Abstract
Recent years have seen a dramatic increase in the use of artificial intelligence (AI) in suspicious activity recognition (SAR). To better understand the research work and recent trends in AI-based SAR, the paper carries out a bibliometric study to analyze the publications based on the recent developments and contributions of authors, publication source, country, and institutions, identifying the most productive items, and the partnership among each. The search on the Scopus database retrieved 1713 documents related to AI-based SAR. In this study, all document types from Scopus were included in the analysis. VOSviewer was used to perform coupling, cluster, and co-citation network analysis to identify research hotspots, while bibliometrix was used to generate keyword analysis, including word clouds, word dynamics, theme trends, and Sankey diagrams, to understand the evolution and future direction of the research field. This paper contributes valuable insights for researchers and audiences worldwide regarding emerging research areas.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1057%2Fs41284-023-00382-5/MediaObjects/41284_2023_382_Fig13_HTML.png)
Similar content being viewed by others
References
Aria, M., and C. Cuccurullo. 2017. Bibliometrix: An R-tool for comprehensive science map** analysis. Journal of Informetrics 11 (4): 959–975. https://doi.org/10.1016/j.joi.2017.08.007.
Borgatti, Stephen. 2002. Netdraw network visualization. http://www.analytictech.com/netdraw/netdraw.htm.
Cancinodel Castillo, C., J. Merigó Lindahl, F. Coronado Martínez, Y. Dessouky, and M. Dessouky. 2017. Forty years of computers & industrial engineering: A bibliometric analysis. Computers and Industrial Engineering. https://doi.org/10.1016/j.cie.2017.08.033.
Chen, C. 2006. CiteSpace II: detecting and visualizing emerging trends and transient patterns in scientific literature. Journal of the American Society for Information Science and Technology 57 (3): 359–377. https://doi.org/10.1002/asi.20317.
Document search - Web of Science Core Collection. https://www.webofscience.com/wos/woscc/basic-search. Accessed 18 Aug 2022.
Elsevier | An Information Analytics Company | Empowering Knowledge. https://www.elsevier.com/en-xm. Accessed 17 Aug 2022.
Guz, Alexander N., and J.J. Rushchitsky. 2009. Scopus: A system for the evaluation of scientific journals. International Applied Mechanics 45(4): 351–362
Kakadiya, Rutvik, Reuel Lemos, Sebin Mangalan, Meghna Pillai, and Sneha Nikam. 2019. AI Based Automatic Robbery/Theft Detection using Smart Surveillance in Banks. In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) 201–204.
Kim, J.S., M.G. Kim, and S.B. Pan. 2021. A study on implementation of real-time intelligent video surveillance system based on embedded module. Journal of Image and Video Processing. https://doi.org/10.1186/s13640-021-00576-0.
Nguyen, M.T., L.H. Truong, and T.T.H. Le. 2021. Video surveillance processing algorithms utilizing artificial intelligent (AI) for unmanned autonomous vehicles (UAVs). MethodsX 8: 101472. https://doi.org/10.1016/j.mex.2021.101472.
Nicholls, J., A. Kuppa, and N.-A. Le-Khac. 2021. Financial cybercrime: A comprehensive survey of deep learning approaches to tackle the evolving financial crime landscape. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3134076.
Persson, O., R. Danell, and J. Schneider. 2009. How to use bibexcel for various types of bibliometric analysis. Celebrating Scholarly Communication Studies: A Festschrift for Olle Persson at His 60th Birthday (Vol. 5, pp. 9–24).
Salamone, Francesco, Lorenzo Belussi, Cristian Currò, Ludovico Danza, Matteo Ghellere, Giulia Guazzi, Bruno Lenzi, Valentino Megale, and Italo Meroni. 2018. Application of IoT and Machine Learning techniques for the assessment of thermal comfort perception. Energy Procedia 148 (7): 98–805.
Sharma, Ochin. 2019. Deep challenges associated with deep learning. In 2019 international conference on machine learning, big data, cloud and parallel computing (COMITCon), pp. 72–75. IEEE.
"ScienceDirect.com | Science, health and medical journals, full text articles and books."https://www.sciencedirect.com/. Accessed 18 Aug 2022.
van Eck, N.J., and L. Waltman. 2010. Software survey: VOSviewer, a computer program for bibliometric map**. Scientometrics 84 (2): 523–538. https://doi.org/10.1007/s11192-009-0146-3.
Rajesh Kumar, Anand Singh Jalal, and Subhash Chand Agrawal. 2017. Suspicious human activity recognition: a review. Artificial Intelligence Review, 50: 283–339.
Verma, K., and B. Singh. 2021. Deep multi-model fusion for human activity recognition using evolutionary algorithms. International Journal of Interactive Multimedia and Artificial Intelligence. https://doi.org/10.9781/ijimai.2021.08.008.Tripathi.
Wikipedia. "Phishing." Wikipedia, The Free Encyclopedia, https://en.wikipedia.org/wiki/Phishing. Accessed 29 July 2022.
Wikipedia. Co-occurrence network. Wikipedia, The Free Encyclopedia, https://en.wikipedia.org/wiki/Co-occurrence_network. Accessed 30 Jul 2022.
"What is Suspicious Activity?" Homeland Security. Accessed July 30, 2022. https://www.dhs.gov/see-something-say-something/what-suspicious-activity.
Yu, D., Z. Xu, and H. Fujita. 2019. Bibliometric analysis on the evolution of applied intelligence. Applied Intelligence 49 (2): 449–462. https://doi.org/10.1007/s10489-018-1278-z.
Funding
The work was supported by UAE University UPAR Research Grant Program under Grants 31T122 and 12T002.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article. The authors have also no financial or proprietary interests in any material discussed in this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Trabelsi, Z., Parambil, M.M.A. A bibliometric study on recent trends in artificial intelligence-based suspicious activity recognition. Secur J 37, 399–424 (2024). https://doi.org/10.1057/s41284-023-00382-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41284-023-00382-5