Skip to main content

Advertisement

Log in

Criticality assessment of terrorism related events at different time scales

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This work presents the TENSOR (clusTEriNg terroriSm actiOn pRediction) framework, a near real-time reasoning framework for early identification and prediction of potential threat situations (e.g. terrorist actions). The framework consists of three different modules with the aim of collecting and processing information of the surrounding environment from a variety of sources including physical sensors (e.g. surveillance cameras) and humans (e.g. police officers). The main objective of TENSOR is to show how patterns of strategic terroristic behaviors, identified analyzing large longitudinal data sets, can be linked to short term activity patterns identified analyzing feeds by “usual” surveillance technologies and that this fusion allows a better detection of terrorist threats. This information is processed at different abstraction levels and, thru the proposed layered architecture, TENSOR simulates the three main expert user roles (i.e. operational, tactical and strategic user roles), as indicated in the intelligence analysis domain literature. TENSOR transforms all the sensors gathered data into symbolic events of interest following a generic scenario-agnostic semantics for terrorist attacks described in literature as terrorist indicators. Thru different reasoning and fusion techniques, the framework proactively detects threats and depicts the situation in near real-time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Adi A, Etzion O (2004) Amit-the situation manager. VLDB J 13(2):177–203

    Article  MATH  Google Scholar 

  • Baxter K, Courage C, Caine K (2015) Understanding your users: a practical guide to user research methods. A volume in Interactive Technologies. Elsevier, ISBN: 978-0-12-800232-2

  • Bennett BT (2007) Understanding, assessing, and responding to terrorism: protecting critical infrastructure and personnel. Wiley, New York, ISBN: 978-0-471-77152-4

  • Bruzzone A, Tremori A, Massei M (2009) Serious games for training and education on defense against terrorism. Genoa Univ, Italy

  • Dymarski P (2011) Hidden markov models, theory and applications. InTech Open Access Publishers, Rijeka, p 326, ISBN 978-953-307-208-1

    Book  Google Scholar 

  • Esper Version 4.11.0. EsperTech Inc. http://www.espertech.com/download/. Accessed 04 Feb 2016

  • Forgy CL (1982) Rete: a fast algorithm for the many pattern/many object pattern match problem. Artif Intell 19(1):17–37

    Article  Google Scholar 

  • Fülöp LJ, Beszédes Á, Tóth G, Demeter H, Vidács L, Farkas L (2012) Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analytics. In: Proceedings of the Fifth Balkan conference in informatics. ACM, New York, pp 26–31

  • GTD (Global Terrorism Database) (2015) Codebook: inclusion criteria and variables

  • Ha T, Lee S, Kim N (2015) Development of a user-oriented IoT middleware architecture based on users’ context data. In: Distributed, ambient, and pervasive interactions. Lecture Notes in Computer Science. Vol. 9189, Springer, Berlin, pp 287–295

  • Hall, D, Llinas, J (eds) (2001) Multisensor data fusion. CRC Press, Taylor and Francis Group

  • Kenda K, Fortuna C, Moraru A, Mladenić D, Fortuna B, Grobelnik M (2013) Mashups for the web of things. In: Semantic mashups. Springer, Berlin, Heidelberg, pp 145–169

  • Klein LA (2004) Sensor and data fusion: a tool for information assessment and decision making, vol 324. Spie Press, Bellingham

  • Moraru A, Kenda K, Fortuna B, Bradeško L, Škrjanc M, Mladenić D, Fortuna C (2012) Supporting rule generation and validation on environmental data in EnStreaM. In: The semantic web: ESWC 2012 satellite events. Springer, Berlin, Heidelberg, pp 441–446

  • Petris S, Georgoulis C, Soldatos J, Giordani I, Sormani R, Djordjevic D (2014) Predicting terroristic attacks in urban environments: an internet-of-things approach. Int J Secur Appl 8(4):195–218

    Google Scholar 

  • Sormani R, Soldatos J, Vassilaras S, Tisato F, Giordani I (2016) A serious game empowering the prediction of potential terroristic actions. J Polic Intell Counter Terror 11(1):30–48

    Article  Google Scholar 

  • Sottara D, Mello P, Proctor M (2010) A configurable rete-oo engine for reasoning with different types of imperfect information. IEEE Trans Knowl Data Eng 22(11):1535–1548

    Article  Google Scholar 

  • Walzer K, Groch M, Breddin T (2008) Time to the rescue-supporting temporal reasoning in the rete algorithm for complex event processing. In: Database and expert systems applications. Springer, Berlin, Heidelberg, pp 635–642

  • Widder A, Ammon RV, Schaeffer P, Wolff C (2007) Identification of suspicious, unknown event patterns in an event cloud. In: Proceedings of DEBS '07, the 2007 inaugural international conference on distributed event-based systems. ACM, New York, pp 164–170

Download references

Acknowledgments

Part of this work has been carried out in the scope of the PROACTIVE project (FP7-285320) (http://www.proactive-project.eu). The authors acknowledge help and contributions from all partners of the project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raul Sormani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sormani, R., Archetti, F. & Giordani, I. Criticality assessment of terrorism related events at different time scales. J Ambient Intell Human Comput 8, 9–27 (2017). https://doi.org/10.1007/s12652-016-0416-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-016-0416-x

Keywords

Navigation