2022
DOI: 10.3390/foods12010061
|View full text |Cite
|
Sign up to set email alerts
|

Spatial-Temporal Event Analysis as a Prospective Approach for Signalling Emerging Food Fraud-Related Anomalies in Supply Chains

Abstract: One of the pillars on which food traceability systems are based is the unique identification and recording of products and batches along the supply chain. Patterns of these identification codes in time and place may provide useful information on emerging food frauds. The scanning of codes on food packaging by users results in interesting spatial-temporal datasets. The analysis of these data using artificial intelligence could advance current food fraud detection approaches. Spatial-temporal patterns of the sca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…Threat detection methods based on anomaly detection seemed appropriate for this purpose, as they focus on identifying and assessing abnormal events and states [ 6 , 7 , 8 ]. At that time, research papers described anomaly detection techniques used, for example, to identify fraud [ 9 , 10 ], detect threats from internal users [ 11 ], or detect advanced DDoS attacks [ 12 , 13 ]. In the course of these studies, researchers adopted various approaches, such as statistical analysis, methods of classification and clustering, fuzzy sets, approximate inference, neural networks, and other hybrid techniques.…”
Section: Motivationmentioning
confidence: 99%
“…Threat detection methods based on anomaly detection seemed appropriate for this purpose, as they focus on identifying and assessing abnormal events and states [ 6 , 7 , 8 ]. At that time, research papers described anomaly detection techniques used, for example, to identify fraud [ 9 , 10 ], detect threats from internal users [ 11 ], or detect advanced DDoS attacks [ 12 , 13 ]. In the course of these studies, researchers adopted various approaches, such as statistical analysis, methods of classification and clustering, fuzzy sets, approximate inference, neural networks, and other hybrid techniques.…”
Section: Motivationmentioning
confidence: 99%