“…While the current security devices attention to the appearance of the violence, somewhat after the attacker. Further, it focused on the attacker behavior analysis due to it being a challenging problem [26], [27], [28],[29], [30], [31], [32], [33],[34], [35],[36],[37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48],[49], [50].…”