首页 > 最新文献

2012 IEEE International Conference on Intelligence and Security Informatics最新文献

英文 中文
Data exploitation using visual analytics 使用可视化分析进行数据开发
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284299
M. Habibi
In a surveillance system the huge volume of recorded multidimensional data poses a great challenge to the user in performing meaningful analysis in efficient and coherent manner, especially in a human-vehicle or human-object interaction domain. To address this concern a semi automated data analysis concept is developed for feature extraction, object detection, trajectory determination and cluster identification. In addition this paper presents an algorithmic basis for significantly improved correlation and association of features, and events of interest in a timely and sound manner. The uncertainty associated with the operator's interpretation of data is tackled by proposing an acceptable hypothesis by the analyst based on human intelligence and experience. Experimental results and graphs are also presented in this paper.
在监控系统中,大量记录的多维数据给用户以高效、连贯的方式进行有意义的分析带来了巨大的挑战,特别是在人-车或人-物交互领域。为了解决这一问题,开发了用于特征提取,目标检测,轨迹确定和聚类识别的半自动数据分析概念。此外,本文还提出了一种算法基础,可以及时、合理地显著提高特征和感兴趣事件的相关性和关联。与操作员对数据的解释相关的不确定性是由分析师根据人类的智力和经验提出一个可接受的假设来解决的。文中还给出了实验结果和图表。
{"title":"Data exploitation using visual analytics","authors":"M. Habibi","doi":"10.1109/ISI.2012.6284299","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284299","url":null,"abstract":"In a surveillance system the huge volume of recorded multidimensional data poses a great challenge to the user in performing meaningful analysis in efficient and coherent manner, especially in a human-vehicle or human-object interaction domain. To address this concern a semi automated data analysis concept is developed for feature extraction, object detection, trajectory determination and cluster identification. In addition this paper presents an algorithmic basis for significantly improved correlation and association of features, and events of interest in a timely and sound manner. The uncertainty associated with the operator's interpretation of data is tackled by proposing an acceptable hypothesis by the analyst based on human intelligence and experience. Experimental results and graphs are also presented in this paper.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132532949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection 一种用于入侵检测的反攻击和正常流量的单位圆分类算法
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284275
S. Suthaharan
A simple, yet effective, unit-circle algorithm for an intrusion detection system is presented. It defines normal and abnormal classes using the normalized “standard scores” of the traffic data with a novel unit-circle representation. In this approach, the feature values of the traffic data are first standardized to reduce statistical dependencies of local structural variations within a class and then normalized to isolate statistical inaccuracies between classes. A unit-circle is then constructed using two selected features. The unit-circle algorithm reveals that the normal and the back attack traffic in NSL-KDD datasets fall inside the normal and the abnormal classes respectively. Hence we have robust definitions for the back attack and normal traffic activities in a computer network based on NSL-KDD dataset.
提出了一种简单而有效的入侵检测系统单位圆算法。它使用具有新颖单位圆表示的交通数据的标准化“标准分数”来定义正常和异常类。在这种方法中,首先对交通数据的特征值进行标准化,以减少类内局部结构变化的统计依赖性,然后进行规范化,以隔离类之间的统计不准确性。然后使用两个选定的特征构造一个单位圆。单位圆算法表明,NSL-KDD数据集的正常攻击流量和反向攻击流量分别属于正常类和异常类。因此,我们基于NSL-KDD数据集对计算机网络中的反向攻击和正常流量活动进行了鲁棒定义。
{"title":"A unit-circle classification algorithm to characterize back attack and normal traffic for intrusion detection","authors":"S. Suthaharan","doi":"10.1109/ISI.2012.6284275","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284275","url":null,"abstract":"A simple, yet effective, unit-circle algorithm for an intrusion detection system is presented. It defines normal and abnormal classes using the normalized “standard scores” of the traffic data with a novel unit-circle representation. In this approach, the feature values of the traffic data are first standardized to reduce statistical dependencies of local structural variations within a class and then normalized to isolate statistical inaccuracies between classes. A unit-circle is then constructed using two selected features. The unit-circle algorithm reveals that the normal and the back attack traffic in NSL-KDD datasets fall inside the normal and the abnormal classes respectively. Hence we have robust definitions for the back attack and normal traffic activities in a computer network based on NSL-KDD dataset.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129053158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Agile detection of framing rhetoric in social media 社交媒体框架修辞的敏捷检测
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284103
K. Glass, R. Colbaugh
A frame in social theory is a schema of interpretation that individuals rely upon to understand and respond to events. Collective action frames are persuasive communications constructed during mobilization campaigns, frequently to call attention to a perceived problem or issue, itemize steps to resolve the issue, and motivate others regarding the issue's urgency and the importance of taking action [e.g. 1]. There is substantial empirical evidence that framing rhetoric influences the success or failure of social movements, and that movement members are increasingly relying upon social media to communicate their frames. Consequently, there is considerable interest within the security informatics community to develop methods for detecting framing rhetoric in social (and other) media [2]. Particularly valuable would be computational methods capable of distinguishing framing from non-framing content using only limited labeled examples of framing discourse, because generating such labels typically requires experienced analysts and is an expensive and time-consuming undertaking.
社会理论中的框架是一种解释图式,个体依赖于它来理解和回应事件。集体行动框架是在动员运动期间建立的有说服力的沟通,通常是为了引起人们对感知到的问题或问题的关注,列出解决问题的步骤,并激励其他人了解问题的紧迫性和采取行动的重要性[例如1]。有大量的经验证据表明,框架修辞影响社会运动的成败,运动成员越来越依赖社交媒体来传达他们的框架。因此,在安全信息学社区中,有相当大的兴趣开发用于检测社交(和其他)媒体bb0中的框架修辞的方法。特别有价值的是能够仅使用有限的框架话语的标记示例来区分框架和非框架内容的计算方法,因为生成这样的标签通常需要经验丰富的分析人员,并且是一项昂贵且耗时的工作。
{"title":"Agile detection of framing rhetoric in social media","authors":"K. Glass, R. Colbaugh","doi":"10.1109/ISI.2012.6284103","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284103","url":null,"abstract":"A frame in social theory is a schema of interpretation that individuals rely upon to understand and respond to events. Collective action frames are persuasive communications constructed during mobilization campaigns, frequently to call attention to a perceived problem or issue, itemize steps to resolve the issue, and motivate others regarding the issue's urgency and the importance of taking action [e.g. 1]. There is substantial empirical evidence that framing rhetoric influences the success or failure of social movements, and that movement members are increasingly relying upon social media to communicate their frames. Consequently, there is considerable interest within the security informatics community to develop methods for detecting framing rhetoric in social (and other) media [2]. Particularly valuable would be computational methods capable of distinguishing framing from non-framing content using only limited labeled examples of framing discourse, because generating such labels typically requires experienced analysts and is an expensive and time-consuming undertaking.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125246746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information 利用地理、人口统计和twitter衍生信息对犯罪事件进行时空建模
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284088
Xiaofeng Wang, Donald E. Brown, M. Gerber
Personal and property crimes create large economic losses within the United States. To prevent crimes, law enforcement agencies model the spatio-temporal pattern of criminal incidents. In this paper, we present a new modeling process that combines two of our recently developed approaches for modeling criminal incidents. The first component of the process is the spatio-temporal generalized additive model (STGAM), which predicts the probability of criminal activity at a given location and time using a feature-based approach. The second component involves textual analysis. In our experiments, we automatically analyzed Twitter posts, which provide a rich, event-based context for criminal incidents. In addition, we describe a new feature selection method to identify important features. We applied our new model to actual criminal incidents in Charlottesville, Virginia. Our results indicate that the STGAM/Twitter model outperforms our previous STGAM model, which did not use Twitter information. The STGAM/Twitter model can be generalized to other applications of event modeling where unstructured text is available.
人身和财产犯罪在美国造成了巨大的经济损失。为了预防犯罪,执法机构对犯罪事件的时空格局进行建模。在本文中,我们提出了一种新的建模过程,它结合了我们最近开发的两种建模犯罪事件的方法。该过程的第一个组成部分是时空广义加性模型(STGAM),该模型使用基于特征的方法预测给定地点和时间内犯罪活动的概率。第二个部分涉及文本分析。在我们的实验中,我们自动分析Twitter帖子,这些帖子为犯罪事件提供了丰富的、基于事件的上下文。此外,我们还描述了一种新的特征选择方法来识别重要特征。我们将新模型应用于弗吉尼亚州夏洛茨维尔的实际犯罪事件。我们的结果表明,STGAM/Twitter模型优于之前不使用Twitter信息的STGAM模型。STGAM/Twitter模型可以推广到其他可以使用非结构化文本的事件建模应用程序。
{"title":"Spatio-temporal modeling of criminal incidents using geographic, demographic, and twitter-derived information","authors":"Xiaofeng Wang, Donald E. Brown, M. Gerber","doi":"10.1109/ISI.2012.6284088","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284088","url":null,"abstract":"Personal and property crimes create large economic losses within the United States. To prevent crimes, law enforcement agencies model the spatio-temporal pattern of criminal incidents. In this paper, we present a new modeling process that combines two of our recently developed approaches for modeling criminal incidents. The first component of the process is the spatio-temporal generalized additive model (STGAM), which predicts the probability of criminal activity at a given location and time using a feature-based approach. The second component involves textual analysis. In our experiments, we automatically analyzed Twitter posts, which provide a rich, event-based context for criminal incidents. In addition, we describe a new feature selection method to identify important features. We applied our new model to actual criminal incidents in Charlottesville, Virginia. Our results indicate that the STGAM/Twitter model outperforms our previous STGAM model, which did not use Twitter information. The STGAM/Twitter model can be generalized to other applications of event modeling where unstructured text is available.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Communication patterns based detection of anomalous network traffic 基于通信模式的异常网络流量检测
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284297
D. Le, Taeyoel Jeong, H. Roman, J. W. Hong
We propose a novel approach to detect anomalous network traffic by analyzing communication patterns in time series. The method is based on graph theory concepts such as degree distribution and maximum degree, and we introduce the new concept of dK-2 distance [1]. In our approach, we use traffic dispersion graphs (TDGs) to extract communication structure [2]. By analyzing differences of TDG graphs in time series we are able to detect anomalous events such as botnet command and control communications, which cannot be identified by using volume-based approaches or flows/packets counters. We evaluate our approach with the 1999 DARPA intrusion detection data set and the network trace from POSTECH on July 2009.
我们提出了一种通过分析时间序列中的通信模式来检测异常网络流量的新方法。该方法基于度分布、最大度等图论概念,并引入了dK-2距离的新概念[1]。在我们的方法中,我们使用流量分散图(tdg)来提取通信结构[2]。通过分析时间序列中TDG图的差异,我们能够检测异常事件,例如僵尸网络命令和控制通信,这些事件无法通过使用基于卷的方法或流量/数据包计数器来识别。我们用1999年DARPA入侵检测数据集和2009年7月POSTECH的网络跟踪来评估我们的方法。
{"title":"Communication patterns based detection of anomalous network traffic","authors":"D. Le, Taeyoel Jeong, H. Roman, J. W. Hong","doi":"10.1109/ISI.2012.6284297","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284297","url":null,"abstract":"We propose a novel approach to detect anomalous network traffic by analyzing communication patterns in time series. The method is based on graph theory concepts such as degree distribution and maximum degree, and we introduce the new concept of dK-2 distance [1]. In our approach, we use traffic dispersion graphs (TDGs) to extract communication structure [2]. By analyzing differences of TDG graphs in time series we are able to detect anomalous events such as botnet command and control communications, which cannot be identified by using volume-based approaches or flows/packets counters. We evaluate our approach with the 1999 DARPA intrusion detection data set and the network trace from POSTECH on July 2009.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using burst detection techniques to identify suspicious vehicular traffic at border crossings 利用突发探测技术,识别过境处的可疑车辆
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284311
S. Kaza, Hsin-Min Lu, D. Zeng, Hsinchun Chen
Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.
边境安全是国家和国际安全的重要组成部分。国土安全部(DHS)在陆地边境对进入该国的车辆进行毒品和其他违禁品搜查。然而,这一过程耗时长,而且需要提高操作效率,才能在边境顺利进行。为了帮助筛选车辆,我们建议使用突发检测算法检查检查站的交通模式。我们的研究结果表明,边境的总体交通呈现出可归因于工作日和假日季节的爆发模式。此外,利用当地执法数据,我们还发现,与执法部门有过事先接触的交通表现出与其他交通不同的爆发模式。我们还发现,这种可疑交通的爆发可以归因于与某些犯罪活动相关的车辆交通的增加。这一信息可用于在港口和周边地区进行初步筛查期间专门针对车辆进行搜索。
{"title":"Using burst detection techniques to identify suspicious vehicular traffic at border crossings","authors":"S. Kaza, Hsin-Min Lu, D. Zeng, Hsinchun Chen","doi":"10.1109/ISI.2012.6284311","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284311","url":null,"abstract":"Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emergency decision support using an agent-based modeling approach 使用基于代理的建模方法的紧急决策支持
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284298
Neal Wagner, Vikas Agrawal
A key activity in emergency management is preparation for natural and man-made disasters. This paper presents a prototype of a computer simulation system that uses agent-based modeling to simulate an emergency environment with crowd evacuation and provides for testing of multiple disaster scenarios at virtually no cost.
应急管理的一项关键活动是为自然灾害和人为灾害做好准备。本文提出了一个计算机仿真系统的原型,该系统使用基于智能体的建模来模拟人群疏散的紧急环境,并提供了几乎没有成本的多种灾难场景的测试。
{"title":"Emergency decision support using an agent-based modeling approach","authors":"Neal Wagner, Vikas Agrawal","doi":"10.1109/ISI.2012.6284298","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284298","url":null,"abstract":"A key activity in emergency management is preparation for natural and man-made disasters. This paper presents a prototype of a computer simulation system that uses agent-based modeling to simulate an emergency environment with crowd evacuation and provides for testing of multiple disaster scenarios at virtually no cost.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Payment card fraud: Challenges and solutions 支付卡欺诈:挑战和解决方案
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284315
I. Sakharova
Payment card fraud is causing billions of dollars in losses for the card payment industry. Besides direct losses, the brand name can be affected by loss of consumer confidence due to the fraud. As a result of these growing losses, financial institutions and card issuers are continually seeking new techniques and innovation in payment card fraud detection and prevention. This paper provides an overview of payment card fraud and begins with payment card statistics and the definition of payment card fraud. It also describes various methods used by identity thieves to obtain personal and financial information for the purpose of payment card fraud. In addition, relationship between payment card fraud detection and terrorism funding is provided. Finally, some solutions for detecting payment card fraud are also given.
支付卡欺诈给支付卡行业造成了数十亿美元的损失。除了直接损失外,由于欺诈行为,消费者对品牌的信心也会受到影响。由于这些日益增长的损失,金融机构和发卡机构不断寻求新的技术和创新来检测和预防支付卡欺诈。本文概述了支付卡欺诈,并从支付卡统计和支付卡欺诈的定义开始。它还描述了身份窃贼用来获取个人和财务信息以进行支付卡欺诈的各种方法。此外,还提供了支付卡欺诈检测与恐怖主义资助的关系。最后,给出了一些检测支付卡诈骗的解决方案。
{"title":"Payment card fraud: Challenges and solutions","authors":"I. Sakharova","doi":"10.1109/ISI.2012.6284315","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284315","url":null,"abstract":"Payment card fraud is causing billions of dollars in losses for the card payment industry. Besides direct losses, the brand name can be affected by loss of consumer confidence due to the fraud. As a result of these growing losses, financial institutions and card issuers are continually seeking new techniques and innovation in payment card fraud detection and prevention. This paper provides an overview of payment card fraud and begins with payment card statistics and the definition of payment card fraud. It also describes various methods used by identity thieves to obtain personal and financial information for the purpose of payment card fraud. In addition, relationship between payment card fraud detection and terrorism funding is provided. Finally, some solutions for detecting payment card fraud are also given.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Police patrol district design using agent-based simulation and GIS 基于agent仿真和GIS的警察巡逻区设计
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284091
Yue Zhang, Donald E. Brown
Police patrols play an important role in public safety. The patrol district design is an important factor affecting the patrol performances, such as average response time and workload variation. The redistricting procedure can be described as partitioning smaller geographical units into several larger districts with the constraints of contiguity and compactness. The size of the possible sample space is large and the corresponding graph-partitioning problem is NP-complete. In our approach, the patrol districting plans generated by a parameterized redistricting procedure are evaluated using an agent-based simulation model we implemented in Java Repast in a geographic information system (GIS) environment. The relationship between districting parameters and response variables is studied and better districting plans can be generated. After in-depth evaluations of these plans, we perform a Pareto analysis of the outputs from the simulation to find the non-dominated set of plans on each of the objectives. This paper also includes a case study for the police department of Charlottesville, VA, USA. Simulation results show that patrol performance can be improved compared with the current districting solution.
警察巡逻在公共安全方面发挥着重要作用。巡逻区域的设计是影响巡逻性能的重要因素,如平均响应时间和工作量变化。重新划分选区的过程可以被描述为将较小的地理单元划分为几个较大的区域,并具有邻近性和紧凑性的约束。可能样本空间的大小很大,相应的图划分问题是np完全的。在我们的方法中,我们使用基于代理的仿真模型在地理信息系统(GIS)环境中Java Repast实现了一个参数化重新划分过程生成的巡逻分区计划。研究了分区参数与响应变量之间的关系,从而得出更好的分区方案。在对这些计划进行深入评估之后,我们对模拟的输出执行帕累托分析,以找到每个目标上的非支配计划集。本文还包括对美国弗吉尼亚州夏洛茨维尔警察局的案例研究。仿真结果表明,与现有的分区方案相比,该方案可以提高巡逻性能。
{"title":"Police patrol district design using agent-based simulation and GIS","authors":"Yue Zhang, Donald E. Brown","doi":"10.1109/ISI.2012.6284091","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284091","url":null,"abstract":"Police patrols play an important role in public safety. The patrol district design is an important factor affecting the patrol performances, such as average response time and workload variation. The redistricting procedure can be described as partitioning smaller geographical units into several larger districts with the constraints of contiguity and compactness. The size of the possible sample space is large and the corresponding graph-partitioning problem is NP-complete. In our approach, the patrol districting plans generated by a parameterized redistricting procedure are evaluated using an agent-based simulation model we implemented in Java Repast in a geographic information system (GIS) environment. The relationship between districting parameters and response variables is studied and better districting plans can be generated. After in-depth evaluations of these plans, we perform a Pareto analysis of the outputs from the simulation to find the non-dominated set of plans on each of the objectives. This paper also includes a case study for the police department of Charlottesville, VA, USA. Simulation results show that patrol performance can be improved compared with the current districting solution.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building a web collection for online surveillance of U.S. domestic terrorism 建立一个在线监控美国国内恐怖主义的网络收集
Pub Date : 2012-06-11 DOI: 10.1109/ISI.2012.6284306
Wingyan Chung, Wen Tang
As the trend of domestic terrorism grows rapidly, using web collections to support online surveillance should help intelligence and security personnel track down the sinister activities on the web. In this research, we have developed a collection of U.S. domestic terrorism websites and have conducted preliminary analysis of the sites' content and usage. We developed a novel approach to extracting textual, hyperlink, and usage information from websites. Our ongoing works include discovering hidden patterns from a collection of U.S. domestic terrorism websites and uncovering interesting usage and content patterns. This work should contribute to the area of online security surveillance using website data.
随着国内恐怖主义趋势的迅速增长,使用网络收集来支持在线监控应该有助于情报和安全人员追踪网络上的险恶活动。在本研究中,我们收集了一些美国国内的恐怖主义网站,并对这些网站的内容和使用情况进行了初步分析。我们开发了一种从网站中提取文本、超链接和使用信息的新方法。我们正在进行的工作包括从美国国内恐怖主义网站中发现隐藏的模式,并发现有趣的用法和内容模式。这项工作将有助于利用网站数据进行在线安全监视。
{"title":"Building a web collection for online surveillance of U.S. domestic terrorism","authors":"Wingyan Chung, Wen Tang","doi":"10.1109/ISI.2012.6284306","DOIUrl":"https://doi.org/10.1109/ISI.2012.6284306","url":null,"abstract":"As the trend of domestic terrorism grows rapidly, using web collections to support online surveillance should help intelligence and security personnel track down the sinister activities on the web. In this research, we have developed a collection of U.S. domestic terrorism websites and have conducted preliminary analysis of the sites' content and usage. We developed a novel approach to extracting textual, hyperlink, and usage information from websites. Our ongoing works include discovering hidden patterns from a collection of U.S. domestic terrorism websites and uncovering interesting usage and content patterns. This work should contribute to the area of online security surveillance using website data.","PeriodicalId":199734,"journal":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2012 IEEE International Conference on Intelligence and Security Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1