<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Tool for Classi cation of Sequential Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giacomo Kahn</string-name>
          <email>giacomo.kahn@isima.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yannick Loiseau</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olivier Raynaud</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universite Clermont Auvergne, Universite Blaise Pascal</institution>
          ,
          <addr-line>BP 10448, F-63000 CLERMONT-FERRAND</addr-line>
          ,
          <country country="FR">FRANCE</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Classi cation of sequential data (data obtained from series of actions in chronological order) has many applications in security, marketing or ergonomy. In this paper, we present a tool for classi cation of sequential data. We introduce a new clean dataset of web-browsing logs, and study the case of implicit authenti cation from web-browsing. We then detail more of the functioning of the tool and some of its parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine Learning</kwd>
        <kwd>Classi cation</kwd>
        <kwd>Web Usage Mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction and related work</title>
      <p>
        Event-related data can have the form of a succession of actions or events in
chronological order. Data mining of such data has many applications in elds
such as security (intrusion detection [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]), marketing (e.g. navigation in e-commerce
hierarchy) or ergonomy (study of succession of actions in work-related
applications). Those applications require the search of some meaningful patterns in
the data. A pattern is a structure that appears with regularity in the data. It
can be an itemset, a sequence, a sub-word, an association rule... In this
context, meaningful means maximizing some metric, such as the support or the lift.
Di erent algorithms exist to mine either of those. An interesting property for
patterns is the closure. A pattern p is closed if there is no pattern p0, superset
of p and support(p) = support(p0). Formal Concept Analysis (FCA) is a
mathematical framework that deals with closed sets. Many algorithms from FCA allow
to enumerate closed sets (in the form of concepts) and there exist a number of
interesting metrics based on concept lattices such as stability or robustness of a
concept.
      </p>
      <p>The enumeration of these patterns alone is not su cient in many cases and
is only one step of a decision-making process. For example, in a context of
security, one might want to nd meaningful patterns as the rst step of classi cation
or prediction. In marketing, one might use patterns to construct groups of
consumers or to nd interesting association rules.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ], the authors introduce a tool for classi cation in the binary case, based
on positive and negative examples in concept lattices. However, by using this
binary classi er to the 1 n case (n being the number of classes), all anonymous
behaviours will be classi ed as contradictory. Other works of mining in FCA
include the mining of sequences in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and of graphs in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the authors
de ned emerging patterns as patterns appearing frequently in a class, but being
hard to nd in other classes. Confer [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] for surveys on emerging patterns. An
emerging closed-pattern classi er can be described as an extension to the 1 n
case of the binary concept lattice classi er, and can be used to predict the class
on previously unseen objects. In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], the authors present another generalisation to
n classes of the closed-set based classi er. In particular, the authors introduced
the use of the tf idf for the selection of the closed patterns.
      </p>
      <p>
        In this paper, we present a tool for classi cation of sequential data, based
on closed-patterns. This tool implements the classi er presented in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. We show
some results of our tool on a dataset of web navigation logs from more than 3000
users over a six-month period.
      </p>
      <p>This paper is organised as follow: in section 2 we explain the functioning of
the classi er and give more details about the tool and its parameters, in section 3
we show a case study and propose a clean dataset for experimentation, nally
we conclude and give some perspectives of our work.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Implementation</title>
      <p>General parameters
In this section, we describe the classi er implemented by our tool. The tool
includes a whole experimental process, from the building of transactions from
raw data to detailed results of classi cation. We mention some of the parameters
accepted by each steps.</p>
      <p>Building transactions Our tool allows us to group the data into transactions.
The transactions can be of xed size, or created with respect to a time stamp
present in the original data. In our case study, the size is xed and is equal to
10. The data le from where the transactions are built can be of arbitrary size.
Extraction of own patterns We call own patterns the patterns we believe to be
respresentative of each class. For each class, we compute the patterns that verify
some property or threshold for a given metric (e.g. support or tf idf ). With
some metrics, the space of those patterns is prunable. The number of patterns
we want to keep as well as their maximum size is a parameter. The nature of the
pattern is also a parameter: as of today, one can choose between closed itemset
or sequence. For a given class c, we denote the set of own patterns by Pc.
Pro le of a class There exist di erent ways to compute the pro le of a class.
In our tool, we chose to de ne a common vector pro le V = Sc2C Pc that is
the union of all own patterns for all classes. We then compute its numerical
components for each classes from either the support, the lift or the tf idf . This
vector allows us to embed all classes in a common space. This numerical value
can be seen as the distance from the origin of the space, in each dimensions of
the vector. For exemple, let and two classes. P = fA; B; Cg and P =
fC; D; Eg then the vector V = P [ P will have 5 component (A; B; C; D; E).
For each class c, we compute a numerical value kic for each component, giving
V
= (kA; kB; kC ; 0; 0) and V</p>
      <p>= (0; 0; kC ; kD; kE ).</p>
      <p>Pro le of an anonymous transaction This step accepts the same parameters
as the construction of the pro le of a class. We can also choose the number of
anonymous transaction that will be submitted to the classi er in the next step.
For example, in Fig. 3, the number of anonymous transactions recieved by the
classi er goes from 1 to 30.</p>
      <p>Identi cation step The goal is to guess the class corresponding to an anonymous
set of transactions. After the computation of a pro le for this anonymous set, we
compute the nearest neighbor in the common space de ned previously. The tool
implements di erent similarity functions: euclidean distance, cosine similarity,
Kulczynski measure, and Dice similarity. The heuristics gain in e ciency when
they are provided with a higher number of anonymous transactions that allows
them to construct a ner pro le for the anonymous user.</p>
      <p>Global parameters Other parameters for experimentations include the number of
runs, the verbosity level, the format of the data, the possibility to only compute
stats on the data, the use of a fuzzy approach and some parameters for binary
classi cation.</p>
      <p>Bayesian Classi er Our tool implements two smoothed Bayesian classi ers: a
traditional Bayes classi er and a pattern-based Bayes classi er. Those classi ers
allow to compare the results during the experimentations.
2.2</p>
      <p>Fuzzy approach
The inclusion of a pattern in a transaction is a binary measure. When working
with own patterns of signi cant size, this strict inclusion will often be false. We
consider a fuzzy approach for the support during the computation step of an
anonymous pro le. We will use a inclusion level instead of a binary measure.
The fuzzy support may then be computed as the average of the inclusion levels
on the set of transitions.</p>
      <p>The fuzzy inclusion level inc(P; T ) can be computed as the proportion of the
own pattern P included in the transaction T :
inc(P; T ) = jjP \ T jj
jjP jj
(1)
To adjust to di erent cases and be able to represent a wide range of inclusion,
from intersection to strict inclusion, we use a transfer function to transform
the simple level of inclusion of eq. 1. In the tool, those functions are de ned
by specifying points on a 2-dimensional space. Two points are xed, (0; 0) and
(1; 1). Some transfer functions are illustrated in Fig. 1.</p>
      <p>Intersection
0:5
1
0
1
0:5
0
0
0
0:5
Ratio
0:5
1
1</p>
      <p>The coordinates of the two points that de ne the transfer function are con
guration parameters. In Fig. 1, the parameters for the inclusion are [(1; 0); (1; 0)].
This is equivalent to the binary measure of inclusion. For the intersection, the
parameters are [(0; 1); (0; 1)]. Those parameters mean the measure is equal to one
as soon as the intersection is not empty. For the simple ratio or a more sigmoidal
function, the parameters are resp. [(0; 0); (1; 1)] and [(0:25; 0); (0:75; 1)].
The parameters are given to the tool by a con guration le in .yml format. For
the results of our case study, presented in Table 2, the le is presented in Fig. 2.</p>
      <p>With this le as argument, the tool will recieve from 1 to 30 anonymous
transactions, and run 10 executions. The random seed can be xed to reproduce
experimentations. The data comes from the directory Data/150users, and is in
csv format. The transactions are built of xed size 10. The identi cation method
is H1 (closed itemsets and tf idf metric), with at most 40 own closed-patterns
of maximum size 5. The similarity measure used is Kulczynski. The pro ler is
the metric used to compute the numerical coordinate of the common vector.
When not speci ed, the method used for inclusion of the pattern is the strict
inclusion.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Case study</title>
      <p>
        Our case study is about implicit identi cation in web-browsing. Implicit identi
cation is studied in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and in a web-browsing context in [11{14]. The challenge
--name : H1 on csv data
verbose - level : WARNING
number -of - categories : [150]
anonymous - transactions - sizes : [
        <xref ref-type="bibr" rid="ref1 ref10 ref2 ref5">1 , 2, 5, 10 , 20 , 30</xref>
        ]
nb - runs : 10
random - seed : 0
data :
source : Data /150 users
format : csv - normal
transaction - size : 10
identification - methods :
- type : Closed
name : H1
closed - method : Charm
weight : TfIdf
max - pattern - size : 5
max - own - patterns : 40
distance : Kulczynski
profiler : Support
is to recognise a user amongst n. The classi er has to guess the corresponding
user from an anonymous behaviour. If it fails to recognise the declared user, then
the identity is not con rmed. In a security context, this situation can lead to
restrictions in the system, or to the request of some explicit means of identi
cation. The parameters used in this study are detailed in the con guration le of
Fig. 2.
3.1
      </p>
      <p>Data description
Our data comes from Blaise Pascal university proxy servers. It consists of 17 106
lines of connection logs from more than 3, 000 users and contains the user ID,
the time stamp and a domain name for each line. We applied two types of lters
on the domain names: blacklist lters and HTTP-request based lters. We used
some lists3 of domain names to remove all domains regarded as advertising. We
also ltered the data by the status code obtained after a simple HTTP request
on the domain name. After those steps, we still have 4 106 lines. We divide
the le between the 3K users to obtain the class les. This dataset is available
at http://fc.isima.fr/ kahngi/cez13.zip. The studies were conducted on the 150
users with the higher number of requests.
3 http://winhelp2002.mvps.org/hosts.htm and https://pgl.yoyo.org/as.</p>
      <p>
        Some information about the data is available in Table 1. The table shows
some statistics from before preprocessing and after the lters were applied.
#U sers represent the number of users, #Sites represents the cardinal of the
whole set of websites for all users and Avg#lines/user is the average number of
line per user. We can see that the number of users decreases because some users
did not have a single line after the lters. Roughly 40% of the websites were
deleted by the lters, and the average number of lines by user was divided by 5.
Our tool implements several heuristics. H0 considers frequent 1-patterns with
the best support, H0Lif t considers frequent 1-patterns with the best lift, H1
considers closed k-patterns with the best tf idf , and B is a smoothed Bayes
classi er. The tf idf is a metric that comes from information retrieval and text
mining. It is the product of term frequency and inverse document frequency. It
re ects how discriminating a pattern is for a given class. The experiments in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
show that tf idf produces better results than the lift or the support.
      </p>
      <p>Figure 3 shows the kind of results that can be obtained with our tool. The
abscissa is the number of anonymous transactions given to the classi er and
the ordinate the accuracy of the di erent heuristics. The dataset is divided as
follows: 32 of learning base for the learning step and 13 for the identi cation step.
The division is random. Each test session consists of multiple runs of both those
steps. That allows us to smooth the results by using the average accuracy.</p>
      <p>The table generated by our tool contains 15 columns. Those include the
number of classes NC , the number of anonymous transactions recieved A, the method
used, the average accuracy, the average number of transactions successfully and
0.8
y
c
rau 0.6
c
c
a
e
g
reav 0.4
A
0.2
not successfully classi ed, the ratio of classi ed and not classi ed tests, and the
run time in second. TC represents the ratio of classi ed tests. All this
information allows the analysis of various aspects of the result. Some are presented in
Table 2.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and perspectives</title>
      <p>We presented a tool for classi cation of sequential data. It includes a lot of
features in the construction of the transactions, and di erent parameters and
heuristics for classi cation. The tool is exible and adaptable to many contexts
of classi cation and types of data.</p>
      <p>
        The perspectives of our work are to add others means of classi cation based
on other types of patterns (such as closed-sequences, pattern structures, or class
association rules), and other types of metrics (for example structural metrics
such as stability). We are also considering the use of aggregation functions other
than the average for fuzzy support, such as ordered weighted averaging (OWA)
operators [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ], or some power-means. Moreover, we are considering the
integration of di erent paradigms of user pro les. Another way to construct the
pro le of a class is using association rules. Class association rules are association
rules of the form A ! C where C is a class and A a subset of items. They
are studied in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. By attributing scores to the rules and searching for the
premisses of the rule in an anonymous transaction, we could classify the anonymous
transaction in a given class.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgement</title>
      <p>This research was partially supported by the European Union's \Fonds Europeen
de Developpement Regional (FEDER)" program.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Azkia</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuppens-Boulahia</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuppens</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coatrieux</surname>
          </string-name>
          , G.:
          <article-title>Log content extraction engine based on ontology for the purpose of a posteriori access control</article-title>
          .
          <source>IJKL</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          /2) (
          <year>2014</year>
          )
          <volume>23</volume>
          {
          <fpage>42</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>Complexity of learning in concept lattices from positive and negative examples</article-title>
          .
          <source>Discrete Applied Mathematics</source>
          <volume>142</volume>
          (
          <issue>1-3</issue>
          ) (
          <year>2004</year>
          )
          <volume>111</volume>
          {
          <fpage>125</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.:</given-names>
          </string-name>
          <article-title>Machine learning and formal concept analysis</article-title>
          .
          <source>In: Concept Lattices</source>
          , Second International Conference on Formal Concept Analysis,
          <source>ICFCA</source>
          <year>2004</year>
          , Sydney, Australia,
          <source>February 23-26</source>
          ,
          <year>2004</year>
          , Proceedings. (
          <year>2004</year>
          )
          <volume>287</volume>
          {
          <fpage>312</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Buzmakov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Egho</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jay</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Rassi, C.:
          <article-title>On mining complex sequential data by means of FCA and pattern structures</article-title>
          .
          <source>Int. J. General Systems</source>
          <volume>45</volume>
          (
          <issue>2</issue>
          ) (
          <year>2016</year>
          )
          <volume>135</volume>
          {
          <fpage>159</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>Learning of simple conceptual graphs from positive and negative examples</article-title>
          .
          <source>In: Principles of Data Mining and Knowledge Discovery, Third European Conference, PKDD '99</source>
          , Prague, Czech Republic,
          <source>September 15-18</source>
          ,
          <year>1999</year>
          , Proceedings. (
          <year>1999</year>
          )
          <volume>384</volume>
          {
          <fpage>391</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ramamohanarao</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fan</surname>
          </string-name>
          , H.:
          <article-title>Patterns based classi ers</article-title>
          .
          <source>World Wide Web (1)</source>
          (
          <year>2007</year>
          )
          <volume>71</volume>
          {
          <fpage>83</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Novak</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrac</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Webb</surname>
            ,
            <given-names>G.I.</given-names>
          </string-name>
          :
          <article-title>Supervised descriptive rule discovery: A unifying survey of contrast set, emerging pattern and subgroup mining</article-title>
          .
          <source>Journal of Machine Learning Research</source>
          <volume>10</volume>
          (
          <year>2009</year>
          )
          <volume>377</volume>
          {
          <fpage>403</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Garc</surname>
            a-Borroto,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trinidad</surname>
            ,
            <given-names>J.F.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carrasco-Ochoa</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          :
          <article-title>A survey of emerging patterns for supervised classi cation</article-title>
          .
          <source>Artif. Intell. Rev</source>
          .
          <volume>42</volume>
          (
          <issue>4</issue>
          ) (
          <year>2014</year>
          )
          <volume>705</volume>
          {
          <fpage>721</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Coupelon</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dia</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labernia</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loiseau</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raynaud</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Using closed itemsets for implicit user authentication in web browsing</article-title>
          .
          <source>In: Proceedings of the Eleventh International Conference on Concept Lattices and Their Applications</source>
          , Kosice, Slovakia, October 7-
          <issue>10</issue>
          ,
          <year>2014</year>
          . (
          <year>2014</year>
          )
          <volume>131</volume>
          {
          <fpage>144</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jakobsson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chow</surname>
          </string-name>
          , R.:
          <article-title>Implicit authentication through learning user behavior</article-title>
          .
          <source>In: Information Security - 13th International Conference, ISC</source>
          <year>2010</year>
          ,
          <string-name>
            <surname>Boca</surname>
            <given-names>Raton</given-names>
          </string-name>
          , FL, USA, October
          <volume>25</volume>
          -
          <issue>28</issue>
          ,
          <year>2010</year>
          , Revised Selected Papers. (
          <year>2010</year>
          )
          <volume>99</volume>
          {
          <fpage>113</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tomkins</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A characterization of online browsing behavior</article-title>
          .
          <source>In: Proceedings of the 19th International Conference on World Wide Web, WWW</source>
          <year>2010</year>
          , Raleigh, North Carolina, USA, April
          <volume>26</volume>
          -
          <issue>30</issue>
          ,
          <year>2010</year>
          . (
          <year>2010</year>
          )
          <volume>561</volume>
          {
          <fpage>570</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Y.C.</given-names>
          </string-name>
          :
          <article-title>Web user behavioral pro ling for user identi cation</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>49</volume>
          (
          <issue>3</issue>
          ) (
          <year>2010</year>
          )
          <volume>261</volume>
          {
          <fpage>271</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Goel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofman</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirer</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          :
          <article-title>Who does what on the web: A large-scale study of browsing behavior</article-title>
          .
          <source>In: Proceedings of the Sixth International Conference on Weblogs and Social Media</source>
          , Dublin, Ireland, June 4-7,
          <year>2012</year>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Abramson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aha</surname>
            ,
            <given-names>D.W.:</given-names>
          </string-name>
          <article-title>User authentication from web browsing behavior</article-title>
          .
          <source>In: Proceedings of the Twenty-Sixth International Florida Arti cial Intelligence Research Society Conference, FLAIRS</source>
          <year>2013</year>
          ,
          <article-title>St</article-title>
          . Pete Beach,
          <source>Florida. May 22-24</source>
          ,
          <year>2013</year>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Yager</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          :
          <source>Families of OWA operators</source>
          .
          <volume>59</volume>
          (
          <year>1993</year>
          )
          <volume>125</volume>
          {
          <fpage>148</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Yager</surname>
            ,
            <given-names>R.R.:</given-names>
          </string-name>
          <article-title>Constraint satisfaction using soft quanti ers</article-title>
          .
          <source>International Journal of Intelligent Systems in Accounting and Finance Management</source>
          <volume>12</volume>
          (
          <issue>3</issue>
          ) (
          <year>2004</year>
          )
          <volume>177</volume>
          {
          <fpage>186</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hsu</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Ma, Y.:
          <article-title>Integrating classi cation and association rule mining</article-title>
          .
          <source>In: Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98)</source>
          , New York City, New York, USA,
          <year>August</year>
          27-
          <issue>31</issue>
          ,
          <year>1998</year>
          . (
          <year>1998</year>
          )
          <volume>80</volume>
          {
          <fpage>86</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>