{"title":"监控用户在社交网络中的可疑活动","authors":"Mercy Paul Selvan, R. Selvaraj","doi":"10.1109/ICICES.2017.8070737","DOIUrl":null,"url":null,"abstract":"With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Monitoring Fishy activity of the user in social networking\",\"authors\":\"Mercy Paul Selvan, R. Selvaraj\",\"doi\":\"10.1109/ICICES.2017.8070737\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.\",\"PeriodicalId\":134931,\"journal\":{\"name\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2017.8070737\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070737","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Monitoring Fishy activity of the user in social networking
With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.