{"title":"Monitoring Fishy activity of the user in social networking","authors":"Mercy Paul Selvan, R. Selvaraj","doi":"10.1109/ICICES.2017.8070737","DOIUrl":null,"url":null,"abstract":"With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.