Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2012 European Intelligence and Security Informatics Conference 2012
DOI: 10.1109/eisic.2012.39
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Detecting anomalous container itineraries are important for implementing anti-fraud measures and ensuring supply chain security. Container Status Messages are used to successfully discover irregular container shipments, by using a simple SVM classifier (Camossi et al, 2012).…”
Section: Inventory and Logisticsmentioning
confidence: 99%
“…Detecting anomalous container itineraries are important for implementing anti-fraud measures and ensuring supply chain security. Container Status Messages are used to successfully discover irregular container shipments, by using a simple SVM classifier (Camossi et al, 2012).…”
Section: Inventory and Logisticsmentioning
confidence: 99%
“…They conducted an experiment to verify the proposed anomaly detection algorithm using actual taxi operation records in China. Camossi et al [48] suggested an algorithm for detecting the transportation of suspicious containers in the transportation schedules by learning general container transportation schedules using SVM. Then they conducted an experiment to verify the algorithm by using the container transportation records for a period of 3 years.…”
Section: Anomaly Detection Beyond the Business Processmentioning
confidence: 99%
“…To be able to apply proposals like [6,19] to use CTI in Route-based Risk Indicators (RRIs), there is the need to develop algorithms to obtain this information from commonly existing data sources. In [2], CSMs were used to infer CTI records following a decision-tree like process. In [17] basic information on the container trip (origin, first port, last port and destination) is extracted from bill of lading documents [9].…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, this information is often noisy, incomplete and non-standardized, requiring elaborated algorithms to remove the noise and improve the quality of the information. The works in [2][3][4]18] focus on how CSM records can be processed in order to extract useful information on the routes of the goods and assist the Customs risk management processes. The key element proposed on them to describe the route of the goods is the Container-Trip Information (CTI) [4,18].…”
Section: Introductionmentioning
confidence: 99%