Reference Hub3
Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities

Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities

Romil Rawat, Vinod Mahor, Bhagwati Garg, Shrikant Telang, Kiran Pachlasiya, Anil Kumar, Surendra Kumar Shukla, Megha Kuliha
Copyright: © 2022 |Volume: 16 |Issue: 1 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180203|DOI: 10.4018/IJISP.285581
Cite Article Cite Article

MLA

Rawat, Romil, et al. "Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities." IJISP vol.16, no.1 2022: pp.1-14. http://doi.org/10.4018/IJISP.285581

APA

Rawat, R., Mahor, V., Garg, B., Telang, S., Pachlasiya, K., Kumar, A., Shukla, S. K., & Kuliha, M. (2022). Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities. International Journal of Information Security and Privacy (IJISP), 16(1), 1-14. http://doi.org/10.4018/IJISP.285581

Chicago

Rawat, Romil, et al. "Analyzing Newspaper Articles for Text-Related Data for Finding Vulnerable Posts Over the Internet That Are Linked to Terrorist Activities," International Journal of Information Security and Privacy (IJISP) 16, no.1: 1-14. http://doi.org/10.4018/IJISP.285581

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

One of the most critical activities of revealing terrorism-related information is classifying online documents.The internet provides consumers with a variety of useful knowledge, and the volume of web material is increasingly growing. This makes finding potentially hazardous records incredibly difficult. To define the contents, merely extracting keywords from records is inadequate. Many methods have been studied so far to develop automatic document classification systems, they are mainly computational and knowledge-based approaches. due to the complexities of natural languages, these approaches do not provide sufficient results. To fix this shortcoming, we given approach of structure dependent on the WordNet hierarchy and the frequency of n-gram data that employs word similarity. Using four different queries terms from four different regions, this approach was checked for the NY Times articles that were sampled. Our suggested approach successfully removes background words and phrases from the document recognizes connected to terrorism texts, according to experimental findings.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.