Chuandong Lv, Yang Yang, Qiyue Sun, Bin Zhou, Peng Xu
{"title":"基于操作日志的监控人员行为分析技术","authors":"Chuandong Lv, Yang Yang, Qiyue Sun, Bin Zhou, Peng Xu","doi":"10.1109/IMCEC51613.2021.9482033","DOIUrl":null,"url":null,"abstract":"A large number of operation logs will be generated when surveillance personnel open surveillance video and based on these operation logs, this paper studies the behavior visualization, automatic anomaly detection and abnormal behavior analysis of the surveillance personnel by using data mining, machine learning and other methods. Using the above methods and research, this paper can mine valuable information from the operation log, which can help the surveillance personnel to realize behavior visualization and find abnormal behavior problems during the work, thus effectively avoid the occurrence of security incidents caused by improper operation of the surveillance personnel, and reduce the potential risks in the surveillance process.","PeriodicalId":240400,"journal":{"name":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Surveillance Personnel Behavior Analysis Technology based on Operation Log\",\"authors\":\"Chuandong Lv, Yang Yang, Qiyue Sun, Bin Zhou, Peng Xu\",\"doi\":\"10.1109/IMCEC51613.2021.9482033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A large number of operation logs will be generated when surveillance personnel open surveillance video and based on these operation logs, this paper studies the behavior visualization, automatic anomaly detection and abnormal behavior analysis of the surveillance personnel by using data mining, machine learning and other methods. Using the above methods and research, this paper can mine valuable information from the operation log, which can help the surveillance personnel to realize behavior visualization and find abnormal behavior problems during the work, thus effectively avoid the occurrence of security incidents caused by improper operation of the surveillance personnel, and reduce the potential risks in the surveillance process.\",\"PeriodicalId\":240400,\"journal\":{\"name\":\"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMCEC51613.2021.9482033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCEC51613.2021.9482033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Surveillance Personnel Behavior Analysis Technology based on Operation Log
A large number of operation logs will be generated when surveillance personnel open surveillance video and based on these operation logs, this paper studies the behavior visualization, automatic anomaly detection and abnormal behavior analysis of the surveillance personnel by using data mining, machine learning and other methods. Using the above methods and research, this paper can mine valuable information from the operation log, which can help the surveillance personnel to realize behavior visualization and find abnormal behavior problems during the work, thus effectively avoid the occurrence of security incidents caused by improper operation of the surveillance personnel, and reduce the potential risks in the surveillance process.