{"title":"用于安全环境的动态贝叶斯网络、诱导和数据嵌入","authors":"Kieran Drury, Jim Q. Smith","doi":"arxiv-2409.07389","DOIUrl":null,"url":null,"abstract":"Serious crime modelling typically needs to be undertaken securely behind a\nfirewall where police knowledge and capabilities can remain undisclosed. Data\ninforming an ongoing incident is often sparse, with a large proportion of\nrelevant data only coming to light after the incident culminates or after\npolice intervene - by which point it is too late to make use of the data to aid\nreal-time decision making for the incident in question. Much of the data that\nis available to police to support real-time decision making is highly\nconfidential so cannot be shared with academics, and is therefore missing to\nthem. In this paper, we describe the development of a formal protocol where a\ngraphical model is used as a framework for securely translating a model\ndesigned by an academic team to a model for use by a police team. We then show,\nfor the first time, how libraries of these models can be built and used for\nreal-time decision support to circumvent the challenges of data missingness and\ntardiness seen in such a secure environment. The parallel development described\nby this protocol ensures that any sensitive information collected by police,\nand missing to academics, remains secured behind a firewall. The protocol\nnevertheless guides police so that they are able to combine the typically\nincomplete data streams that are open source with their more sensitive\ninformation in a formal and justifiable way. We illustrate the application of\nthis protocol by describing how a new entry - a suspected vehicle attack - can\nbe embedded into such a police library of criminal plots.","PeriodicalId":501425,"journal":{"name":"arXiv - STAT - Methodology","volume":"73 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments\",\"authors\":\"Kieran Drury, Jim Q. Smith\",\"doi\":\"arxiv-2409.07389\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Serious crime modelling typically needs to be undertaken securely behind a\\nfirewall where police knowledge and capabilities can remain undisclosed. Data\\ninforming an ongoing incident is often sparse, with a large proportion of\\nrelevant data only coming to light after the incident culminates or after\\npolice intervene - by which point it is too late to make use of the data to aid\\nreal-time decision making for the incident in question. Much of the data that\\nis available to police to support real-time decision making is highly\\nconfidential so cannot be shared with academics, and is therefore missing to\\nthem. In this paper, we describe the development of a formal protocol where a\\ngraphical model is used as a framework for securely translating a model\\ndesigned by an academic team to a model for use by a police team. We then show,\\nfor the first time, how libraries of these models can be built and used for\\nreal-time decision support to circumvent the challenges of data missingness and\\ntardiness seen in such a secure environment. The parallel development described\\nby this protocol ensures that any sensitive information collected by police,\\nand missing to academics, remains secured behind a firewall. The protocol\\nnevertheless guides police so that they are able to combine the typically\\nincomplete data streams that are open source with their more sensitive\\ninformation in a formal and justifiable way. We illustrate the application of\\nthis protocol by describing how a new entry - a suspected vehicle attack - can\\nbe embedded into such a police library of criminal plots.\",\"PeriodicalId\":501425,\"journal\":{\"name\":\"arXiv - STAT - Methodology\",\"volume\":\"73 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - STAT - Methodology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.07389\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - STAT - Methodology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Bayesian Networks, Elicitation and Data Embedding for Secure Environments
Serious crime modelling typically needs to be undertaken securely behind a
firewall where police knowledge and capabilities can remain undisclosed. Data
informing an ongoing incident is often sparse, with a large proportion of
relevant data only coming to light after the incident culminates or after
police intervene - by which point it is too late to make use of the data to aid
real-time decision making for the incident in question. Much of the data that
is available to police to support real-time decision making is highly
confidential so cannot be shared with academics, and is therefore missing to
them. In this paper, we describe the development of a formal protocol where a
graphical model is used as a framework for securely translating a model
designed by an academic team to a model for use by a police team. We then show,
for the first time, how libraries of these models can be built and used for
real-time decision support to circumvent the challenges of data missingness and
tardiness seen in such a secure environment. The parallel development described
by this protocol ensures that any sensitive information collected by police,
and missing to academics, remains secured behind a firewall. The protocol
nevertheless guides police so that they are able to combine the typically
incomplete data streams that are open source with their more sensitive
information in a formal and justifiable way. We illustrate the application of
this protocol by describing how a new entry - a suspected vehicle attack - can
be embedded into such a police library of criminal plots.