DETECTOR: Automatic detection system for terrorist attack trajectories

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To guarantee national security against terrorist attacks or organized crime, states must implement homeland security solutions based on ubiquitous systems to know in advance the number of suspects involved in an attack. This work proposes a method, which combines popular trajectory similarity metrics to estimate the number of attackers participating in a malicious act through the analysis of the trajectories described by the attacker’s cell phone connection to antennas (i.e. Call Detail Records). Therefore, measuring trajectory similarity in CDRs generates different challenges compared to those similar metrics applied over GPS and video datasets.

Author supplied keywords

Cite

CITATION STYLE

APA

Hoyos, I., Esposito, B., & Nunez-del-Prado, M. (2019). DETECTOR: Automatic detection system for terrorist attack trajectories. In Communications in Computer and Information Science (Vol. 898, pp. 160–173). Springer Verlag. https://doi.org/10.1007/978-3-030-11680-4_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free