https://scholars.lib.ntu.edu.tw/handle/123456789/456571
Title: | Using burst detection techniques to identify suspicious vehicular traffic at border crossings | Authors: | Kaza S. HSIN-MIN LU Zeng D. Chen H. |
Keywords: | border crime; border crossing traffic; burst detection; primary screening | Issue Date: | 2012 | Start page/Pages: | 212-214 | Source: | ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities | Abstract: | Border safety is a critical part of national and international security. The Department of Homeland Security (DHS) searches vehicles entering the country at land borders for drugs and other contraband. However, this process is time-consuming and operational efficiency is needed for smooth operations at the border. To aid in the screening of vehicles, we propose to examine traffic patterns at checkpoints using burst detection algorithms. Our results show that the overall traffic at the border shows bursting patterns attributable to week days and the holiday seasons. In addition, using local law-enforcement data we also find that traffic with prior contacts with law-enforcement shows a bursting pattern distinct from other traffic. We also find that such bursts in suspicious traffic can be attributable to increases in vehicular traffic associated with certain kinds of criminal activity. This information can be used to specifically target vehicles searches during primary screening at ports and in the surrounding areas. © 2012 IEEE. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867365367&doi=10.1109%2fISI.2012.6284311&partnerID=40&md5=9a85b4778ffc557550d637dae86ab578 https://scholars.lib.ntu.edu.tw/handle/123456789/456571 |
DOI: | 10.1109/ISI.2012.6284311 | SDG/Keyword: | Border crossings; Burst detection; Burst detection algorithm; Criminal activities; Critical parts; Department of Homeland Security; International security; Operational efficiencies; Primary screening; Target vehicles; Traffic pattern; Information science |
Appears in Collections: | 資訊管理學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.