...
首页> 外文期刊>Indian Journal of Science and Technology >Mining user Message Pattern for Suspicious Behavior on Terrorism using NLP in Social Networks with Single Sign-On
【24h】

Mining user Message Pattern for Suspicious Behavior on Terrorism using NLP in Social Networks with Single Sign-On

机译:单一登录社交网络中使用NLP挖掘恐怖主义可疑行为的用户消息模式

获取原文
           

摘要

Objectives: To find an effective way to find Suspicious Behavior on Terrorism Using NLP in Social Networks with Single Sign-On in advance and prevent the massive destruction of life and property. Methods/Statistical Analysis: A survey has been made to understand the behavior of people using the social networking. Social networking has seen a massive growth for more than a decade and popular among people. So, taking this into consideration it aim at developing a monitoring system which continuously monitors user activity in the social network to find any suspicious activity regarding terrorism. Natural Language Processing Technique is used for analyzing the text data and Least Significant Bit algorithm is used for Steganographic images. Findings: In our research work, we have considered two social network sites - Gmail and Twitter. We work on real time dataset fetched from Gmail and Twitter. These social networks are continuously monitored for user behavior. The user data from Gmail inbox, sent items, tweets, sent and replied twitter messages are fetched and passed to Natural Language processing to extract the data patterns related to terrorism. Based on the threshold of terrorism related data, the user behavior would be classified as normal, little suspicious and offensive. It considers a single sign on of the user into social network. It has considered the user activity in two social networks to get a precise data. There are existing works analyzing on user sentiments, sarcasm, psychological effects, political, expert advice, and recommendations on user ratings. To my knowledge there is no work done on analyzing user data on more than one social network on text and image data to find their suspicious behavior on terrorism. Application/Improvements: In our application, we are using the real data set of the users from Gmail and Twitter account using single sign on. The work is to analyse both the users text information and image shared via Gmail to find the suspicious behavior on terrorism and categorize them to normal, little suspicious and offensive. This information can be shared with the investigation team, where they can take any precautionary action preventing the world from massive destruction of life and property.
机译:目标:寻求一种有效的方法,该方法可以预先在具有单点登录功能的社交网络中使用NLP查找恐怖主义可疑行为,并防止大规模杀伤生命和财产。方法/统计分析:进行了一项调查,以了解使用社交网络的人们的行为。十多年来,社交网络得到了巨大的发展,并在人们中广受欢迎。因此,考虑到这一点,其目的在于开发一种监视系统,该监视系统连续监视社交网络中的用户活动,以发现有关恐怖主义的任何可疑活动。自然语言处理技术用于分析文本数据,而最低有效位算法用于隐写图像。调查结果:在研究工作中,我们考虑了两个社交网站-Gmail和Twitter。我们处理从Gmail和Twitter获取的实时数据集。不断监视这些社交网络的用户行为。从Gmail收件箱,已发送邮件,推文,已发送和已回复的Twitter消息中提取用户数据,并将其传递给自然语言处理,以提取与恐怖主义有关的数据模式。根据与恐怖主义有关的数据的阈值,用户行为将被分类为正常,少有可疑和令人反感。它考虑了用户对社交网络的单一登录。它已经考虑了两个社交网络中的用户活动以获取精确的数据。现有的工作分析了用户情绪,讽刺,心理影响,政治,专家建议以及关于用户评级的建议。据我所知,在分析多个文本和图像数据社交网络上的用户数据以发现其关于恐怖主义的可疑行为方面,尚无任何工作要做。应用程序/改进:在我们的应用程序中,我们使用来自Gmail和Twitter帐户的单次登录来获取用户的真实数据集。工作是分析用户通过Gmail共享的文本信息和图像,以查找有关恐怖主义的可疑行为,并将其归类为正常,可疑和令人反感的行为。这些信息可以与调查小组共享,他们可以在其中采取任何预防措施,以防止世界大规模地破坏生命和财产。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号