-
Chapter and Conference Paper
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining
Host behaviour modelling is widely deployed in today’s corporate environments to aid in the detection and analysis of cyber attacks. Audit logs containing system-level events are frequently used for behavior m...
-
Article
Discretized sequential pattern mining for behaviour classification
This paper proposes an approach for behavioural analysis on continuous data based on sequential pattern mining (SPM) and classification. Discretization and granularity issues associated with SPM and classifica...
-
Chapter and Conference Paper
Incremental Sequential Rule Mining with Streaming Input Traces
Traditional static pattern mining techniques, such as association rule mining and sequential pattern mining, perform inefficiently when applied to streaming data when regular updates are required, since there ...
-
Chapter and Conference Paper
Maintaining Preference Networks That Adapt to Changing Preferences
Decision making can be more difficult with an enormous amount of information, not only for humans but also for automated decision making processes. Although most user preference elicitation models have been de...
-
Chapter and Conference Paper
Utility Estimation in Large Preference Graphs Using A* Search
Existing preference prediction techniques can require that an entire preference structure be constructed for a user. These structures, such as Conditional Outcome Preference Networks (COP-nets), can grow expon...
-
Chapter and Conference Paper
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly deal with well-structured and...
-
Chapter and Conference Paper
Abductive Workflow Mining
We define a new approach to discovering important workflows from event logs, referred to as abductive workflow mining, as the process of determining activity that would necessarily imply that certain predetermine...
-
Chapter and Conference Paper
Bayesian Classification of Events for Task Labeling Using Workflow Models
We investigate a method designed to improve accuracy of workflow mining in the case that the identification of task labels for log events are uncertain. Here we consider how the accuracy of an independent task...
-
Chapter and Conference Paper
Predicting User Preferences Via Similarity-Based Clustering
This paper explores the idea of clustering partial preference relations as a means for agent prediction of users’ preferences. Due to the high number of possible outcomes in a typical scenario, such as an auto...
-
Chapter and Conference Paper
Abductive Workflow Mining Using Binary Resolution on Task Successor Rules
The notion of abductive workflow mining is introduced, which refers to the process of discovering important workflows from event logs that are believed to cause or explain certain behaviour. The approach is based...
-
Chapter and Conference Paper
Private Data Discovery for Privacy Compliance in Collaborative Environments
With the growing use of computers and the Internet, it has become difficult for organizations to locate and effectively manage sensitive personally identifiable information (PII). This problem becomes even mor...
-
Article
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services
-
Chapter and Conference Paper
Reasoning with Conditional Preferences Across Attributes
Before an autonomous agent can perform automated negotiation on behalf of a user in an electronic commerce transaction, the user’s preferences over the set of outcomes must be learned as accurately as possible...
-
Chapter and Conference Paper
Private Data Management in Collaborative Environments
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of information and communication technolog...
-
Chapter and Conference Paper
TAC-REM – The Real Estate Market Game: A Proposal for the Trading Agent Competition
In this game, agents will face-off against each other in the ultra-competitive real estate market. Each competitor will act as a real estate agent, working on behalf of clients who need to move into new homes....
-
Chapter and Conference Paper
A Markov Model for Inventory Level Optimization in Supply-Chain Management
We propose a technique for use in supply-chain management that assists the decision-making process for purchases of direct goods. Based on projections for future prices and demand, requests-for-quotes are cons...
-
Chapter and Conference Paper
A Decision-Theoretic Algorithm for Bundle Purchasing in Multiple Open Ascending-Price Auctions
This paper presents an algorithm for decision-making where the buyer needs to procure one of possibly many bundles of complementary products, and items are sold individually in multiple open ascending-price (E...