Dynamic Bayesian Networks, Elicitation, and Data Embedding for Secure Environments.

IF 2.1 3区 物理与天体物理 Q2 PHYSICS, MULTIDISCIPLINARY
Entropy Pub Date : 2024-11-17 DOI:10.3390/e26110985
Kieran Drury, Jim Q Smith
{"title":"Dynamic Bayesian Networks, Elicitation, and Data Embedding for Secure Environments.","authors":"Kieran Drury, Jim Q Smith","doi":"10.3390/e26110985","DOIUrl":null,"url":null,"abstract":"<p><p>Serious crime modelling typically needs to be undertaken securely behind a firewall where police knowledge and capabilities remain undisclosed. Data informing an ongoing incident are often sparse; a large proportion of relevant data only come to light after the incident culminates or after police intervene-by which point it is too late to make use of the data to aid real-time decision-making for the incident in question. Much of the data that <i>are</i> available to the police to support real-time decision-making are highly confidential and cannot be shared with academics, and are therefore missing to them. In this paper, we describe the development of a formal protocol where a graphical model is used as a framework for securely translating a base model designed by an academic team to a fully embellished model for use by a police team. We then show, for the first time, how <i>libraries</i> of these models can be built and used for real-time decision support to circumvent the challenges of data missingness seen in such a secure environment through the ability to match ongoing plots to existing models within the library.The parallel development described by this protocol ensures that any sensitive information collected by police and missing to academics remains secured behind a firewall. The protocol nevertheless guides police so that they are able to combine the typically incomplete data streams that are open source with their more sensitive information in a formal and justifiable way. We illustrate the application of this protocol by describing how a new entry-a suspected vehicle attack-can be embedded into such a police library of criminal plots.</p>","PeriodicalId":11694,"journal":{"name":"Entropy","volume":"26 11","pages":""},"PeriodicalIF":2.1000,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11592506/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Entropy","FirstCategoryId":"101","ListUrlMain":"https://doi.org/10.3390/e26110985","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"PHYSICS, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0

Abstract

Serious crime modelling typically needs to be undertaken securely behind a firewall where police knowledge and capabilities remain undisclosed. Data informing an ongoing incident are often sparse; a large proportion of relevant data only come to light after the incident culminates or after police intervene-by which point it is too late to make use of the data to aid real-time decision-making for the incident in question. Much of the data that are available to the police to support real-time decision-making are highly confidential and cannot be shared with academics, and are therefore missing to them. In this paper, we describe the development of a formal protocol where a graphical model is used as a framework for securely translating a base model designed by an academic team to a fully embellished model for use by a police team. We then show, for the first time, how libraries of these models can be built and used for real-time decision support to circumvent the challenges of data missingness seen in such a secure environment through the ability to match ongoing plots to existing models within the library.The parallel development described by this protocol ensures that any sensitive information collected by police and missing to academics remains secured behind a firewall. The protocol nevertheless guides police so that they are able to combine the typically incomplete data streams that are open source with their more sensitive information in a formal and justifiable way. We illustrate the application of this protocol by describing how a new entry-a suspected vehicle attack-can be embedded into such a police library of criminal plots.

用于安全环境的动态贝叶斯网络、诱导和数据嵌入。
重罪建模通常需要在防火墙后安全进行,警方的知识和能力不会被泄露。为正在发生的事件提供信息的数据通常很稀少;大部分相关数据只有在事件达到高潮或警方介入后才会曝光,而此时再利用这些数据来帮助对相关事件进行实时决策已为时过晚。警方可用于支持实时决策的许多数据都是高度机密的,不能与学术界共享,因此对他们来说是缺失的。在本文中,我们介绍了一个正式协议的开发过程,在该协议中,图形模型被用作一个框架,用于将学术团队设计的基础模型安全地转换为供警方团队使用的完善模型。然后,我们首次展示了如何建立这些模型库,并将其用于实时决策支持,通过将正在进行的绘图与库中的现有模型相匹配的能力,规避在这种安全环境中出现的数据缺失难题。该协议所描述的并行开发可确保警方收集的任何敏感信息以及学术界缺失的信息在防火墙后保持安全。尽管如此,该协议仍能为警方提供指导,使他们能够以正规、合理的方式将开源的典型不完整数据流与更敏感的信息结合起来。我们通过描述如何将一个新条目--疑似车辆袭击--嵌入到这样一个警方犯罪阴谋库中,来说明该协议的应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Entropy
Entropy PHYSICS, MULTIDISCIPLINARY-
CiteScore
4.90
自引率
11.10%
发文量
1580
审稿时长
21.05 days
期刊介绍: Entropy (ISSN 1099-4300), an international and interdisciplinary journal of entropy and information studies, publishes reviews, regular research papers and short notes. Our aim is to encourage scientists to publish as much as possible their theoretical and experimental details. There is no restriction on the length of the papers. If there are computation and the experiment, the details must be provided so that the results can be reproduced.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信