A Framework for the Detection of Suspicious Discussion on Online Forums using Integrated approach of Support Vector Machine and Particle Swarm Optimization
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
. DeSanctis, Gerardine, Anne-Laure Fayard, Michael Roach, and Lu Jiang. "Learning in online forums." European Management Journal 21, no. 5 (2003): 565-577.
. Li, Nan, and Desheng Dash Wu. "Using text mining and sentiment analysis for online forums hotspot detection and forecast." Decision support systems48, no. 2 (2010): 354-368.
. Johnson, David R., and David Post. "Law and borders: The rise of law in cyberspace." Stanford Law Review (1996): 1367-1402.
. Edwards, Matthew, Awais Rashid, and Paul Rayson. "A systematic survey of online data mining technology intended for law enforcement." ACM Computing Surveys (CSUR) 48, no. 1 (2015): 15.
. Jiang, Meng, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, and Christos Faloutsos. "Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms." IEEE Transactions on Knowledge and Data Engineering 28, no. 8 (2016): 2187-2200.
. Jain, Suchita, Vanya Sharma, and Rishabh Kaushal. "Towards automated real-time detection of misinformation on Twitter." In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on, pp. 2015-2020. IEEE, 2016.
. Murugesan, M. Suruthi, R. Pavitha Devi, S. Deepthi, V. Sri Lavanya, and Annie Princy. "Automated Monitoring Suspicious Discussions on Online Forums Using Data Mining Statistical Corpus Based Approach." Imperial Journal of Interdisciplinary Research 2, no. 5 (2016).
. Tayal, Devendra Kumar, Arti Jain, Surbhi Arora, Surbhi Agarwal, Tushar Gupta, and Nikhil Tyagi. "Crime detection and criminal identification in India using data mining techniques." AI & society 30, no. 1 (2015): 117-127.
. Alami, Salim, and Omar EL Beqqali. "Detecting Suspicious Profiles Using Text Analysis Within Social Media." Journal of Theoretical & Applied Information Technology 73, no. 3 (2015).
. Hosseinkhani, Javad, Mohammad Koochakzaei, Solmaz Keikhaee, and Javid Hosseinkhani Naniz. "Detecting suspicion information on the Web using crime data mining techniques." International Journal of Advanced Computer Science and Information Technology 3, no. 1 (2014): 32-41.
. Ali, Mohammed Mahmood, Khaja Moizuddin Mohammed, and Lakshmi Rajamani. "Framework for surveillance of instant messages in instant messengers and social neworking sites using data mining and ontology." In Students' Technology Symposium (TechSym), 2014 IEEE, pp. 297-302. IEEE, 2014.
. Kumar, A. Sharath, and Sanjay Singh. "Detection of User Cluster with Suspicious Activity in Online Social Networking Sites." In Advanced Computing, Networking and Security (ADCONS), 2013 2nd International Conference on, pp. 220-225. IEEE, 2013.
. Suykens, Johan AK, and Joos Vandewalle. "Least squares support vector machine classifiers." Neural processing letters 9, no. 3 (1999): 293-300.
. Tong, Simon, and Daphne Koller. "Support vector machine active learning with applications to text classification." Journal of machine learning research2, no. Nov (2001): 45-66.
. Amari, Shun-ichi, and Si Wu. "Improving support vector machine classifiers by modifying kernel functions." Neural Networks 12, no. 6 (1999): 783-789.
. Kennedy, James. "Particle swarm optimization." In Encyclopedia of machine learning, pp. 760-766. Springer US, 2011.
. Clerc, Maurice. Particle swarm optimization. Vol. 93. John Wiley & Sons, 2010.
. Poli, Riccardo, James Kennedy, and Tim Blackwell. "Particle swarm optimization." Swarm intelligence 1, no. 1 (2007): 33-57.