Methods to identify the destructive information

The article discusses the methods that ensure the detection of destructive messages in the Internet environment. It is shown that to detect them the approaches based on the analysis of the syntactic patterns; analysis of semantic information included in the text, and correlating it with the text cor...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of physics. Conference series 2019-11, Vol.1405 (1), p.12004
Hauptverfasser: Barakhnin, V B, Mukhamedyev, R I, Mussabaev, R R, Kozhemyakina, O Yu, Issayeva, A, Kuchin, Ya I, Murzakhmetov, S B, Yakunin, K O
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 1
container_start_page 12004
container_title Journal of physics. Conference series
container_volume 1405
creator Barakhnin, V B
Mukhamedyev, R I
Mussabaev, R R
Kozhemyakina, O Yu
Issayeva, A
Kuchin, Ya I
Murzakhmetov, S B
Yakunin, K O
description The article discusses the methods that ensure the detection of destructive messages in the Internet environment. It is shown that to detect them the approaches based on the analysis of the syntactic patterns; analysis of semantic information included in the text, and correlating it with the text corpus; crowd sourcing methods; identification of the patterns of user behavior in social networks; the consideration of the additional information etc., were applied. Good results can be achieved under certain conditions: an access to traffic social networks and other online news resources, opportunities to organize or to get results from crowd sourcing, etc., when there are the restrictions on these conditions the detection of destructive messages can be performed based on indirect signs. The results of the detection of destructive news in the corpus of news reports in Russian, posted on the websites of the Republic of Kazakhstan are shown.
doi_str_mv 10.1088/1742-6596/1405/1/012004
format Article
fullrecord <record><control><sourceid>proquest_iop_j</sourceid><recordid>TN_cdi_proquest_journals_2568301122</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2568301122</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3284-b92944f78289925184c32bbd19a21d6319837ffd1115107940d0ce0c54aceece3</originalsourceid><addsrcrecordid>eNqFUN9LwzAQDqLgnP4NFnwTanNJ2iaPMnQqEwX1OXT5wTJcU5NM2H9vS2UiCN7LHXff993dh9A54CvAnBdQM5JXpagKYLgsoMBAMGYHaLKfHO5rzo_RSYxrjGkf9QQVjyatvI5Z8pnTpk3O7rK0Mpk2MYWtSu7TZK61Pmya5Hx7io5s8x7N2Xeeorfbm9fZXb54mt_Prhe5ooSzfCmIYMzWnHAhSAmc9f3lUoNoCOiKguC0tlYDQAm4FgxrrAxWJWuUMcrQKboYdbvgP7b9LXLtt6HtV0pSVpxiAEJ6VD2iVPAxBmNlF9ymCTsJWA7uyOFvOXggB3ckyNGdnklHpvPdj_T_rMs_WA_Ps5ffQNlpS78AGhVyXQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2568301122</pqid></control><display><type>article</type><title>Methods to identify the destructive information</title><source>Institute of Physics Open Access Journal Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>IOPscience extra</source><source>Alma/SFX Local Collection</source><source>Free Full-Text Journals in Chemistry</source><creator>Barakhnin, V B ; Mukhamedyev, R I ; Mussabaev, R R ; Kozhemyakina, O Yu ; Issayeva, A ; Kuchin, Ya I ; Murzakhmetov, S B ; Yakunin, K O</creator><creatorcontrib>Barakhnin, V B ; Mukhamedyev, R I ; Mussabaev, R R ; Kozhemyakina, O Yu ; Issayeva, A ; Kuchin, Ya I ; Murzakhmetov, S B ; Yakunin, K O</creatorcontrib><description>The article discusses the methods that ensure the detection of destructive messages in the Internet environment. It is shown that to detect them the approaches based on the analysis of the syntactic patterns; analysis of semantic information included in the text, and correlating it with the text corpus; crowd sourcing methods; identification of the patterns of user behavior in social networks; the consideration of the additional information etc., were applied. Good results can be achieved under certain conditions: an access to traffic social networks and other online news resources, opportunities to organize or to get results from crowd sourcing, etc., when there are the restrictions on these conditions the detection of destructive messages can be performed based on indirect signs. The results of the detection of destructive news in the corpus of news reports in Russian, posted on the websites of the Republic of Kazakhstan are shown.</description><identifier>ISSN: 1742-6588</identifier><identifier>EISSN: 1742-6596</identifier><identifier>DOI: 10.1088/1742-6596/1405/1/012004</identifier><language>eng</language><publisher>Bristol: IOP Publishing</publisher><subject>Crowdsourcing ; Identification methods ; Messages ; News ; Physics ; Social networks ; Sourcing ; Websites</subject><ispartof>Journal of physics. Conference series, 2019-11, Vol.1405 (1), p.12004</ispartof><rights>Published under licence by IOP Publishing Ltd</rights><rights>2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3284-b92944f78289925184c32bbd19a21d6319837ffd1115107940d0ce0c54aceece3</citedby><cites>FETCH-LOGICAL-c3284-b92944f78289925184c32bbd19a21d6319837ffd1115107940d0ce0c54aceece3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://iopscience.iop.org/article/10.1088/1742-6596/1405/1/012004/pdf$$EPDF$$P50$$Giop$$Hfree_for_read</linktopdf><link.rule.ids>314,780,784,27924,27925,38868,38890,53840,53867</link.rule.ids></links><search><creatorcontrib>Barakhnin, V B</creatorcontrib><creatorcontrib>Mukhamedyev, R I</creatorcontrib><creatorcontrib>Mussabaev, R R</creatorcontrib><creatorcontrib>Kozhemyakina, O Yu</creatorcontrib><creatorcontrib>Issayeva, A</creatorcontrib><creatorcontrib>Kuchin, Ya I</creatorcontrib><creatorcontrib>Murzakhmetov, S B</creatorcontrib><creatorcontrib>Yakunin, K O</creatorcontrib><title>Methods to identify the destructive information</title><title>Journal of physics. Conference series</title><addtitle>J. Phys.: Conf. Ser</addtitle><description>The article discusses the methods that ensure the detection of destructive messages in the Internet environment. It is shown that to detect them the approaches based on the analysis of the syntactic patterns; analysis of semantic information included in the text, and correlating it with the text corpus; crowd sourcing methods; identification of the patterns of user behavior in social networks; the consideration of the additional information etc., were applied. Good results can be achieved under certain conditions: an access to traffic social networks and other online news resources, opportunities to organize or to get results from crowd sourcing, etc., when there are the restrictions on these conditions the detection of destructive messages can be performed based on indirect signs. The results of the detection of destructive news in the corpus of news reports in Russian, posted on the websites of the Republic of Kazakhstan are shown.</description><subject>Crowdsourcing</subject><subject>Identification methods</subject><subject>Messages</subject><subject>News</subject><subject>Physics</subject><subject>Social networks</subject><subject>Sourcing</subject><subject>Websites</subject><issn>1742-6588</issn><issn>1742-6596</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>O3W</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqFUN9LwzAQDqLgnP4NFnwTanNJ2iaPMnQqEwX1OXT5wTJcU5NM2H9vS2UiCN7LHXff993dh9A54CvAnBdQM5JXpagKYLgsoMBAMGYHaLKfHO5rzo_RSYxrjGkf9QQVjyatvI5Z8pnTpk3O7rK0Mpk2MYWtSu7TZK61Pmya5Hx7io5s8x7N2Xeeorfbm9fZXb54mt_Prhe5ooSzfCmIYMzWnHAhSAmc9f3lUoNoCOiKguC0tlYDQAm4FgxrrAxWJWuUMcrQKboYdbvgP7b9LXLtt6HtV0pSVpxiAEJ6VD2iVPAxBmNlF9ymCTsJWA7uyOFvOXggB3ckyNGdnklHpvPdj_T_rMs_WA_Ps5ffQNlpS78AGhVyXQ</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Barakhnin, V B</creator><creator>Mukhamedyev, R I</creator><creator>Mussabaev, R R</creator><creator>Kozhemyakina, O Yu</creator><creator>Issayeva, A</creator><creator>Kuchin, Ya I</creator><creator>Murzakhmetov, S B</creator><creator>Yakunin, K O</creator><general>IOP Publishing</general><scope>O3W</scope><scope>TSCCA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20191101</creationdate><title>Methods to identify the destructive information</title><author>Barakhnin, V B ; Mukhamedyev, R I ; Mussabaev, R R ; Kozhemyakina, O Yu ; Issayeva, A ; Kuchin, Ya I ; Murzakhmetov, S B ; Yakunin, K O</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3284-b92944f78289925184c32bbd19a21d6319837ffd1115107940d0ce0c54aceece3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Crowdsourcing</topic><topic>Identification methods</topic><topic>Messages</topic><topic>News</topic><topic>Physics</topic><topic>Social networks</topic><topic>Sourcing</topic><topic>Websites</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Barakhnin, V B</creatorcontrib><creatorcontrib>Mukhamedyev, R I</creatorcontrib><creatorcontrib>Mussabaev, R R</creatorcontrib><creatorcontrib>Kozhemyakina, O Yu</creatorcontrib><creatorcontrib>Issayeva, A</creatorcontrib><creatorcontrib>Kuchin, Ya I</creatorcontrib><creatorcontrib>Murzakhmetov, S B</creatorcontrib><creatorcontrib>Yakunin, K O</creatorcontrib><collection>Institute of Physics Open Access Journal Titles</collection><collection>IOPscience (Open Access)</collection><collection>CrossRef</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Journal of physics. Conference series</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Barakhnin, V B</au><au>Mukhamedyev, R I</au><au>Mussabaev, R R</au><au>Kozhemyakina, O Yu</au><au>Issayeva, A</au><au>Kuchin, Ya I</au><au>Murzakhmetov, S B</au><au>Yakunin, K O</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Methods to identify the destructive information</atitle><jtitle>Journal of physics. Conference series</jtitle><addtitle>J. Phys.: Conf. Ser</addtitle><date>2019-11-01</date><risdate>2019</risdate><volume>1405</volume><issue>1</issue><spage>12004</spage><pages>12004-</pages><issn>1742-6588</issn><eissn>1742-6596</eissn><abstract>The article discusses the methods that ensure the detection of destructive messages in the Internet environment. It is shown that to detect them the approaches based on the analysis of the syntactic patterns; analysis of semantic information included in the text, and correlating it with the text corpus; crowd sourcing methods; identification of the patterns of user behavior in social networks; the consideration of the additional information etc., were applied. Good results can be achieved under certain conditions: an access to traffic social networks and other online news resources, opportunities to organize or to get results from crowd sourcing, etc., when there are the restrictions on these conditions the detection of destructive messages can be performed based on indirect signs. The results of the detection of destructive news in the corpus of news reports in Russian, posted on the websites of the Republic of Kazakhstan are shown.</abstract><cop>Bristol</cop><pub>IOP Publishing</pub><doi>10.1088/1742-6596/1405/1/012004</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1742-6588
ispartof Journal of physics. Conference series, 2019-11, Vol.1405 (1), p.12004
issn 1742-6588
1742-6596
language eng
recordid cdi_proquest_journals_2568301122
source Institute of Physics Open Access Journal Titles; EZB-FREE-00999 freely available EZB journals; IOPscience extra; Alma/SFX Local Collection; Free Full-Text Journals in Chemistry
subjects Crowdsourcing
Identification methods
Messages
News
Physics
Social networks
Sourcing
Websites
title Methods to identify the destructive information
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T00%3A38%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_iop_j&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Methods%20to%20identify%20the%20destructive%20information&rft.jtitle=Journal%20of%20physics.%20Conference%20series&rft.au=Barakhnin,%20V%20B&rft.date=2019-11-01&rft.volume=1405&rft.issue=1&rft.spage=12004&rft.pages=12004-&rft.issn=1742-6588&rft.eissn=1742-6596&rft_id=info:doi/10.1088/1742-6596/1405/1/012004&rft_dat=%3Cproquest_iop_j%3E2568301122%3C/proquest_iop_j%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2568301122&rft_id=info:pmid/&rfr_iscdi=true