Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A statistical method for detecting significant temporal hotspots using LISA statistics
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.ORCID iD: 0000-0002-9316-4842
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.ORCID iD: 0000-0002-8929-7220
2017 (English)Conference paper, Published paper (Refereed)
Abstract [en]

This work presents a method for detecting statisticallysignificant temporal hotspots, i.e. the date and time of events,which is useful for improved planning of response activities.Temporal hotspots are calculated using Local Indicators ofSpatial Association (LISA) statistics. The temporal data is ina 7x24 matrix that represents a temporal resolution of weekdaysand hours-in-the-day. Swedish residential burglary events areused in this work for testing the temporal hotspot detectionapproach. Although, the presented method is also useful forother events as long as they contain temporal information, e.g.attack attempts recorded by intrusion detection systems. Byusing the method for detecting significant temporal hotspotsit is possible for domain-experts to gain knowledge about thetemporal distribution of the events, and also to learn at whichtimes mitigating actions could be implemented.

Place, publisher, year, edition, pages
IEEE Computer Society, 2017.
Keyword [en]
Temporal analysis, temporal hotspot, computational criminology, LISA statistics, local indicators of spatial association.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:bth-15166OAI: oai:DiVA.org:bth-15166DiVA: diva2:1143020
Conference
European Intelligence and Security Informatics Conference (EISIC)
Available from: 2017-09-20 Created: 2017-09-20 Last updated: 2017-09-25Bibliographically approved

Open Access in DiVA

fulltext(328 kB)86 downloads
File information
File name FULLTEXT01.pdfFile size 328 kBChecksum SHA-512
d85e2cc67319d31f1ee263599d84b1ee6a8885a3c5f0dc99942b071d05055384a29222ce808e9ca5709c25546676ccb75254e3af27ca206c63ae7937b9a8ebcd
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Boldt, MartinBorg, Anton
By organisation
Department of Computer Science and Engineering
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 86 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 121 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf