On evaluating interestingness measures for closed itemsets, 7th European Starting AI Researcher Symposium (STAIRS 2014), vol.264, pp.71-80, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01095927
The impact of e-commerce strategies on firm value: Lessons from Amazon.com and its early competitors, The Journal of Business, vol.77, issue.S2, pp.135-154, 2004. ,
Plausible reasonning in systems of jsm-type, Itogi Nauki Tekh, vol.15, pp.54-101, 1991. ,
Formal concept analysis-mathematical foundations, 1999. ,
A survey of emerging patterns for supervised classification, Artificial Intelligence Review, vol.42, issue.4, pp.705-721, 2014. ,
Who does what on the web: A large-scale study of browsing behavior, ICWSM, 2012. ,
Adoption of B2B Exchanges: Effects of IT-Mediated Website Services, Website Functionality, Benefits, and Costs. ICIS 2008 Proceedings, 2008. ,
A novel service-oriented AAA architecture, vol.3, pp.2833-2837, 2003. ,
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic, Computer & Security, pp.1-17, 2013. ,
Approaches to the selection of relevant concepts in the case of noisy data, Formal Concept Analysis, 8th International Conference, ICFCA 2010, pp.255-266, 2010. ,
A characterization of online browsing behavior, Proceedings of the 19th international conference on World wide web, pp.561-570, 2010. ,
DOI : 10.1145/1772690.1772748
Complexity of learning in concept lattices from positive and negative examples, Discrete Applied Mathematics, vol.142, issue.1-3, pp.111-125, 2004. ,
Machine learning and formal concept analysis, proceedings Second International Conference on Formal Concept Analysis, vol.2961, pp.287-312, 2004. ,
DOI : 10.1007/978-3-540-24651-0_25
On stability of a formal concept, Ann. Math. Artif. Intell, vol.49, issue.1-4, pp.101-115, 2007. ,
On interestingness measures of formal concepts, Inf. Sci, pp.202-219, 2018. ,
DOI : 10.1016/j.ins.2018.02.032
URL : http://arxiv.org/pdf/1611.02646
Cybercriminalité : 120.000 victimes d'usurpation d'identité chaque année en france, 2013. ,
Supervised descriptive rule discovery: A unifying survey of contrast set, emerging pattern and subgroup mining, The Journal of Machine Learning Research, vol.10, pp.377-403, 2009. ,
Patterns based classifiers, World Wide Web, vol.10, issue.1, pp.71-83, 2007. ,
DOI : 10.1007/s11280-006-0012-7
Automatic text processing: The transformation, analysis and retrieval of information by computer, 1989. ,
Implicit authentication through learning user behavior, Information Security13th International Conference, ISC 2010, pp.99-113, 2010. ,
DOI : 10.1007/978-3-642-18178-8_9
Mining sequential patterns: Generalizations and performance improvements, 1996. ,
DOI : 10.1007/bfb0014140
Implicit authentication on mobile devices, The Media Informatics Advanced Seminar on Ubiquitous Computing, 2011. ,
Symbolic Data Mining Methods with the Coron Platform, 2006. ,
URL : https://hal.archives-ouvertes.fr/tel-01754284
Un classifieur du comportement des utilisateurs dans les applications pair-pair de streaming vido. CFIP 2011-Colloque Francophone sur l'Ingénierie des Protocoles, 2011. ,
Web user behavioral profiling for user identification, Decision Support Systems, vol.49, issue.3, pp.261-271, 2010. ,
DOI : 10.1016/j.dss.2010.03.001
Spade: An efficient algorithm for mining frequent sequences, Machine learning, vol.42, issue.1-2, pp.31-60, 2001. ,
Efficient algorithms for mining closed itemsets and their lattice structure, IEEE Transactions on knowledge and data engineering, vol.17, issue.4, pp.462-478, 2002. ,
DOI : 10.1109/tkde.2005.60