Are sequential patterns used in practice?
I study computer security and I read articles about the potential usage of sequential pattern mining in IDPS products:
Database intrusion detection using role and user behavior based risk assessment
Building intrusion pattern miner for Sn… Continue reading Are sequential patterns used in practice?