To guarantee national security against terrorist attacks or organized crime, states must implement homeland security solutions based on ubiquitous systems to know in advance the number of suspects involved in an attack. This work proposes a method, which combines popular trajectory similarity metrics to estimate the number of attackers participating in a malicious act through the analysis of the trajectories described by the attacker’s cell phone connection to antennas (i.e. Call Detail Records). Therefore, measuring trajectory similarity in CDRs generates different challenges compared to those similar metrics applied over GPS and video datasets.
CITATION STYLE
Hoyos, I., Esposito, B., & Nunez-del-Prado, M. (2019). DETECTOR: Automatic detection system for terrorist attack trajectories. In Communications in Computer and Information Science (Vol. 898, pp. 160–173). Springer Verlag. https://doi.org/10.1007/978-3-030-11680-4_17
Mendeley helps you to discover research relevant for your work.