International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015 DOI : 10.5121/ijnsa.2015.7201 1 EXPLOITING RHETORICAL RELATIONS TO MULTIPLE…