Submit Search
Upload
IRJET- Secure Social Network using Text Mining
•
0 likes
•
15 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i3/IRJET-V5I3237.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 2
Download now
Download to read offline
Recommended
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
549 458-465
549 458-465
idescitation
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
How to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Recommended
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
549 458-465
549 458-465
idescitation
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET Journal
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
How to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
Mobile Cyber Security
Mobile Cyber Security
Bob's Business
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
IIIT Hyderabad
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
Blue Coat
IRJET- A Survey on Internet Addiction
IRJET- A Survey on Internet Addiction
IRJET Journal
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
Ishfaq Majid
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
Social network privacy & security
Social network privacy & security
nadikari123
Security in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
Network GRC Delivery
Network GRC Delivery
iansadler
Security Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
Kt3518501858
Kt3518501858
IJERA Editor
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
204
204
vivatechijri
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
More Related Content
What's hot
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
Mobile Cyber Security
Mobile Cyber Security
Bob's Business
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
IIIT Hyderabad
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
Blue Coat
IRJET- A Survey on Internet Addiction
IRJET- A Survey on Internet Addiction
IRJET Journal
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
IRJET Journal
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
Ishfaq Majid
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
Maurice Dawson
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
AM Publications
Social network privacy & security
Social network privacy & security
nadikari123
Security in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
Network GRC Delivery
Network GRC Delivery
iansadler
Security Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
Kt3518501858
Kt3518501858
IJERA Editor
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
What's hot
(17)
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Mobile Cyber Security
Mobile Cyber Security
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
IRJET- A Survey on Internet Addiction
IRJET- A Survey on Internet Addiction
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
Social network privacy & security
Social network privacy & security
Security in social network araceli&arlethe
Security in social network araceli&arlethe
Network GRC Delivery
Network GRC Delivery
Security Dangers of Social Networking
Security Dangers of Social Networking
Kt3518501858
Kt3518501858
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Similar to IRJET- Secure Social Network using Text Mining
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
204
204
vivatechijri
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET Journal
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
Social media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
eSAT Publishing House
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
BHANU281672
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
lorainedeserre
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer System
IRJET Journal
OSA - Internet Security in India
OSA - Internet Security in India
Dinesh O Bareja
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET Journal
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET Journal
Similar to IRJET- Secure Social Network using Text Mining
(20)
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
204
204
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
Social media platform and Our right to privacy
Social media platform and Our right to privacy
IRJET- Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer System
OSA - Internet Security in India
OSA - Internet Security in India
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
power system scada applications and uses
power system scada applications and uses
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
IRJET- Secure Social Network using Text Mining
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1040 Secure Social Network Using Text Mining YogeshMalode1, AkshaySawade2, Surbhi Jais3, Shubham Nandanwar4, ManjushaMeshram5, SampadaBhoyar6 1,2,3,4,5,6 Department of Information Technology, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social media is the name suggest is the large collection of the data for which the traditional data processing techniques are not sufficient. Social media istoday gaining popularity very fast in the internet. Many socialmedia sites like Face book are using the huge data storage mechanism. In this project, we will discuss about that data storage and its security of social site .Here we are going to implement some module like, One user account by authenticating user registration. This is for the security purpose one user can only make it one account. To overcome the problem of multiple accounts by one user we are working on this objective. Also we are going to restrict posting of vulgar/improper words. This is one of the most important concern for any social media to make the user’s profile clean and protected. So we are maintaining a dictionary of abusive words so that if anybody try to use these words in their post then this post will be discarded by administrator. Finally we are concentrate on Preventing abuse/vulgarimagesandvideo posting. Key Words: Authentication; restrict; Data processing techniques; Vulgar 1. INTRODUCTION Social networks have become a part of human life. Starting from sharing information like text, photos, messages, many have started share latest news, and news related pictures in the Media domain, question papers, assignments, and workshops in Education domain, online survey, marketing, and targeting customers in Business domain, and jokes, music, and videos in Entertainment domain. In the larger context of data mining, a considerablemeasureofproductive analyzing so as to learn can be found advanced records of human conduct in interpersonal organizations without breaching the users’ privacy. Thus, information ought to be made accessible in a manner that privacy should be safeguarded and protection is extremely scrutinized. The specific instance of interpersonal organizations, the most grounded measure that can be received is to make unflinching quality of individual’sprivacy whoexpressesthe affiliation. As a matter of fact, we can consider Facebookthat it is not just a positive relationship with an online substance additionally as center doled out by the social users. Maintaining privacy of the register users isthecentralroleof the authorities and any deviation of policy given would totally wreck the organizational policy governance which in turn leads to serious havoc to the fundamental rights of society. In the larger context of data mining, a considerable measure of productive analyzing so asto learn can be foundadvanced records of human conduct in interpersonal organizations without breaching the users’ privacy. Thus, information ought to be made accessible in a manner that privacy should be safeguarded and protection is extremely scrutinized. On the other hand, the suspicion that any outsider which is intrigued to break down information can be viewed as reliable is truth be told unlikely, because of the key point of preference that the usage of all information, including recognizing and delicate ones, may provide for these gatherings. Due to the specific instance of interpersonal organizations, the most grounded measure that can be received is to make unflinching quality of individual’s privacy who expresses the affiliation. Advance development of technology internet plays an important role. When pointing out internet social networking is an essential thing to people, theusageofsocial networking sites is dramatically high compared to other websites. Reason behind this is people who lives in 21st century hasbeen addicted to social networking sitesto keep connection with others. Social networking sites are not only to communicate or interact with each other currently it is used as a way of business promotion. Due to tremendous growth of social networking sites it also under arrested to cyber-attacks. This issue has led even with data sharing process, this raise number of cyber issues on security and privacy through social networking sites. 2. Problems in existing system Registered user can post any message, pictures, video any time anywhere to any person. No restriction for posting (messages, videos, images ) and only some basic restriction on viewing of profile. 3. Proposed Methodology 3.1 Authentication: Here we maintain the authenticate users dataset with its Aadhar no. When particular user get registered at that time we get some details from them. Firstly Adminwillverifythat particular user is authenticate or not by matching their details with our dataset details .once the particular user is verified Admin allow them for login. If details is not get verified then Admin denied the services of login for particular user.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1041 Fig -1: Flowchart of the Proposed System 3.2 Friend Suggestion, Keyword Extraction and matching with dataset In this module all the registered usershas been able to send friend request to the another authenticate users whoever available in their friend suggestion list. If the request is accepted then these users are view in their friend list. Also, users can able to post textual content on the wall of their friends. But here ,we are avoiding the posting of abuse words. Because Security is one of the important concernfor any social media to make the user’s profile clean. So we are maintaining a dictionary of abusive words if anybody try to use these words in their post then this post will be discarded by administrator 3.3 Prevent abuse/vulgar image posting: Here, in this module we are going to prevent the posting of vulgar images on user wall. To prevent the vulgar/abusive images we are providing a notification to those users who are tagged by user for posting .so that notification is view at notification page of tagged users and then tagged user decideswhether he/she wantsto post thatimageonhis/her post wall. If he denies to post that image he will never see the post related to this. 4. Future Work Here we work only on the text data to identify that it is abused or not and provide the authority to post it by going throw it we get the problem for vulgar image ,videosrelated to abuse any communitiesor religions etc., identification. In future reference we will work on it to make it more secure and user friendly. 5. Conclusion It has been observed that privacy and security concerns are very important in the social networking sites and the users endeavors to make the appropriate changes on their social media privacy is substantially lower than other mode of security operations. Hence, we had given the possible root cause of the unsecure sites and proposed the changes to take over for the security and privacy concerns of social networking site. Here we providesall kindsofsecuritytoour social site by using authentication, prevent abuse posting and spam and non spam keyword detection. REFERENCES [1]Anjitha, Harsha, “Secure Authentication and Cyber Crime Mitigation for Social Networking Sites”,InternationalJournal of Science and Research (IJSR) ISSN (Online): 2319- 7064,Volume 5 Issue 5, May 2016. [2] Dan Gunter, Solomon Sonya “The Danger of Data Exfiltration over Social Media Sites” Western International University. [3] Adu Michael K, Alese Boniface K and AdewaleOlumide S. “Mitigating Cybercrime and Online Social NetworksThreats in Nigeria” Proceedings of the World Congress on Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, USA. [4] Senthil Kumar N , Saravanakumar K, Deepa K, “On Privacy and Security in Social Media – A Comprehensive Study”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA [5] L.S.Y. Dehigaspege, U.A.A.S. Hamy, H.A.H. Shehan, S.A. Dissanayake, H.P. Dangalla, W.H.I. Wijewantha and DhishanDhammearatchi, “Secure Authentication:Defending Social Networks from Cyber Attacks Using Voice Recognition”, International JournalofScientificandResearch Publications, Volume 6, Issue 10, October 2016 ISSN 2250- 3153
Download now