Survey on counter Web Terrorism
Keywords:
Terrorist activities, social networkAbstract
Terrorist activities is a big issue for the whole humanity, and as the whole world is moving rapidly by utilizing IT innovations, similarly terrorist groups are also using IT technologies as powerful tool for destructive activities. Today every terrorist group has strong presence over the web. In this paper we have surveyed various techniques and methods to analysis and prevent terrorist related activities. We found that that a timely identification of terrorist activities could help to prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals’ ideas, messages, and connections. Paper also consists of an idea for identification & destabilization of terror groups in social network.
References
Alexander Semenov, Alexander Nikolaev, Jari Veijalainen, “Online Activity Traces Around a “Boston Bomber””, IEEE 2013, pp. 1050-1053
Muhammad Akram Shaikh, Wang Jiaxin, “Investigative Data Mining: Identifying Key Nodes in Terrorist Networks”, IEEE 2006, pp. 201-206
Zhaobo Luo, Xiaohong Jiang, Yi Feng and Chaolun Xia, “Dynamic Core Detection in Social Network Analysis”, IEEE 2009, pp 343-347
Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder kakei, “Analysis of Terrorist Groups on Facebook”, IEEE 2013, pp. 221-221
Fredrik Johansson, Lisa Kaati, Amendra Shrestha, “Detecting Multiple Aliases in Social Media”, IEEE 2013, pp.1004-1011
M. Banko, M. Cafarella, S. Soderland, M. Broadhead, and O. Etzioni, “Open information extraction from the web,” Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2670–2676, 2007.
http://apollo2.cs.illinois.edu
H. Huang, Z. Wen, D. Yu, H. Ji, Y. Sun, J. Han, and H.Li, “Resolving entity morphs in censored data,” Proceedings of the 51st Annual Meeting of the Association of Computational Linguistics, 2013.
H. Ji, H. Deng, and J. Han, “Uncertainty reduction for knowledge discovery and information extraction on WWW,” IEEE Special Issue on Web-Scale Multimedia Processing and Applications, vol. 100, no. 9, pp. 2658–2674.
Q. Li, H. Ji, and L. Huang, “Joint event extraction via structured prediction with global features,” Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013.
Q. Li, H. Li, H. Ji, W. Wang, J. Zheng, and F. Huang, “Joint bilingual name tagging for parallel corpora,” Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012.
K.-W. Chang, R. Samdani, A. Rozovskaya, M. Sammons, and D. Roth, “Illinois-coref: the UI system in the CoNLL-2012 shared task,” Proceedings of the CoNLL Shared Task, 2012.
J. D’hondt, P.-A. Verhaegen, J. Vertommen, D. Cattryse, and J. Duflou, “Topic identification based on document coherence and spectral analysis,” Information Sciences, vol. 181, pp. 3783–3797, 2011.
L. Duboc, D. Rosenblum, and T. Wicks, “A framework for characterization and analysis of software system scalability,” Proceedings of the 6th European Software Engineering Conference and ACM Symposium on Foundations of Software Engineering, pp. 375– 384, 2007.
K. Sambhoos, R. Nagi, M. Sudit, and A. Stotz, “Enhancements to high level data fusion using graph matching and state space search,” Information Fusion, in press, corrected proof, 2009.
M. Mittrick, H. Roy, S. Kase, and E. Bowman, “Refinement of the Ali Baba data set,” ARL-TN-0476, 2012.
Witold Drozdzynski, Hans-Ulrich Krieger, Jakub Piskorskiand, and Ulrich Schafer, “SProUT–a generalpurpose NLP framework integrating finite-state and unification-based grammar formalisms,” published by springer in Finite-State Methods and Natural Language Processing (LNCS) Volume 4002, pp. 302-303, 2006,.
(2012). [Online]. Available: http://www.webconfs.com/stop-words.php
M.W.Du, and S.C.Chang, “An Approach to Designing Very Fast Approximate String Matching algorithms,” IEEE journal, 1994.
Y. Zhai and B. Liu, “Web data extraction based on partial tree alignment,” in Prococeeding of ACM, 2005.
Jer Lang Hong, “Data Extraction for Deep Web Using WordNet,” published by IEEE Transactions on systems, man and cybernetics, 2011.
Sunitha Ramanujam, and et al., “A Relational Wrapper for RDF Reification,” E. Ferrari et al. (Eds.): TM 2009, IFIP AICT 300, pp. 196– 214, IFIP International Federation for Information Processing 2009.
C.D. Manning, P. Raghavan, and H. Schutze, Introduction to Information Retrieval, Cambridge Univ. Press, 2008.
(2013). [Online].http://www.start.umd.edu/gtd/dowloads/code book.pdf.
(2012). [Online]. Available: http://dir.yahoo.com/Society_and_Culture/Crime/Types_ of_Crime/
E. Thambiraja,G. Ramesh, and Uma Rani, “A Survey on Various Most Common Encryption Techniques,” published by IJARCSSE Journal volume 2 issue 7, pp. 226-233, 2012.
M. Mahmood Ali, and Lakshmi Rajamani, “Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages,” IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions , IIT Kanpur, India, pp. 42-56, 2013.
Chaditsa Poulatova, “The Media: A Terrorist Tool or a Silent Ally,” published by IEEE in 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.