<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Tool for Classification of Sequential Data</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Giacomo</forename><surname>Kahn</surname></persName>
							<email>giacomo.kahn@isima.fr</email>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Clermont Auvergne</orgName>
								<orgName type="institution" key="instit2">Université Blaise Pascal</orgName>
								<address>
									<addrLine>BP 10448</addrLine>
									<postCode>F-63000</postCode>
									<settlement>CLERMONT-FERRAND</settlement>
									<country key="FR">FRANCE</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yannick</forename><surname>Loiseau</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Clermont Auvergne</orgName>
								<orgName type="institution" key="instit2">Université Blaise Pascal</orgName>
								<address>
									<addrLine>BP 10448</addrLine>
									<postCode>F-63000</postCode>
									<settlement>CLERMONT-FERRAND</settlement>
									<country key="FR">FRANCE</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="laboratory">UMR 6158</orgName>
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">LIMOS</orgName>
								<address>
									<postCode>F-63178</postCode>
									<settlement>AUBIERE</settlement>
									<country key="FR">FRANCE</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olivier</forename><surname>Raynaud</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">Université Clermont Auvergne</orgName>
								<orgName type="institution" key="instit2">Université Blaise Pascal</orgName>
								<address>
									<addrLine>BP 10448</addrLine>
									<postCode>F-63000</postCode>
									<settlement>CLERMONT-FERRAND</settlement>
									<country key="FR">FRANCE</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="laboratory">UMR 6158</orgName>
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">LIMOS</orgName>
								<address>
									<postCode>F-63178</postCode>
									<settlement>AUBIERE</settlement>
									<country key="FR">FRANCE</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Tool for Classification of Sequential Data</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0F538E27D7971B6CDFFA07518DDC0BB0</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T05:38+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Machine Learning</term>
					<term>Classification</term>
					<term>Web Usage Mining</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Classification of sequential data (data obtained from series of actions in chronological order) has many applications in security, marketing or ergonomy. In this paper, we present a tool for classification of sequential data. We introduce a new clean dataset of web-browsing logs, and study the case of implicit authentification from web-browsing. We then detail more of the functioning of the tool and some of its parameters.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction and related work</head><p>Event-related data can have the form of a succession of actions or events in chronological order. Data mining of such data has many applications in fields such as security (intrusion detection <ref type="bibr" target="#b0">[1]</ref>), marketing (e.g. navigation in e-commerce hierarchy) or ergonomy (study of succession of actions in work-related applications). Those applications require the search of some meaningful patterns in the data. A pattern is a structure that appears with regularity in the data. It can be an itemset, a sequence, a sub-word, an association rule... In this context, meaningful means maximizing some metric, such as the support or the lift. Different algorithms exist to mine either of those. An interesting property for patterns is the closure. A pattern p is closed if there is no pattern p , superset of p and support(p) = support(p ). Formal Concept Analysis (FCA) is a mathematical framework that deals with closed sets. Many algorithms from FCA allow to enumerate closed sets (in the form of concepts) and there exist a number of interesting metrics based on concept lattices such as stability or robustness of a concept.</p><p>The enumeration of these patterns alone is not sufficient in many cases and is only one step of a decision-making process. For example, in a context of security, one might want to find meaningful patterns as the first step of classification or prediction. In marketing, one might use patterns to construct groups of consumers or to find interesting association rules.</p><p>In <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>, the authors introduce a tool for classification in the binary case, based on positive and negative examples in concept lattices. However, by using this binary classifier to the 1 − n case (n being the number of classes), all anonymous behaviours will be classified as contradictory. Other works of mining in FCA include the mining of sequences in <ref type="bibr" target="#b3">[4]</ref> and of graphs in <ref type="bibr" target="#b4">[5]</ref>. In <ref type="bibr" target="#b5">[6]</ref>, the authors defined emerging patterns as patterns appearing frequently in a class, but being hard to find in other classes. Confer <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref> for surveys on emerging patterns. An emerging closed-pattern classifier can be described as an extension to the 1 − n case of the binary concept lattice classifier, and can be used to predict the class on previously unseen objects. In <ref type="bibr" target="#b8">[9]</ref>, the authors present another generalisation to n classes of the closed-set based classifier. In particular, the authors introduced the use of the tf × idf for the selection of the closed patterns.</p><p>In this paper, we present a tool for classification of sequential data, based on closed-patterns. This tool implements the classifier presented in <ref type="bibr" target="#b8">[9]</ref>. We show some results of our tool on a dataset of web navigation logs from more than 3000 users over a six-month period.</p><p>This paper is organised as follow: in section 2 we explain the functioning of the classifier and give more details about the tool and its parameters, in section 3 we show a case study and propose a clean dataset for experimentation, finally we conclude and give some perspectives of our work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Implementation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">General parameters</head><p>In this section, we describe the classifier implemented by our tool. The tool includes a whole experimental process, from the building of transactions from raw data to detailed results of classification. We mention some of the parameters accepted by each steps.</p><p>Building transactions Our tool allows us to group the data into transactions. The transactions can be of fixed size, or created with respect to a time stamp present in the original data. In our case study, the size is fixed and is equal to 10. The data file from where the transactions are built can be of arbitrary size.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Extraction of own patterns</head><p>We call own patterns the patterns we believe to be respresentative of each class. For each class, we compute the patterns that verify some property or threshold for a given metric (e.g. support or tf × idf ). With some metrics, the space of those patterns is prunable. The number of patterns we want to keep as well as their maximum size is a parameter. The nature of the pattern is also a parameter: as of today, one can choose between closed itemset or sequence. For a given class c, we denote the set of own patterns by P c .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Profile of a class</head><p>There exist different ways to compute the profile of a class. In our tool, we chose to define a common vector profile V = c∈C P c that is the union of all own patterns for all classes. We then compute its numerical components for each classes from either the support, the lift or the tf × idf . This vector allows us to embed all classes in a common space. This numerical value can be seen as the distance from the origin of the space, in each dimensions of the vector. For exemple, let α and β two classes. P α = {A, B, C} and P β = {C, D, E} then the vector V = P α ∪ P β will have 5 component (A, B, C, D, E). For each class c, we compute a numerical value k c i for each component, giving</p><formula xml:id="formula_0">V α = (k α A , k α B , k α C , 0, 0) and V β = (0, 0, k β C , k β D , k β E ).</formula><p>Profile of an anonymous transaction This step accepts the same parameters as the construction of the profile of a class. We can also choose the number of anonymous transaction that will be submitted to the classifier in the next step. For example, in Fig. <ref type="figure" target="#fig_2">3</ref>, the number of anonymous transactions recieved by the classifier goes from 1 to 30.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Identification step</head><p>The goal is to guess the class corresponding to an anonymous set of transactions. After the computation of a profile for this anonymous set, we compute the nearest neighbor in the common space defined previously. The tool implements different similarity functions: euclidean distance, cosine similarity, Kulczynski measure, and Dice similarity. The heuristics gain in efficiency when they are provided with a higher number of anonymous transactions that allows them to construct a finer profile for the anonymous user.</p><p>Global parameters Other parameters for experimentations include the number of runs, the verbosity level, the format of the data, the possibility to only compute stats on the data, the use of a fuzzy approach and some parameters for binary classification.</p><p>Bayesian Classifier Our tool implements two smoothed Bayesian classifiers: a traditional Bayes classifier and a pattern-based Bayes classifier. Those classifiers allow to compare the results during the experimentations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Fuzzy approach</head><p>The inclusion of a pattern in a transaction is a binary measure. When working with own patterns of significant size, this strict inclusion will often be false. We consider a fuzzy approach for the support during the computation step of an anonymous profile. We will use a inclusion level instead of a binary measure. The fuzzy support may then be computed as the average of the inclusion levels on the set of transitions. The fuzzy inclusion level inc(P, T ) can be computed as the proportion of the own pattern P included in the transaction T :</p><formula xml:id="formula_1">inc(P, T ) = ||P ∩ T || ||P ||<label>(1)</label></formula><p>To adjust to different cases and be able to represent a wide range of inclusion, from intersection to strict inclusion, we use a transfer function to transform the simple level of inclusion of eq. 1. In the tool, those functions are defined by specifying points on a 2-dimensional space. Two points are fixed, (0, 0) and (1, 1). Some transfer functions are illustrated in Fig. <ref type="figure" target="#fig_0">1</ref>. The coordinates of the two points that define the transfer function are configuration parameters. In Fig. <ref type="figure" target="#fig_0">1</ref>, the parameters for the inclusion are [(1, 0); <ref type="bibr" target="#b0">(1,</ref><ref type="bibr">0)</ref>]. This is equivalent to the binary measure of inclusion. For the intersection, the parameters are [(0, 1); (0, 1)]. Those parameters mean the measure is equal to one as soon as the intersection is not empty. For the simple ratio or a more sigmoidal function, the parameters are resp. [(0, 0); (1, 1)] and [(0.25, 0); (0.75, 1)].</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Configuration file</head><p>The parameters are given to the tool by a configuration file in .yml format. For the results of our case study, presented in Table <ref type="table" target="#tab_1">2</ref>, the file is presented in Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>With this file as argument, the tool will recieve from 1 to 30 anonymous transactions, and run 10 executions. The random seed can be fixed to reproduce experimentations. The data comes from the directory Data/150users, and is in csv format. The transactions are built of fixed size 10. The identification method is H 1 (closed itemsets and tf × idf metric), with at most 40 own closed-patterns of maximum size 5. The similarity measure used is Kulczynski. The profiler is the metric used to compute the numerical coordinate of the common vector. When not specified, the method used for inclusion of the pattern is the strict inclusion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Case study</head><p>Our case study is about implicit identification in web-browsing. Implicit identification is studied in <ref type="bibr" target="#b9">[10]</ref> and in a web-browsing context in <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>. The challenge is to recognise a user amongst n. The classifier has to guess the corresponding user from an anonymous behaviour. If it fails to recognise the declared user, then the identity is not confirmed. In a security context, this situation can lead to restrictions in the system, or to the request of some explicit means of identification. The parameters used in this study are detailed in the configuration file of Fig. <ref type="figure" target="#fig_1">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Data description</head><p>Our data comes from Blaise Pascal university proxy servers. It consists of 17×10 6 lines of connection logs from more than 3, 000 users and contains the user ID, the time stamp and a domain name for each line. We applied two types of filters on the domain names: blacklist filters and HTTP-request based filters. We used some lists<ref type="foot" target="#foot_0">3</ref> of domain names to remove all domains regarded as advertising. We also filtered the data by the status code obtained after a simple HTTP request on the domain name. After those steps, we still have 4 × 10 6 lines. We divide the file between the 3K users to obtain the class files. This dataset is available at http://fc.isima.fr/∼kahngi/cez13.zip. The studies were conducted on the 150 users with the higher number of requests.</p><p>Some information about the data is available in Table <ref type="table" target="#tab_0">1</ref>. The table shows some statistics from before preprocessing and after the filters were applied. #U sers represent the number of users, #Sites represents the cardinal of the whole set of websites for all users and Avg#lines/user is the average number of line per user. We can see that the number of users decreases because some users did not have a single line after the filters. Roughly 40% of the websites were deleted by the filters, and the average number of lines by user was divided by 5.  <ref type="bibr" target="#b8">[9]</ref> show that tf × idf produces better results than the lift or the support. Figure <ref type="figure" target="#fig_2">3</ref> shows the kind of results that can be obtained with our tool. The abscissa is the number of anonymous transactions given to the classifier and the ordinate the accuracy of the different heuristics. The dataset is divided as follows: 2  3 of learning base for the learning step and 1 3 for the identification step. The division is random. Each test session consists of multiple runs of both those steps. That allows us to smooth the results by using the average accuracy. The table generated by our tool contains 15 columns. Those include the number of classes N C , the number of anonymous transactions recieved A, the method used, the average accuracy, the average number of transactions successfully and not successfully classified, the ratio of classified and not classified tests, and the run time in second. T C represents the ratio of classified tests. All this information allows the analysis of various aspects of the result. Some are presented in Table <ref type="table" target="#tab_1">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion and perspectives</head><p>We presented a tool for classification of sequential data. It includes a lot of features in the construction of the transactions, and different parameters and heuristics for classification. The tool is flexible and adaptable to many contexts of classification and types of data. The perspectives of our work are to add others means of classification based on other types of patterns (such as closed-sequences, pattern structures, or class association rules), and other types of metrics (for example structural metrics such as stability). We are also considering the use of aggregation functions other than the average for fuzzy support, such as ordered weighted averaging (OWA) operators <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>, or some power-means. Moreover, we are considering the integration of different paradigms of user profiles. Another way to construct the profile of a class is using association rules. Class association rules are association rules of the form A → C where C is a class and A a subset of items. They are studied in <ref type="bibr" target="#b16">[17]</ref>. By attributing scores to the rules and searching for the premisses of the rule in an anonymous transaction, we could classify the anonymous transaction in a given class.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Different transfer functions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Configuration file for the case study</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Average accuracy of the different heuristics as a function of the number of anonymous transactions recieved by the classifier.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Descriptive statistics of the datasetOur tool implements several heuristics. H 0 considers frequent 1-patterns with the best support, H 0 Lif t considers frequent 1-patterns with the best lift, H 1 considers closed k-patterns with the best tf × idf , and B is a smoothed Bayes classifier. The tf × idf is a metric that comes from information retrieval and text mining. It is the product of term frequency and inverse document frequency. It reflects how discriminating a pattern is for a given class. The experiments in</figDesc><table><row><cell cols="3">#U sers #Sites Avg#lines/user</cell></row><row><cell>Raw Data</cell><cell>3388 96184</cell><cell>5082</cell></row><row><cell cols="2">After preprocessing 3370 57654</cell><cell>1145</cell></row><row><cell>3.2 Experimental parameters</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Output of the tool</figDesc><table><row><cell cols="5">NC A Method Avg accuracy Min accuracy Max accuracy TC</cell></row><row><cell>150 1</cell><cell>H1 0.31266</cell><cell>0.30213</cell><cell>0.32118</cell><cell>75.796%</cell></row><row><cell>150 2</cell><cell>H1 0.34378</cell><cell>0.32827</cell><cell>0.35666</cell><cell>93.335%</cell></row><row><cell>150 5</cell><cell>H1 0.46909</cell><cell>0.4505</cell><cell>0.48996</cell><cell>99.676%</cell></row><row><cell cols="2">150 10 H1 0.67352</cell><cell>0.63714</cell><cell>0.69905</cell><cell>100%</cell></row><row><cell cols="2">150 20 H1 0.87778</cell><cell>0.85111</cell><cell>0.92</cell><cell>100%</cell></row><row><cell cols="2">150 30 H1 0.94833</cell><cell>0.92333</cell><cell>0.96333</cell><cell>100%</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_0">http://winhelp2002.mvps.org/hosts.htm and https://pgl.yoyo.org/as.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgement</head><p>This research was partially supported by the European Union's "Fonds Européen de Développement Régional (FEDER)" program.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Log content extraction engine based on ontology for the purpose of a posteriori access control</title>
		<author>
			<persName><forename type="first">H</forename><surname>Azkia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Cuppens-Boulahia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cuppens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Coatrieux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IJKL</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1/</biblScope>
			<biblScope unit="page" from="23" to="42" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Complexity of learning in concept lattices from positive and negative examples</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">142</biblScope>
			<biblScope unit="issue">1-3</biblScope>
			<biblScope unit="page" from="111" to="125" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Machine learning and formal concept analysis</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Concept Lattices, Second International Conference on Formal Concept Analysis, ICFCA 2004</title>
				<meeting><address><addrLine>Sydney, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">February 23-26, 2004. 2004</date>
			<biblScope unit="page" from="287" to="312" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">On mining complex sequential data by means of FCA and pattern structures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Buzmakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Egho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Napoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Raïssi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. General Systems</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="135" to="159" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Learning of simple conceptual graphs from positive and negative examples</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Kuznetsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Principles of Data Mining and Knowledge Discovery, Third European Conference, PKDD &apos;99</title>
				<meeting><address><addrLine>Prague, Czech Republic</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999">September 15-18, 1999. 1999</date>
			<biblScope unit="page" from="384" to="391" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Patterns based classifiers</title>
		<author>
			<persName><forename type="first">K</forename><surname>Ramamohanarao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Fan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">World Wide Web</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="71" to="83" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Supervised descriptive rule discovery: A unifying survey of contrast set, emerging pattern and subgroup mining</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Novak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lavrac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">I</forename><surname>Webb</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Machine Learning Research</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="377" to="403" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A survey of emerging patterns for supervised classification</title>
		<author>
			<persName><forename type="first">M</forename><surname>García-Borroto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F M</forename><surname>Trinidad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Carrasco-Ochoa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artif. Intell. Rev</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="705" to="721" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Using closed itemsets for implicit user authentication in web browsing</title>
		<author>
			<persName><forename type="first">O</forename><surname>Coupelon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Dia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Labernia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Loiseau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Raynaud</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Eleventh International Conference on Concept Lattices and Their Applications</title>
				<meeting>the Eleventh International Conference on Concept Lattices and Their Applications<address><addrLine>Košice, Slovakia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">October 7-10, 2014. 2014</date>
			<biblScope unit="page" from="131" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Implicit authentication through learning user behavior</title>
		<author>
			<persName><forename type="first">E</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jakobsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Chow</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Security -13th International Conference, ISC 2010</title>
				<meeting><address><addrLine>Boca Raton, FL, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">October 25-28, 2010. 2010</date>
			<biblScope unit="page" from="99" to="113" />
		</imprint>
	</monogr>
	<note>Revised Selected Papers</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A characterization of online browsing behavior</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tomkins</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 19th International Conference on World Wide Web, WWW 2010</title>
				<meeting>the 19th International Conference on World Wide Web, WWW 2010<address><addrLine>Raleigh, North Carolina, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">April 26-30, 2010. 2010</date>
			<biblScope unit="page" from="561" to="570" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Web user behavioral profiling for user identification</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">C</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="261" to="271" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Who does what on the web: A large-scale study of browsing behavior</title>
		<author>
			<persName><forename type="first">S</forename><surname>Goel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Hofman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Sirer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Sixth International Conference on Weblogs and Social Media</title>
				<meeting>the Sixth International Conference on Weblogs and Social Media<address><addrLine>Dublin, Ireland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">June 4-7, 2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">User authentication from web browsing behavior</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abramson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Aha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2013</title>
				<meeting>the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2013<address><addrLine>St. Pete Beach, Florida</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">May 22-24, 2013. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Families of OWA operators</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Yager</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="page" from="125" to="148" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Constraint satisfaction using soft quantifiers</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Yager</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Intelligent Systems in Accounting and Finance Management</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="177" to="186" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Integrating classification and association rule mining</title>
		<author>
			<persName><forename type="first">B</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98)</title>
				<meeting>the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98)<address><addrLine>New York City, New York, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1998">August 27-31, 1998. 1998</date>
			<biblScope unit="page" from="80" to="86" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
