Pooja Wadhwa

Work place: Netaji Subhas Institute of Technology, Sector 3, Dwarka, New Delhi, India

E-mail: pooja.chopra82@gmail.com

Website:

Research Interests: Computer Architecture and Organization, Computer Networks, Network Architecture, Network Security, Data Structures and Algorithms, Analysis of Algorithms

Biography

Pooja Wadhwa received her B.Tech and M.Tech degrees from Guru Gobind Singh Indraprastha University in 2003 and 2005 respectively. She has been working with Government of India since 2005 as a Scientist in the area of Cyber Security. She is currently pursuing her P.h.D. in Computer Engineering Department at Netaji Subhas Institute of Technology, New Delhi, India. Her research interests include cyber security, data mining, social network analysis, malware analysis and computer networks.

Author Articles
Discovering Hidden Networks in On-line Social Networks

By Pooja Wadhwa M.P.S Bhatia

DOI: https://doi.org/10.5815/ijisa.2014.05.04, Pub. Date: 8 Apr. 2014

Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

[...] Read more.
Other Articles