Using VOL

 There are billions of web pages available on the World Wide Web (WWW). So there are lots of search results corresponding to a user’s query out of which only some are relevant. The relevancy of a web page is cal...

Download PDF file
  • EP ID EP402115
  • DOI 10.9790/0661-2005022735.
  • Views 104
  • Downloads 0

How To Cite

S. Revathi, Dr. M. Suriakala (2018). Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation. IOSR Journals (IOSR Journal of Computer Engineering), 20(5), 27-35. https://europub.co.uk/articles/-A-402115