Individual movement behaviour in secure physical environments: Modeling and detection of suspicious activity

9Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure physical environments such as government, financial or military facilities are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This chapter presents four types of suspicious behavioural patterns, namely temporal, repetitive, displacement and out-of-sequence patterns, that may be observed in such a secure physical environment. We model the physical environment and apply algorithms for the detection of suspicious patterns to logs of RFID access data. Finally we present the design and implementation of an integrated system which uses our algorithms to detect suspicious behavioural patterns.

Cite

CITATION STYLE

APA

Biuk-Aghai, R. P., Si, Y. W., Fong, S., & Yan, P. F. (2012). Individual movement behaviour in secure physical environments: Modeling and detection of suspicious activity. In Behavior Computing: Modeling, Analysis, Mining and Decision (pp. 241–253). Springer-Verlag London Ltd. https://doi.org/10.1007/978-1-4471-2969-1_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free