Abstract
This work presents the TENSOR (clusTEriNg terroriSm actiOn pRediction) framework, a near real-time reasoning framework for early identification and prediction of potential threat situations (e.g. terrorist actions). The framework consists of three different modules with the aim of collecting and processing information of the surrounding environment from a variety of sources including physical sensors (e.g. surveillance cameras) and humans (e.g. police officers). The main objective of TENSOR is to show how patterns of strategic terroristic behaviors, identified analyzing large longitudinal data sets, can be linked to short term activity patterns identified analyzing feeds by “usual” surveillance technologies and that this fusion allows a better detection of terrorist threats. This information is processed at different abstraction levels and, thru the proposed layered architecture, TENSOR simulates the three main expert user roles (i.e. operational, tactical and strategic user roles), as indicated in the intelligence analysis domain literature. TENSOR transforms all the sensors gathered data into symbolic events of interest following a generic scenario-agnostic semantics for terrorist attacks described in literature as terrorist indicators. Thru different reasoning and fusion techniques, the framework proactively detects threats and depicts the situation in near real-time.
Similar content being viewed by others
References
Adi A, Etzion O (2004) Amit-the situation manager. VLDB J 13(2):177–203
Baxter K, Courage C, Caine K (2015) Understanding your users: a practical guide to user research methods. A volume in Interactive Technologies. Elsevier, ISBN: 978-0-12-800232-2
Bennett BT (2007) Understanding, assessing, and responding to terrorism: protecting critical infrastructure and personnel. Wiley, New York, ISBN: 978-0-471-77152-4
Bruzzone A, Tremori A, Massei M (2009) Serious games for training and education on defense against terrorism. Genoa Univ, Italy
Dymarski P (2011) Hidden markov models, theory and applications. InTech Open Access Publishers, Rijeka, p 326, ISBN 978-953-307-208-1
Esper Version 4.11.0. EsperTech Inc. http://www.espertech.com/download/. Accessed 04 Feb 2016
Forgy CL (1982) Rete: a fast algorithm for the many pattern/many object pattern match problem. Artif Intell 19(1):17–37
Fülöp LJ, Beszédes Á, Tóth G, Demeter H, Vidács L, Farkas L (2012) Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analytics. In: Proceedings of the Fifth Balkan conference in informatics. ACM, New York, pp 26–31
GTD (Global Terrorism Database) (2015) Codebook: inclusion criteria and variables
Ha T, Lee S, Kim N (2015) Development of a user-oriented IoT middleware architecture based on users’ context data. In: Distributed, ambient, and pervasive interactions. Lecture Notes in Computer Science. Vol. 9189, Springer, Berlin, pp 287–295
Hall, D, Llinas, J (eds) (2001) Multisensor data fusion. CRC Press, Taylor and Francis Group
Kenda K, Fortuna C, Moraru A, Mladenić D, Fortuna B, Grobelnik M (2013) Mashups for the web of things. In: Semantic mashups. Springer, Berlin, Heidelberg, pp 145–169
Klein LA (2004) Sensor and data fusion: a tool for information assessment and decision making, vol 324. Spie Press, Bellingham
Moraru A, Kenda K, Fortuna B, Bradeško L, Škrjanc M, Mladenić D, Fortuna C (2012) Supporting rule generation and validation on environmental data in EnStreaM. In: The semantic web: ESWC 2012 satellite events. Springer, Berlin, Heidelberg, pp 441–446
Petris S, Georgoulis C, Soldatos J, Giordani I, Sormani R, Djordjevic D (2014) Predicting terroristic attacks in urban environments: an internet-of-things approach. Int J Secur Appl 8(4):195–218
Sormani R, Soldatos J, Vassilaras S, Tisato F, Giordani I (2016) A serious game empowering the prediction of potential terroristic actions. J Polic Intell Counter Terror 11(1):30–48
Sottara D, Mello P, Proctor M (2010) A configurable rete-oo engine for reasoning with different types of imperfect information. IEEE Trans Knowl Data Eng 22(11):1535–1548
Walzer K, Groch M, Breddin T (2008) Time to the rescue-supporting temporal reasoning in the rete algorithm for complex event processing. In: Database and expert systems applications. Springer, Berlin, Heidelberg, pp 635–642
Widder A, Ammon RV, Schaeffer P, Wolff C (2007) Identification of suspicious, unknown event patterns in an event cloud. In: Proceedings of DEBS '07, the 2007 inaugural international conference on distributed event-based systems. ACM, New York, pp 164–170
Acknowledgments
Part of this work has been carried out in the scope of the PROACTIVE project (FP7-285320) (http://www.proactive-project.eu). The authors acknowledge help and contributions from all partners of the project.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sormani, R., Archetti, F. & Giordani, I. Criticality assessment of terrorism related events at different time scales. J Ambient Intell Human Comput 8, 9–27 (2017). https://doi.org/10.1007/s12652-016-0416-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-016-0416-x