2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2011
DOI: 10.1109/avss.2011.6027364
|View full text |Cite
|
Sign up to set email alerts
|

A robust approach for on-line and off-line threat detection based on event tree similarity analysis

Abstract: The security of railway and mass-transit systems is increasingly dependant on the effectiveness of integrated Security Management Systems (SMS), which are meant to detect threats and to provide operators with information required for alarm verification purposes. In order to lower the false alarm rate and improve the detection reliability of threat scenarios, event correlation capabilities need to be integrated into the SMS. In this paper an existing approach based on a-priori defined event patterns is extended… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…A heuristic situation recognition approach has been developed in [161] as another event detection system. The purpose of this approach is to enhance Security Management Systems and aims to eliminate the severity of consequences from human faults and sensor faults [161].…”
Section: Threat Eventsmentioning
confidence: 99%
See 1 more Smart Citation
“…A heuristic situation recognition approach has been developed in [161] as another event detection system. The purpose of this approach is to enhance Security Management Systems and aims to eliminate the severity of consequences from human faults and sensor faults [161].…”
Section: Threat Eventsmentioning
confidence: 99%
“…A heuristic situation recognition approach has been developed in [161] as another event detection system. The purpose of this approach is to enhance Security Management Systems and aims to eliminate the severity of consequences from human faults and sensor faults [161]. The authors in [161] explained that the approach can be used for a variety of sensor/ alarm dependent systems and can be used while on or offline.…”
Section: Threat Eventsmentioning
confidence: 99%
“…Automatic action recognition in videos is a long-standing problem in computer vision. However, thriving solutions provide desirable results in specific domains such as surveillance [ 1 ], entertainment, content-based video retrieval [ 2 ], Human-Computer Interaction and Robotics [ 3 ]. However, a general solution may not work as humans and their actions are not universal.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this information overload, graph matching has been suggested [27,16] as a method of isolating the IR answering data for more careful analyst investigation. Other techniques for information retrieval query response which have historically been applied in domains such as intelligence analysis include event tree similarity analysis [11,12,13], Bayesian networks [9], neural networks [20], Markov models [23] and query languages such as SPARQL [29]. Difficulties in identifying probabilistic graphical model topologies (dependencies) and probabilities or priors paired with computational complexity have prevented many of these techniques from being applied in the highly dynamic, big data modern intelligence analysis environment.…”
Section: Introductionmentioning
confidence: 99%