2009
DOI: 10.1117/12.828701
|View full text |Cite
|
Sign up to set email alerts
|

Detection of suspicious activity using incremental outlier detection algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 28 publications
0
0
0
Order By: Relevance
“…With the development of global position system (GPS) [1], wireless technology [2] and location aware services [3], it is possible for us to collect a large quantity of trajectory data [4][5][6]. With this trend, the problem of trajectory outlier detection (TRAOD) has been extensively studied [7][8][9]. In 2000, Knorr et al presented their efforts in [10].…”
Section: Introductionmentioning
confidence: 99%
“…With the development of global position system (GPS) [1], wireless technology [2] and location aware services [3], it is possible for us to collect a large quantity of trajectory data [4][5][6]. With this trend, the problem of trajectory outlier detection (TRAOD) has been extensively studied [7][8][9]. In 2000, Knorr et al presented their efforts in [10].…”
Section: Introductionmentioning
confidence: 99%