2010
DOI: 10.1007/978-3-642-13241-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Geolocation information is not only crucial in conventional crime investigation, but also increasingly important for digital forensics as it allows for the logical fusion of digital evidence that is often fragmented across disparate mobile assets. This, in turn, often requires the reconstruction of mobility patterns. However, real-time surveillance is often difficult and costly to conduct, especially in criminal scenarios where such process needs to take place clandestinely. In this paper, we consider a vehicu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The crawler traverses the various routes by repeatedly backing-up whenever it finds a plausible or implausible route. The back-up procedure proceeds as follows: when the crawler finds an (im)plausible route, it checks χ C Gp and traverses backward through the edge in χ C Gp [1] toward the vertex χ C Gp [2] where χ[n] is the n th element of the list χ. Next, it deletes the two elements from χ C Gp and repeats the entire traversal process, but this time it does not traverse the edge it just came from because it is now tagged as "visited" (or generally any edge tagged as "visited").…”
Section: Trace Reconstructionmentioning
confidence: 99%
See 1 more Smart Citation
“…The crawler traverses the various routes by repeatedly backing-up whenever it finds a plausible or implausible route. The back-up procedure proceeds as follows: when the crawler finds an (im)plausible route, it checks χ C Gp and traverses backward through the edge in χ C Gp [1] toward the vertex χ C Gp [2] where χ[n] is the n th element of the list χ. Next, it deletes the two elements from χ C Gp and repeats the entire traversal process, but this time it does not traverse the edge it just came from because it is now tagged as "visited" (or generally any edge tagged as "visited").…”
Section: Trace Reconstructionmentioning
confidence: 99%
“…A prime example is when a target is randomly captured by CCTV cameras scattered over a particular area. Previous work has focused on conducting offline forensic investigations in a vehicular setting [1]. This paper extends the approach to deal with scenarios where a suspect uses multiple modes of transportation.…”
Section: Introductionmentioning
confidence: 99%
“…broadcasting algorithm) is adopted to find the possible routes through the gaps. Clearly, finding all possible routes may require an exponential time, thus the search area should first be bounded before executing the route-counter algorithm, an example of such algorithm is BRC [1] which, in fact, was used for similar purpose.…”
Section: Mobility Modelsmentioning
confidence: 99%
“…We claim that investigating and reconstructing the mobility traces of a suspect may greatly assist most criminal investigations; indeed, proving the location of the suspect in a particular time can be a significant piece of evidence. We call reconstructing the mobility traces of the target for forensic purposes forensic tracking, which previous research showed plausible [1]. Generally, we aim to reconstruct the suspect's trace in an offline manner by considering the available parts of the trace and try to probabilistically fill (reconstruct) the missing parts.…”
Section: Introductionmentioning
confidence: 99%
“…This can be done in real time (online tracking) by collecting information about the target periodically during the trip. The tracking can also be done offline based on historical information and records previously acquired to reconstruct target paths [1]. This is commonly used in forensic investigations to trace the path of a suspect vehicle [2].…”
Section: Introductionmentioning
confidence: 99%