Counter terrorism on online social networks using web mining techniques

F Ali, FH Khan, S Bashir, U Ahmad - … 25, 2018, Revised Selected Papers 1, 2019 - Springer
Abstract Online Social Networks (OSN) like Twitter, Facebook, LinkedIn, Myspace, YouTube
and Digg are getting very popular nowadays. They have become a part of everybody's life …

[PDF][PDF] Web mining to detect online spread of terrorism

R Goradia, S Mohite, A Jhakhariya… - International Journal of …, 2020 - academia.edu
In the recent times, terrorism has grown in an exponential manner in certain parts of the
world. This enormous growth in terrorist activities has made it important to stop terrorism and …

[PDF][PDF] A novel approach for social network analysis & web mining for counter terrorism

GA Patil, KB Manwade, PS Landge - International Journal on Computer …, 2012 - Citeseer
Terrorists and extremists are increasingly utilizing Internet technology as an effective mode
to enhance their ability to influence the outside world. Lack of multilingual and multimedia …

[PDF][PDF] A survey on terrorist network mining: current trends and opportunities

N Chaurasia, M Dhakar, A Tiwari… - International Journal of …, 2012 - academia.edu
Along with the modernization and widespread usage of Internet, the security of the mankind
has become one of the major issues today. The threat of human society from the terrorists is …

[PDF][PDF] Survey on counter Web Terrorism

W Jeberson, L Sharma - Compusoft, 2015 - researchgate.net
Terrorist activities is a big issue for the whole humanity, and as the whole world is moving
rapidly by utilizing IT innovations, similarly terrorist groups are also using IT technologies as …

[PDF][PDF] Proposed Architecture for Terrorist Web Miner

RD Gaharwar, DB Shah… - International Journal of …, 2015 - researchgate.net
ABSTRACT Terrorist Web Mining generates the novel information which can be used by
SNA tools for Terrorist Network Mining. We assume that information available on open …

[PDF][PDF] Unauthorized terror attack tracking using web usage mining

R Yevale, M Dhage, T Nalawade, T Kaule - IJCSIT) International Journal of …, 2014 - Citeseer
Terrorist groups use the Web as their infrastructure for various purposes. One example is the
forming of new local cells that may later become active and perform acts of terror. The Terror …

Propose a framework for criminal mining by web structure and content mining

J Hosseinkhani, S Chuprat, H Taherdoost… - … Journal of Advanced …, 2012 - papers.ssrn.com
Anonymous and suitable information always are provided by criminal web data for Law
enforcement agencies. The digital data that are used in forensic analysis comprises of …

[PDF][PDF] Exploring the current trends and future prospects in terrorist network mining

N Chaurasia, M Dhakar, A Chharia, A Tiwari… - Proceedings of The …, 2012 - airccj.org
In today's era of hi-tech technologies, criminals are easily fulfilling their inhuman goals
against the mankind. Thus, the security of civilians has significantly become important. In this …

[PDF][PDF] XGraphticsCLUS: Web mining hyperlinks and content of terrorism websites for homeland security

SK Jayanthi - International Journal of Advanced Networking and …, 2011 - Citeseer
------------------------------------------------------------------ABSTRACT--------------------------------------------
------------------World Wide Web has become one of the best and fast communication media …