Suspect Tracking Based on Call Logs Analysis and Visualization

被引:0
|
作者
Longtong, Yosawee [1 ]
Narupiyakul, Lalita [1 ,2 ]
机构
[1] Mahidol Univ, Fac Engn, Dept Comp Engn, 25-25 Phutthamonthon 4 Rd, Phutthamonthon 73170, Nakhon Pathom, Thailand
[2] Mahidol Univ, Integrat Computat Biosci Ctr, 25-25 Phutthamonthon 4 Rd, Phutthamonthon 73170, Nakhon Pathom, Thailand
关键词
call log tracking; suspect's tracking; call logs visualization;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Thailand, investigator can track and find the suspects by using call logs from suspects' phone numbers and their contacts. In many cases, the suspects changed their phone numbers to avoid tracking. The problem is that the investigators have difficulty to track these suspects from their call logs. Our hypothesis is that each user has a unique calling behavior pattern. The calling pattern is importance for tracking suspect's telephone number. To compare the calling patterns, we consider common contact groups. Thus, the aim of this project is to develop a call logs tracking system which can predict a set of new possible suspect's phone numbers and present their contacts' connection with our network diagram visualization based on Graph database (Neo4j). This system will be very necessary for investigators because it can save investigators' time from analyzing excessive call logs data. The system can predict the possible suspect's phone numbers. Furthermore, our visualization can enhance human's sight ability to connect the relation among related phone numbers. Finally, the experimental results on real call logs demonstrate that our method can track telephone number approximately 69% of single possible suspect phone number's matching while 89% of multiple possible suspect phone numbers' matching.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Visualization System Utilizing Digital Textbook Logs
    Suzuki, Fumiya
    Mouri, Kousuke
    Kaneko, Keiichi
    [J]. 2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 61 - 64
  • [22] A new method for tagging and tracking logs
    Knowles, C.
    Boston, K.
    Berecibar, E.
    [J]. INTERNATIONAL FORESTRY REVIEW, 2017, 19 (03) : 294 - 305
  • [23] Analysis of CDN Website Logs Based on Hadoop
    Song, Qing
    Wen, Yujun
    Gong, Junpeng
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 597 - 602
  • [24] A Visualization Tool for Eye Tracking Data Analysis in the Web
    Menges, Raphael
    Kramer, Sophia
    Hill, Stefan
    Nisslmueller, Marius
    Kumar, Chandan
    Staab, Steffen
    [J]. ETRA 2020 SHORT PAPERS: ACM SYMPOSIUM ON EYE TRACKING RESEARCH & APPLICATIONS, 2020,
  • [25] Tracking the itch - When to suspect migrating larvae
    Uppal, A
    Liebers, D
    Tobin, EH
    [J]. POSTGRADUATE MEDICINE, 1997, 101 (05) : 281 - &
  • [26] Integrated portable system for suspect identification and tracking
    Brzezowski, SJ
    Dunn, CM
    Vetter, MF
    [J]. SURVEILLANCE AND ASSESSMENT TECHNOLOGIES FOR LAW ENFORCEMENT, 1997, 2935 : 24 - 35
  • [27] Mining Potential Spammers from Mobile Call Logs
    Liu, Zhipeng
    Pi, Dechang
    Chen, Yunfang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [28] Mining potential spammers from mobile call logs
    Liu, Zhipeng
    Pi, Dechang
    Chen, Yunfang
    [J]. International Journal of Distributed Sensor Networks, 2015, 11 (04)
  • [29] Identifying periodicity in nurse call occurrence: Analysing nurse call logs to obtain information for data-based nursing management
    Fukushige, Haruna
    Ishii, Atsue
    Inoue, Yoshiaki
    Yamaguchi, Akiko
    Hosona, Mio
    McCarthy, Kinuko
    Williamson, Akiko
    Taniura, Yoko
    Nakashima, Keisuke
    [J]. JOURNAL OF NURSING MANAGEMENT, 2021, 29 (05) : 1199 - 1206
  • [30] UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
    Li, Yue
    Wu, Zhenyu
    Wang, Haining
    Sun, Kun
    Li, Zhichun
    Jee, Kangkook
    Rhee, Junghwan
    Chen, Haifeng
    [J]. PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 161 - 172