Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining

    Host behaviour modelling is widely deployed in today’s corporate environments to aid in the detection and analysis of cyber attacks. Audit logs containing system-level events are frequently used for behavior m...

    Mohammad Mamun, Scott Buffett in Information and Communications Security (2022)

  2. No Access

    Article

    Discretized sequential pattern mining for behaviour classification

    This paper proposes an approach for behavioural analysis on continuous data based on sequential pattern mining (SPM) and classification. Discretization and granularity issues associated with SPM and classifica...

    Scott Buffett in Granular Computing (2021)

  3. No Access

    Chapter and Conference Paper

    Incremental Sequential Rule Mining with Streaming Input Traces

    Traditional static pattern mining techniques, such as association rule mining and sequential pattern mining, perform inefficiently when applied to streaming data when regular updates are required, since there ...

    Andriy Drozdyuk, Scott Buffett, Michael W. Fleming in Advances in Artificial Intelligence (2020)

  4. No Access

    Chapter and Conference Paper

    Maintaining Preference Networks That Adapt to Changing Preferences

    Decision making can be more difficult with an enormous amount of information, not only for humans but also for automated decision making processes. Although most user preference elicitation models have been de...

    Ki Hyang Lee, Scott Buffett, Michael W. Fleming in Advances in Artificial Intelligence (2013)

  5. No Access

    Chapter and Conference Paper

    Utility Estimation in Large Preference Graphs Using A* Search

    Existing preference prediction techniques can require that an entire preference structure be constructed for a user. These structures, such as Conditional Outcome Preference Networks (COP-nets), can grow expon...

    Henry Bediako-Asare, Scott Buffett in Advances in Artificial Intelligence (2011)

  6. No Access

    Chapter and Conference Paper

    Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining

    Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly deal with well-structured and...

    Liqiang Geng, Scott Buffett, Bruce Hamilton, **n Wang in Foundations of Intelligent Systems (2009)

  7. No Access

    Chapter and Conference Paper

    Abductive Workflow Mining

    We define a new approach to discovering important workflows from event logs, referred to as abductive workflow mining, as the process of determining activity that would necessarily imply that certain predetermine...

    Scott Buffett, Bruce Hamilton in Business Process Management Workshops (2009)

  8. No Access

    Chapter and Conference Paper

    Bayesian Classification of Events for Task Labeling Using Workflow Models

    We investigate a method designed to improve accuracy of workflow mining in the case that the identification of task labels for log events are uncertain. Here we consider how the accuracy of an independent task...

    Scott Buffett, Liqiang Geng in Business Process Management Workshops (2009)

  9. No Access

    Chapter and Conference Paper

    Predicting User Preferences Via Similarity-Based Clustering

    This paper explores the idea of clustering partial preference relations as a means for agent prediction of users’ preferences. Due to the high number of possible outcomes in a typical scenario, such as an auto...

    Mian Qin, Scott Buffett, Michael W. Fleming in Advances in Artificial Intelligence (2008)

  10. No Access

    Chapter and Conference Paper

    Abductive Workflow Mining Using Binary Resolution on Task Successor Rules

    The notion of abductive workflow mining is introduced, which refers to the process of discovering important workflows from event logs that are believed to cause or explain certain behaviour. The approach is based...

    Scott Buffett in Rule Representation, Interchange and Reasoning on the Web (2008)

  11. No Access

    Chapter and Conference Paper

    Private Data Discovery for Privacy Compliance in Collaborative Environments

    With the growing use of computers and the Internet, it has become difficult for organizations to locate and effectively manage sensitive personally identifiable information (PII). This problem becomes even mor...

    Larry Korba, Yunli Wang, Liqiang Geng in Cooperative Design, Visualization, and Eng… (2008)

  12. No Access

    Article

    The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services

    Scott Knight, Scott Buffett in International Journal of Information Secur… (2007)

  13. No Access

    Chapter and Conference Paper

    Reasoning with Conditional Preferences Across Attributes

    Before an autonomous agent can perform automated negotiation on behalf of a user in an electronic commerce transaction, the user’s preferences over the set of outcomes must be learned as accurately as possible...

    Shaoju Chen, Scott Buffett, Michael W. Fleming in Advances in Artificial Intelligence (2007)

  14. No Access

    Chapter and Conference Paper

    Private Data Management in Collaborative Environments

    Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of information and communication technolog...

    Larry Korba, Ronggong Song, George Yee in Cooperative Design, Visualization, and Eng… (2007)

  15. No Access

    Chapter and Conference Paper

    TAC-REM – The Real Estate Market Game: A Proposal for the Trading Agent Competition

    In this game, agents will face-off against each other in the ultra-competitive real estate market. Each competitor will act as a real estate agent, working on behalf of clients who need to move into new homes....

    Scott Buffett, Maria Fasli in Agent-Mediated Electronic Commerce. Automa… (2007)

  16. No Access

    Chapter and Conference Paper

    A Markov Model for Inventory Level Optimization in Supply-Chain Management

    We propose a technique for use in supply-chain management that assists the decision-making process for purchases of direct goods. Based on projections for future prices and demand, requests-for-quotes are cons...

    Scott Buffett in Advances in Artificial Intelligence (2005)

  17. No Access

    Chapter and Conference Paper

    A Decision-Theoretic Algorithm for Bundle Purchasing in Multiple Open Ascending-Price Auctions

    This paper presents an algorithm for decision-making where the buyer needs to procure one of possibly many bundles of complementary products, and items are sold individually in multiple open ascending-price (E...

    Scott Buffett, Alastair Grant in Advances in Artificial Intelligence (2004)