Framework for surveillance of instant messages

  title={Framework for surveillance of instant messages},
  author={M. M. Ali and L. Rajamani},
  journal={International Journal of Internet Technology and Secured Transactions},
  • M. M. Ali, L. Rajamani
  • Published 2013
  • Computer Science
  • International Journal of Internet Technology and Secured Transactions
Instant messengers IMs and social networking sites SNS such as Facebook may contain harmful and suspicious messages, which is of national security concerns. Organised crimes have adopted online chatting technique to send these suspicious messages as these systems have all the facilities and could serve as platform to spread across their information widely through socio-engineered and general text messages. A solution to this problem is to detect suspicious messages from the typed messages. In… Expand
7 Citations
ESMD: Enhanced Suspicious Message Detection Framework in Instant Messaging Applications
Framework for surveillance of instant messages in instant messengers and social neworking sites using data mining and ontology
  • 19
An Ontology based Surveillance Approach for Detecting Suspicious Messages using Data Mining
  • 2018
  • Highly Influenced
  • PDF
An approach for deceptive phishing detection and prevention in social networking sites using data mining and wordnet ontology
  • 3


Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
  • 101
  • PDF
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
  • 81
  • PDF
Intelligence and security informatics for homeland security: information, communication, and transportation
  • H. Chen, F. Wang, D. Zeng
  • Engineering, Computer Science
  • IEEE Transactions on Intelligent Transportation Systems
  • 2004
  • 94
  • PDF
Web data extraction based on partial tree alignment
  • 597
  • PDF
Data Extraction for Deep Web Using WordNet
  • Jer Lang Hong
  • Computer Science
  • IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2011
  • 38
Active Cyber Attack Model for Network System's Vulnerability Assessment
  • 22
ODE: Ontology-assisted data extraction
  • 124
  • PDF