Terrorist Web Mining generates the novel information which can be used by SNA tools for Terrorist Network Mining. We assume that information available on open source media such as media reports, press reports etc can be used to draw a sociogram of these terrorist organizations. These sociograms can be used to study the relationships and roles of these terrorist organizations. In this article we propose architecture for a Terrorist Web Miner (TWM) which will search different search engines for terrorist attack information and the found web pages will be parsed for useful links. These links of the web pages which have relevant information then these web pages are stored and rank will be allocated to them. This links can farther be used for TNM.
Search engine are being used by the most of the World population as their basic information retrieval system for getting useful information from internet. As a service provider who uses internet for digital marketing it becomes mandatory to get high ranks from search engines. Search engines optimization (SEO) techniques are used for this purpose. Black hat SEO techniques are used for quick results but are prohibited by most of the search engines. Hence web space users or website developers should be well aware of SEO techniques and how to use them in optimal way. This paper presents some of the most commonly used black hat SEO techniques and the counter measures done by different search engines to prohibit them.
Image forgery is always been sought after field of digital forensics, as it becomes very convenient now to edit/forge any image with many desktop based and online tools available. Also, to prove authenticity of any image in the court of law, there is a need of algorithm which can used to check forgery of any image, irrespective of its forgery type. Proposed model in the paper aims to provide neuro-fuzzy based algorithm which utilizes capabilities of best algorithms for each type and provides accurate result about the forgery in the image. It also provides analysis about type of forgery in the image along with the area forgered in the image.
Nowadays different types of web crawlers are available to perform variety of tasks. As internet is expanding the need of specialized web crawlers is also increasing with each passing days. Numbers of visualization tools which can be used to dynamically generate visual images are available in market. The need for visual representation of data increases in the case of counter terrorism. Terror activities can be easily and effectively represented as Terrorist Network Graphs where nodes can be terrorist organization/ terrorist and edges between these nodes can be communicational, ideological, monitorial etc relationships among them. This graph helps in deciphering the operations of terrorist camps. This paper presents the framework of dynamic Visualization Tool which is connected to Terrorist Meta Crawler and generates Terrorist Network Graphs as output. Moreover this tool will generate the output dynamically hence any topological change in the structure of terrorist networks will be effectively reflected in the Terrorist Network Graphs produced by this tool also.
Over the past few decades there have been frequent terrorist attacks around the world including India. This article describes Terrorist Network Mining and problems faced during studying such networks. A major challenge faced by the law enforcement agencies is the large crime "raw" data volumes and the lack of sophisticated network analysis tools and techniques to utilize the data effectively and efficiently. This article states different data collection techniques used for terrorist networks. The major challenge is the development of the optimal noise reduction algorithm which will help in creating accurate linkage map of terrorist network without the loss of any key player node. This article successfully lists the factors that can be taken under consideration during generation of optimal noise reduction algorithm for Terrorist Web Mining. Once the accurate linkage map is generated the identification and removal of the key player for the destabilization of terrorist networks will become lot easier.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.