Towards a Pervasive and Predictive Traffic Police

  • Fabio Leuzzi
  • Emiliano Del Signore
  • Rosanna Ferranti
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 728)


The research on traffic flows is historically born to improve road networks, to make trips comfortable and faster. In this research field, as in many others, literary production followed market or business demand. This paper has the objective to clarify police needs, in order to create a research request and to gain attention. It provides an organizational framework concerning needs, goals, fields and some impacts such that different areas of study can concur all together towards a pervasive comprehension of road events, a predictive Traffic Police, so that safety and security can be ensured via a targeted patrolling or intervention. The aim behind the practical level is to pave the way for the interaction between data science from one hand, and law, public administration and justice from the other hand.


Traffic data mining Vehicle forensics Pattern understanding 


  1. 1.
    Guha, Sudipto, Nick Koudas, and Kyuseok Shim. 2001. Data-streams and histograms. In Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing, STOC ’01, 471–475, New York, NY, USA. ACM.Google Scholar
  2. 2.
    Appice, Annalisa, Michelangelo Ceci, Corrado Loglisci, Costantina Caruso, Fabio Fumarola, Michele Todaro, and Donato Malerba. 2009. A relational approach to novelty detection in data streams. In Proceedings of the Seventeenth Italian Symposium on Advanced Database Systems, SEBD 2009, 89–100, June 21–24, Camogli, Italy.Google Scholar
  3. 3.
    Gama, Joao. 2010. Knowledge Discovery from Data Streams, 1st ed. Chapman & Hall/CRC.Google Scholar
  4. 4.
    Stern, Raphael E., Shumo Cui, Maria Laura Delle Monache, Rahul Bhadani, Matt Bunting, Miles Churchill, Nathaniel Hamilton, R’mani Haulcy, Hannah Pohlmann, Fangyu Wu, Benedetto Piccoli, Benjamin Seibold, Jonathan Sprinkle, and Daniel B. Work. 2017. Dissipation of stop-and-go waves via control of autonomous vehicles: Field experiments. CoRR. abs/1705.01693.
  5. 5.
    Singleton, Nathan, Jeremy Daily, and Gavin Manes. 2008. Automobile Event Data Recorder Forensics, 261–272. Boston: Springer.Google Scholar
  6. 6.
    European Parliament and Council. 2014. Regulation 165/2014 on tachographs in road transport. In European Regulation, 02 2014.Google Scholar
  7. 7.
    Malerba, Donato. 2007. Mining spatial data: Opportunities and challenges of a relational approach. In IASC 2007, August 30th September 1st, Aveiro, Portugal.Google Scholar
  8. 8.
    Güting, Ralf Hartmut. 1994. An introduction to spatial database systems. The VLDB Journal 3 (4): 357–399.CrossRefGoogle Scholar
  9. 9.
    Egenhofer, Max J., and Robert D. Franzosa. 1991. Point-set topological spatial relations. International Journal of Geographical Information Systems 5 (2): 161–174.CrossRefGoogle Scholar
  10. 10.
    Preparata, Franco P., and Michael I. Shamos. 1985. Computational Geometry: An Introduction. New York: Springer.CrossRefzbMATHGoogle Scholar
  11. 11.
    Koperski, Krzysztof, Junas Adhikary, and Jiawei Han. 1996. Spatial data mining: Progress and challenges - survey paper. In SIGMOD Workshop on Research Issues on data Mining and Knowledge Discovery (DMKD, 1–10.Google Scholar
  12. 12.
    Ferilli, Stefano. 2014. Woman: Logic-based workflow learning and management. IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (6): 744–756.CrossRefGoogle Scholar
  13. 13.
    Herbst, Joachim. 1999. An inductive approach to the acquisition and adaptation of workflow models. In Proceedings of the IJCAI’99 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, 52–57.Google Scholar
  14. 14.
    van der Aalst, W., T. Weijters, and L. Maruster. 2004. Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering 16 (9): 1128–1142.CrossRefGoogle Scholar
  15. 15.
    Weijters, A.J.M.M., and W.M.P. van der Aalst. 2003. Rediscovering workflow models from event-based data using little thumb. Integr. Comput. Aided Eng. 10 (2): 151–162.Google Scholar
  16. 16.
    Cook, Jonathan E., and Alexander L. Wolf. 1998. Discovering models of software processes from event-based data. ACM Trans. Softw. Eng. Methodol. 7 (3): 215–249.CrossRefGoogle Scholar
  17. 17.
    Pesic, M., and W.M.P. van der Aalst. 2006. A declarative approach for flexible business processes management. In Proceedings of the 2006 International Conference on Business Process Management Workshops, BPM’06, 169–180. Berlin: Springer.Google Scholar
  18. 18.
    Michalski, Ryszard S. 1983. A Theory and Methodology of Inductive Learning, 83–134. Berlin: Springer.Google Scholar
  19. 19.
    Bortles, William, Sean McDonough, Connor Smith, and Michael Stogsdill. 2017. An introduction to the forensic acquisition of passenger vehicle infotainment and telematics systems data. In SAE Technical Paper, 03 2017. SAE International.Google Scholar
  20. 20.
    Garcia, Flavio D., David Oswald, Timo Kasper, and Pierre Pavlidès. 2016. Lock it and still lose it—on the (in)security of automotive remote keyless entry systems. In 25th USENIX Security Symposium (USENIX Security 16), Austin, TX. USENIX Association.Google Scholar
  21. 21.
    Bortles, William, Wayne Biever, Neal Carter, and Connor Smith. 2016. A compendium of passenger vehicle event data recorder literature and analysis of validation studies. In SAE Technical Paper, 04 2016. SAE International.Google Scholar
  22. 22.
    Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. 2010. Experimental security analysis of a modern automobile. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP’10, 447–462, Washington, DC, USA. IEEE Computer Society.Google Scholar
  23. 23.
    Checkoway, Stephen, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley, CA, USA. USENIX Association.Google Scholar
  24. 24.
    Liu, Jianhao, Chen Yan, and Wenyuan Xu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. In Proceedings of the 24th DEF CON Conference on Hacking.Google Scholar
  25. 25.
    European Parliament and Council. 1981. Convention for the protection of individuals with regard to automatic processing of personal data. In European Regulation, 01 1981.Google Scholar
  26. 26.
    European Parliament and Council. 2017. Guidelines on the protection of individuals with regard to the processing of personal data in a world of big data. In T-PD(2017)701, 01 2017.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Fabio Leuzzi
    • 1
  • Emiliano Del Signore
    • 1
  • Rosanna Ferranti
    • 1
  1. 1.Ministry of the Interior – Italian National PoliceRomeItaly

Personalised recommendations