Survey on counter Web Terrorism


  • Jeberson W Department of CSE & IT SSET, SHIATS, Allahabad UP, India
  • Sharma L Department of CSE and IT SSET, SHIATS, Allahabad UP, India


Terrorist activities, social network


Terrorist activities is a big issue for the whole humanity, and as the whole world is moving rapidly by utilizing IT innovations, similarly terrorist groups are also using IT technologies as powerful tool for destructive activities. Today every terrorist group has strong presence over the web. In this paper we have surveyed various techniques and methods to analysis and prevent terrorist related activities. We found that that a timely identification of terrorist activities could help to prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals’ ideas, messages, and connections. Paper also consists of an idea for identification & destabilization of terror groups in social network.


Alexander Semenov, Alexander Nikolaev, Jari Veijalainen, “Online Activity Traces Around a “Boston Bomber””, IEEE 2013, pp. 1050-1053

Muhammad Akram Shaikh, Wang Jiaxin, “Investigative Data Mining: Identifying Key Nodes in Terrorist Networks”, IEEE 2006, pp. 201-206

Zhaobo Luo, Xiaohong Jiang, Yi Feng and Chaolun Xia, “Dynamic Core Detection in Social Network Analysis”, IEEE 2009, pp 343-347

Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder kakei, “Analysis of Terrorist Groups on Facebook”, IEEE 2013, pp. 221-221

Fredrik Johansson, Lisa Kaati, Amendra Shrestha, “Detecting Multiple Aliases in Social Media”, IEEE 2013, pp.1004-1011

M. Banko, M. Cafarella, S. Soderland, M. Broadhead, and O. Etzioni, “Open information extraction from the web,” Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2670–2676, 2007.

H. Huang, Z. Wen, D. Yu, H. Ji, Y. Sun, J. Han, and H.Li, “Resolving entity morphs in censored data,” Proceedings of the 51st Annual Meeting of the Association of Computational Linguistics, 2013.

H. Ji, H. Deng, and J. Han, “Uncertainty reduction for knowledge discovery and information extraction on WWW,” IEEE Special Issue on Web-Scale Multimedia Processing and Applications, vol. 100, no. 9, pp. 2658–2674.

Q. Li, H. Ji, and L. Huang, “Joint event extraction via structured prediction with global features,” Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013.

Q. Li, H. Li, H. Ji, W. Wang, J. Zheng, and F. Huang, “Joint bilingual name tagging for parallel corpora,” Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012.

K.-W. Chang, R. Samdani, A. Rozovskaya, M. Sammons, and D. Roth, “Illinois-coref: the UI system in the CoNLL-2012 shared task,” Proceedings of the CoNLL Shared Task, 2012.

J. D’hondt, P.-A. Verhaegen, J. Vertommen, D. Cattryse, and J. Duflou, “Topic identification based on document coherence and spectral analysis,” Information Sciences, vol. 181, pp. 3783–3797, 2011.

L. Duboc, D. Rosenblum, and T. Wicks, “A framework for characterization and analysis of software system scalability,” Proceedings of the 6th European Software Engineering Conference and ACM Symposium on Foundations of Software Engineering, pp. 375– 384, 2007.

K. Sambhoos, R. Nagi, M. Sudit, and A. Stotz, “Enhancements to high level data fusion using graph matching and state space search,” Information Fusion, in press, corrected proof, 2009.

M. Mittrick, H. Roy, S. Kase, and E. Bowman, “Refinement of the Ali Baba data set,” ARL-TN-0476, 2012.

Witold Drozdzynski, Hans-Ulrich Krieger, Jakub Piskorskiand, and Ulrich Schafer, “SProUT–a generalpurpose NLP framework integrating finite-state and unification-based grammar formalisms,” published by springer in Finite-State Methods and Natural Language Processing (LNCS) Volume 4002, pp. 302-303, 2006,.

(2012). [Online]. Available:

M.W.Du, and S.C.Chang, “An Approach to Designing Very Fast Approximate String Matching algorithms,” IEEE journal, 1994.

Y. Zhai and B. Liu, “Web data extraction based on partial tree alignment,” in Prococeeding of ACM, 2005.

Jer Lang Hong, “Data Extraction for Deep Web Using WordNet,” published by IEEE Transactions on systems, man and cybernetics, 2011.

Sunitha Ramanujam, and et al., “A Relational Wrapper for RDF Reification,” E. Ferrari et al. (Eds.): TM 2009, IFIP AICT 300, pp. 196– 214, IFIP International Federation for Information Processing 2009.

C.D. Manning, P. Raghavan, and H. Schutze, Introduction to Information Retrieval, Cambridge Univ. Press, 2008.

(2013). [Online]. book.pdf.

(2012). [Online]. Available: of_Crime/

E. Thambiraja,G. Ramesh, and Uma Rani, “A Survey on Various Most Common Encryption Techniques,” published by IJARCSSE Journal volume 2 issue 7, pp. 226-233, 2012.

M. Mahmood Ali, and Lakshmi Rajamani, “Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages,” IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions , IIT Kanpur, India, pp. 42-56, 2013.

Chaditsa Poulatova, “The Media: A Terrorist Tool or a Silent Ally,” published by IEEE in 2011.




How to Cite

Jeberson, W., & Sharma, L. (2024). Survey on counter Web Terrorism. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(05), 1744–1747. Retrieved from



Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.