1,898 Hits in 3.5 sec

Mining Criminal Networks from Chat Log

Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi
2012 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology  
Our framework takes the chat log from a confiscated computer as input, extracts the social networks from the log, summarizes chat conversations into topics, identifies the information relevant to crime  ...  Both the feedback from the law enforcement officers and experimental results suggest that the proposed chat log mining framework is effective for crime investigation.  ...  A. MSN Chat Log We also evaluate the topic mining functionality of the presented framework.  ... 
doi:10.1109/wi-iat.2012.68 dblp:conf/webi/IqbalFD12 fatcat:hskzbb3j5bcwtngpvq5pysr5qm

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation

Farkhund Iqbal, Benjamin C. M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington
2019 IEEE Access  
In this paper, we propose a framework to analyze chat logs for crime investigation using data mining and natural language processing techniques.  ...  The proposed framework extracts the social network from chat logs and summarizes conversation into topics. The crime investigator can use information visualizer to see the crime-related results.  ...  Mirza Ahmed for his contributions in the early stage of the project.  ... 
doi:10.1109/access.2019.2891694 fatcat:rebkgniucndvrcvyqbtip34jsa

Classification of Online Grooming on Chat Logs Using Two Term Weighting Schemes

Nur Rafeeqkha Sulaiman, Maheyzah Md. Siraj
2019 International Journal of Innovative Computing  
Chatting has become a popular communication medium for Internet users whereby users can communicate directly and privately with each other.  ...  Due to the growth of Internet, it has not only become the medium for getting information, it has also become a platform for communicating.  ...  Lastly, a framework on classification on online grooming based on chat logs is proposed.  ... 
doi:10.11113/ijic.v9n2.239 fatcat:ix266w7lx5gkvogxmakkb4aic4

The use of text mining to build a pedagogical agent capable of mediating synchronous online discussions in the context of foreign language learning

Isis da Costa Pinho, Daniel Epstein, Eliseo Berni Reategui, Ygor Correa, Eunice Polonia
2013 2013 IEEE Frontiers in Education Conference (FIE)  
Furthermore, we propose a pedagogical agent model that uses text mining techniques to identify when students deviate from the main topics that should be addressed in their discussions in a real time chat  ...  The present paper discusses the use of text mining to support the design of a pedagogical agent that mediates synchronous online discussions of academic texts by undergraduate students of English as a  ...  ACKNOWLEDGMENT This work has been partially supported by the National Council for Scientific and Technological Development (CNPq -Brazil), and the Distance Education Secretary at the Federal University  ... 
doi:10.1109/fie.2013.6684853 dblp:conf/fie/PinhoERCP13 fatcat:hcgo5tqziffu7ojpplsas7syua

Social media analysis for product safety using text mining and sentiment analysis

Haruna Isah, Paul Trundle, Daniel Neagu
2014 2014 14th UK Workshop on Computational Intelligence (UKCI)  
learning, text mining and sentiment analysis, the application of the proposed framework on Facebook comments and data from Twitter for brand analysis, and the description of how to develop a product safety  ...  The initial brand and product comparison results signify the usefulness of text mining and sentiment analysis on social media data while the use of machine learning classifier for predicting the sentiment  ...  We propose a product safety framework for harnessing and processing the views and experiences of users of popular brands of drug and cosmetic products reported on social media platforms using text mining  ... 
doi:10.1109/ukci.2014.6930158 dblp:conf/ukci/IsahTN14 fatcat:gtnuon23t5f37lilrz24yonmay

The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat

Hamdani Hamdani, Heru Ismanto, Agus Qomaruddin Munir, Budi Rahmani, Andri Syafrianto, Didit Suprihanto, Anindita Septiarini
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat.  ...  We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext.  ...  In [1] perform a social graph based text mining framework for chat log investigation for presents a unified social graph based text mining framework.  ... 
doi:10.11591/ijece.v8i5.pp3841-3850 fatcat:cqshnjhmqvhihls2qq3bdygjom

An Enhanced Approach for Digital Forensics using Innovative GSP Algorithm

Priyanka Kayarkar, Prashant Ricchariaya
2014 International Journal of Computer Applications  
In the field of Digital Forensics Data Mining has huge prospective. Computer forensics is a rising discipline investigating the computer crime.  ...  The applicability of various forensics techniques in digital forensics helps the forensics investigators to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence  ...  [5] Investigating of possibility of predicting several user and message attributes in text-based, real-time, online messaging services is discussed in the paper Chat Mining.  ... 
doi:10.5120/18078-8308 fatcat:uwali27nz5cqpb7zm5ffskdvay

Social Network Extraction: A Review of Automatic Techniques

Tasleem Arif, Rashid Ali, M. Asger
2014 International Journal of Computer Applications  
Instant Messaging/ Chat based Social Network Extraction Instant messaging (IM) or Internet Relay Chat is a popular form of real time computer-based communications service.  ...  [43] propose a system for mining social networks from Web server log files by considering average time spent on each page by every user.  ... 
doi:10.5120/16558-3964 fatcat:3n3tswqpuneqlctwbusraltsfe

A brief survey of computational approaches in Social Computing

Irwin King, Jiexing Li, Kam Tong Chan
2009 2009 International Joint Conference on Neural Networks  
Graph/Link Analysis and Mining As social relations can be modeled using graphs, link analysis and modeling is then a natural way to process these social graphs.  ...  Hence, Social Computing is a social, cultural, as well as a computing phenomenon that cannot be ignored and begs for a more detailed investigation.  ... 
doi:10.1109/ijcnn.2009.5178967 dblp:conf/ijcnn/KingLC09 fatcat:x4bvi2roovezlmjb4fdjpjowya


Cheng Zhang, Peng Zhang, Jingfei Li, Dawei Song
2016 Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval - SIGIR '16  
SECC can group users automatically based on their input queries and allow them to communicate with each other in real time through a chat interface.  ...  In this paper, we present a demo of novel Search Engine with a live Chat Channel (SECC).  ...  For instance, Boldi et al. [1] construct query flow graphs from global query logs to generate query recommendations. Duan et al.  ... 
doi:10.1145/2911451.2911454 dblp:conf/sigir/ZhangZLS16 fatcat:6yyuc6yo5jbadknqcntkppstbq

Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining

Amin Shahraki Moghaddam, Javad Hosseinkhani, Suriayati Chuprat, Hamed Taherdoost, Hadi Barani Baravati
2013 Research Journal of Applied Sciences Engineering and Technology  
As a result, this procedure is not efficient because it has many errors and the quality of obtaining the analyzed data is based on the expertise and experience of the investigator subsequently the reliability  ...  In consequent, the set is ready to implement a various criminal network evaluation tools for testing.  ...  In the other hand, in a "Text files" such as blogs, chat logs, web pages, e-mails, or any textual data, investigators effort to implement some other search tools to extract and classify appropriate information  ... 
doi:10.19026/rjaset.6.3568 fatcat:ivqdna3sijezrkmjfvcbpfrwfy

Process modeling and decision mining in a collaborative distance learning environment

Wichian Premchaiswadi, Parham Porouhan
2015 Decision Analytics  
In learning, this refers to application of Internet-based services-such as communication tools, wikis, social networking sites and folksonomies-which focus Abstract This paper is divided into four main  ...  In the second part of the study, we defined and explained specific alphabets and keywords derived from a collected event log during a distance learning activity using a real-time multi-user concept mapping  ...  Williams from School of Information Sciences (University of Pittsburgh) for reviewing this paper and providing helpful insights.  ... 
doi:10.1186/s40165-015-0015-5 fatcat:eg3zcr2pgvfkxgmwl3mm35amf4

Characterizing Pedophile Conversations on the Internet using Online Grooming [article]

Aditi Gupta, Ponnurangam Kumaraguru, Ashish Sureka
2012 arXiv   pre-print
In this paper, we study pedophile conversations from the perspective of online grooming theory and perform a series of linguistic-based empirical analysis on several pedophile chat conversations to gain  ...  We use a widely used word-counting program (LIWC) to create psycho-linguistic profiles for each of the six online grooming stages to discover interesting textual patterns useful to improve our understanding  ...  ACKNOWLEDGEMENT The authors would like to thank all those who helped in annotating the chat transcripts. Special thanks to Dr.  ... 
arXiv:1208.4324v1 fatcat:r6bklcuilvd5bmfggiwy4empn4

Communication across Boundaries: Work, Structure, and Use of Communication Technologies in a Large Organization

Pamela Hinds, Sara Kiesler
1995 Organization science (Providence, R.I.)  
An SNS that manages and stores social networks can become a base of information infrastructure in the future [5].  ...  Construction of the researcher network, for example can benefit many Web mining and social network applications [7].  ...  For this and most of the other on-line social network analyses, the three web mining techniques can"t work alone and for some applications like the one under investigation all the three different web mining  ... 
doi:10.1287/orsc.6.4.373 fatcat:rvavwonmkve7bazr344thg6bcu

Market Opportunity and Policy Support for Chinese Old Aging Industry: An Application of Text Mining

Chenguang Li, J. Váchal, M. Vochozka, J. Horák
2017 SHS Web of Conferences  
Text mining has become a vital method of natural and social science research. A policy documents text mining framework with three phases has been introduced.  ...  Using 52 policies of aging industry development, this paper explores five business opportunity and three areas policy support for Chinese old aging industry.  ...  Acknowledgements This paper is funded by the National Science Foundation of China for Youth  ... 
doi:10.1051/shsconf/20173901015 fatcat:6oebbx7q7rcrzikc2k4zh6imkm
« Previous Showing results 1 — 15 out of 1,898 results