Applying Data Mining in Surveillance: Detecting Suspicious Activity on Social Networks

被引:0
|
作者
Harrag, Fouzi [1 ]
Alshehri, Ali [2 ]
机构
[1] Ferhat Abbas Univ, Setif, Algeria
[2] Royal Comiss Riyadh City, Riyadh, Saudi Arabia
关键词
Data Fusion; Data mining; Sensors; Surveillance; UCINET; Video analytics; WEKA; MULTIMODAL FUSION; CENTRALITY;
D O I
10.4018/IJDST.317930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current times where human safety is threatened by man-made and natural calamities, surveillance systems have gained immense importance. But, even in presence of high definition (HD) security cameras and manpower to monitor the live feed 24/7, room for missing important information due to human error exists. In addition to that, employing an adequate number of people for the job is not always feasible either. The solution lies in a system that allows automated surveillance through classification and other data mining techniques that can be used for extraction of useful information out of these inputs. In this research, a data mining-based framework has been proposed for surveillance. The research includes interpretation of data from different networks using hybrid data mining technique. In order to show the validity of the proposed hybrid data mining technique, an online data set containing network of a suspicious group has been utilized and main leaders of network has been identified.
引用
收藏
页码:27 / 27
页数:1
相关论文
共 50 条
  • [1] Applying Data Mining for Detecting Anomalies in Satellites Applying Data Mining for Detecting Anomalies in Satellites
    Azevedo, Denise Rotondi
    Ambrosio, Ana Maria
    Vieira, Marco
    [J]. 2012 NINTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2012), 2012, : 212 - 217
  • [2] Detecting Suspicious Social Astroturfing Groups in Tourism Social Networks
    Alallaq, Noora
    Al-khiza'ay, Muhmmad
    Han, Xin
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC, AND SOCIO-CULTURAL COMPUTING (BESC), 2018, : 58 - 62
  • [3] Detecting Suspicious Discussion on Online Forums Using Data Mining
    Rasheed, Haroon Ur
    Khan, Farhan Hassan
    Bashir, Saba
    Fatima, Irsa
    [J]. INTELLIGENT TECHNOLOGIES AND APPLICATIONS, INTAP 2018, 2019, 932 : 262 - 273
  • [4] Applying Bayesian Networks for meteorological data mining
    Hruschka, ER
    Hruschka, ER
    Ebecken, NFF
    [J]. APPLICATIONS AND INNOVATIONS IN INTELLIGENT SYSTEMS XIII, 2006, : 122 - +
  • [5] Detecting Suspicious Following Behavior in Multimillion-Node Social Networks
    Jiang, Meng
    Cui, Peng
    Beutel, Alex
    Faloutsos, Christos
    Yang, Shiqiang
    [J]. WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 305 - 306
  • [6] Data mining in social networks
    Jensen, D
    Neville, J
    [J]. DYNAMIC SOCIAL NETWORK MODELING AND ANALYSIS, 2003, : 289 - 302
  • [7] An Integrated Framework for Detecting Suspicious Behaviors in Video Surveillance
    Zin, Thi Thi
    Tin, Pyke
    Hama, Hiromitsu
    Toriu, Takashi
    [J]. VIDEO SURVEILLANCE AND TRANSPORTATION IMAGING APPLICATIONS 2014, 2014, 9026
  • [8] CULTURAL DATA MINING IN SOCIAL NETWORKS
    Papaioannou, Evi
    Schiza, Elpida
    [J]. 4TH INTERNATIONAL CONFERENCE ON EDUCATION AND SOCIAL SCIENCES (INTCESS 2017), 2017, : 411 - 420
  • [9] Detecting suspicious behavior from only positional data with distributed sensor networks
    Rowe, Neil C.
    [J]. PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, VOL 6, PTS A-C, 2005, : 2291 - 2296
  • [10] Suspicious Activity Detection in Surveillance Footage
    Loganathan, Sathyajit
    Kariyawasam, Gayashan
    Sumathipala, Prasanna
    [J]. 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2019,