M.P.S Bhatia

Work place: Netaji Subhas Institute of Technology, Sector 3, Dwarka, New Delhi, India

E-mail: bhatia.mps@gmail.com

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Computational Learning Theory, Network Security, Data Mining, Data Structures and Algorithms, Engineering

Biography

M.P.S Bhatia received his Ph.D in Computer Science from University of Delhi. He has been working as a professor in the computer engineering department of Netaji Subhas Institute of Technology, New Delhi. He has guided many M.Tech and Ph.D students. His research interests include cyber security, data mining, semantic web, machine learning, software engineering and social network analysis.

Author Articles
Discovering Hidden Networks in On-line Social Networks

By Pooja Wadhwa M.P.S Bhatia

DOI: https://doi.org/10.5815/ijisa.2014.05.04, Pub. Date: 8 Apr. 2014

Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

[...] Read more.
Other Articles