References
- W. Lee, S. Stolfo, and K. Mok, 'A Data Mining Framework for Building Intrusion Detection Models,' In Proceedings of IEEE Symposium on Security and Privacy, pp. 120-132, 1999 https://doi.org/10.1109/SECPRI.1999.766909
- S. Song, Z. Huang, H. Hu, and S. Jin, 'A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection,' In Proceedings of International Workshop on Information Security and Survivability for Grid, pp. 458-465, 2004
- Y. Hu and B. Panda, 'A Data Mining Approach for Database Intrusion Detection,' In Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 711-716, 2004 https://doi.org/10.1145/967900.968048
- P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P. Tan, 'Data Mining for Network Intrusion Detection,' In Proceedings of NSF Workshop on Next Generation Data Mining, pp. 73-81, 2002
- J. Luo and S. Bridges, 'Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection,' International Journal of Intelligent Systems, Vol. 15, No.8, pp. 687-704, 2000 https://doi.org/10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X
- C. Clifton and D. Marks, 'Security and Privacy Implication of Data Mining,' In Proceedings of the 1996 ACM Workshop on Data Mining and Knowledge Discovery, pp. 15-19, 1996
- S. Rizvi and J. Haritsa, 'Maintaining Data Privacy in Association Rule Mining,' In Proceedings of the 28th Conference on Very Large Data Base, pp. 682-693, 2002
- R. Agrawal and R. Srikant, 'Privacy-Preserving Data Mining,' In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp, 439-450, 2000 https://doi.org/10.1145/342009.335438
- A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke 'Privacy Preserving Mining of Association Rules,' In Proceedings of the 2002 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217-228, 2002 https://doi.org/10.1145/775047.775080
- M. Kantarcioglu and C. Clifton, 'Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data,' In Proceedings of the 2002 ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, pp. 24-31, 2002
- J. Zhan, L. Chang, and S. Matwin, 'Privacy-Preserving Collaborative Sequential Pattern Mining,' In Proceedings of Workshop on Link Analysis, Counter-terrorism and Privacy in conjunction with SIAM International Conference on Data Mining, pp. 61-72, 2004
- R. Agrawal and R. Srikant, 'Mining Sequential Patterns,' In Proceedings of the 11th International Conference on Data Engineering, pp. 3-14, 1995 https://doi.org/10.1109/ICDE.1995.380415
- R. Srikant and R. Agrawal, 'Mining Sequential Patterns: Generalizations and performance improvements,' In Proceedings of the 5th International Conference on Extending Database Technology, pp. 3-17, 1996
- J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, and M. Hsu, 'FreeSpan: Frequent pattern-projected sequential pattern mining,' In Proceedings of the 6th International Conference on Knowledge Discovery and Data Mining, pp. 355-359, 2000 https://doi.org/10.1145/347090.347167
- J. Pei, J. Han, B. Mortazavi-Asl, J. Wang, H. Pinto, Q. Chen, U. Dayal, and M. Hsu, 'Mining Sequential Patterns by Pattern-growth: The PrefixSpan Approach,' IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 11, pp. 1424-1440, 2004 https://doi.org/10.1109/TKDE.2004.77
- H. Kum, J. Pei, W. Wang, and D. Duncan, 'ApproxMAP: Approximate Mining of Consensus Sequential Patterns,' In Proceedings of the 3rd SIAM International Conference on Data Mining, pp, 311-315, 2003
- M. Garofalakis, R. Rastogi, and K. Shim, 'SPIRIT: Sequential Pattern Mining with Regular Expression Constraints,' In Proceedings of 25th International Conference on Very Large Data Bases Conference, pp. 223-234, 1999
- J. Pei, J. Han, and W. Wang, 'Mining Sequential Patterns with Constraints in Large Databases,' In Proceedings of the 11th Conference on Information and Knowledge Management, pp. 18-25, 2002 https://doi.org/10.1145/584792.584799
- F. Masseglia, P. Poncelet, and M. Teisseire, 'Incremental Mining of Sequential Patterns in Large Databases,' Data and Knowledge Engineering, Vol. 46, Issue 1, pp. 97-121, 2003 https://doi.org/10.1016/S0169-023X(02)00209-4
- R. Agrawal, R. Srikant, and D. Thomas, 'Privacy Preserving OLAF,' In Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 251-262, 2005 https://doi.org/10.1145/1066157.1066187