Applying Data Mining in Surveillance: Detecting Suspicious Activity on Social Networks

被引:0
|
作者
Harrag, Fouzi [1 ]
Alshehri, Ali [2 ]
机构
[1] Ferhat Abbas Univ, Setif, Algeria
[2] Royal Comiss Riyadh City, Riyadh, Saudi Arabia
关键词
Data Fusion; Data mining; Sensors; Surveillance; UCINET; Video analytics; WEKA; MULTIMODAL FUSION; CENTRALITY;
D O I
10.4018/IJDST.317930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current times where human safety is threatened by man-made and natural calamities, surveillance systems have gained immense importance. But, even in presence of high definition (HD) security cameras and manpower to monitor the live feed 24/7, room for missing important information due to human error exists. In addition to that, employing an adequate number of people for the job is not always feasible either. The solution lies in a system that allows automated surveillance through classification and other data mining techniques that can be used for extraction of useful information out of these inputs. In this research, a data mining-based framework has been proposed for surveillance. The research includes interpretation of data from different networks using hybrid data mining technique. In order to show the validity of the proposed hybrid data mining technique, an online data set containing network of a suspicious group has been utilized and main leaders of network has been identified.
引用
收藏
页码:27 / 27
页数:1
相关论文
共 50 条
  • [21] Improving Opinion Mining in Social Networks Data
    Mahmoud, Shaimaa
    Hussein, Mahmoud
    Keshk, Arabi
    29TH INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA 2019), 2019, : 68 - 72
  • [22] Data mining: a tool for detecting cyclical disturbances in supply networks
    Afify, A. A.
    Dimov, S. S.
    Naim, M.
    Valeva, V.
    Shukla, V.
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART B-JOURNAL OF ENGINEERING MANUFACTURE, 2007, 221 (12) : 1771 - 1785
  • [23] Suspicious Activity Recognition in Video Surveillance System
    Kamthe, U. M.
    Patil, C. G.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [24] How to detect illegal corporate insider trading? A data mining approach for detecting suspicious insider transactions
    Esen, M. Fevzi
    Bilgic, Emrah
    Basdas, Ulkem
    INTELLIGENT SYSTEMS IN ACCOUNTING FINANCE & MANAGEMENT, 2019, 26 (02): : 60 - 70
  • [25] Applying Social Event Data for the Management of Cellular Networks
    Fortes, Sergio
    Palacios, David
    Serrano, Inmaculada
    Barco, Raquel
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (11) : 36 - 43
  • [26] Early warning system: From face recognition by surveillance cameras to social media analysis to detecting suspicious people
    Afra, Salim
    Alhajj, Reda
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 540
  • [27] A dynamic approach to detecting suspicious profiles on social platforms
    Perez, Charles
    Lemercier, Marc
    Birregah, Babiga
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 174 - 178
  • [28] Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Romano, Luigi
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 247 - 254
  • [29] Detecting misinformation in social networks using provenance data
    Baeth, Mohamed Jehad
    Aktas, Mehmet S.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (03):
  • [30] Detecting Misinformation in Social Networks Using Provenance Data
    Baeth, Mohamed Jehad
    Aktas, Mehmet S.
    2017 13TH INTERNATIONAL CONFERENCE ON SEMANTICS, KNOWLEDGE AND GRIDS (SKG 2017), 2017, : 85 - 89