Abstract
To guarantee national security against terrorist attacks or organized crime, states must implement homeland security solutions based on ubiquitous systems to know in advance the number of suspects involved in an attack. This work proposes a method, which combines popular trajectory similarity metrics to estimate the number of attackers participating in a malicious act through the analysis of the trajectories described by the attacker’s cell phone connection to antennas (i.e. Call Detail Records). Therefore, measuring trajectory similarity in CDRs generates different challenges compared to those similar metrics applied over GPS and video datasets.
Original language | English |
---|---|
Title of host publication | Information Management and Big Data - 5th International Conference, SIMBig 2018, Proceedings |
Editors | Hugo Alatrista-Salas, Juan Antonio Lossio-Ventura, Denisse Muñante |
Place of Publication | Cham |
Pages | 160-173 |
Number of pages | 14 |
ISBN (Electronic) | 9783030116798 |
DOIs | |
State | Published - 1 Jan 2019 |
Event | Communications in Computer and Information Science - Duration: 1 Jan 2019 → … |
Publication series
Name | Communications in Computer and Information Science |
---|---|
Volume | 898 |
ISSN (Print) | 1865-0929 |
Conference
Conference | Communications in Computer and Information Science |
---|---|
Period | 1/01/19 → … |
Bibliographical note
Publisher Copyright:© 2019, Springer Nature Switzerland AG.
Keywords
- Similarity
- Terrorist
- Trajectory