{"title":"从组数据中挖掘可操作的行为规则","authors":"Peng Su, W. Mao, D. Zeng, Huimin Zhao","doi":"10.1109/ISI.2011.5983996","DOIUrl":null,"url":null,"abstract":"Many security-related applications can benefit from constructing models to predict the behavior of an entity. However, such models do not provide the user with explicit knowledge that can be directly used to influence the behavior for his/her interest. This type of knowledge is called actionable knowledge. Actionability is a very important aspect of the interestingness of mined patterns. In this paper, we formally define a new problem of mining actionable behavioral rules from group data. We also propose an algorithm for solving the problem. Using terrorism group data, our experiment shows the validity of our approach as well as the practical value of our defined problem in security informatics.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Mining actionable behavioral rules from group data\",\"authors\":\"Peng Su, W. Mao, D. Zeng, Huimin Zhao\",\"doi\":\"10.1109/ISI.2011.5983996\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many security-related applications can benefit from constructing models to predict the behavior of an entity. However, such models do not provide the user with explicit knowledge that can be directly used to influence the behavior for his/her interest. This type of knowledge is called actionable knowledge. Actionability is a very important aspect of the interestingness of mined patterns. In this paper, we formally define a new problem of mining actionable behavioral rules from group data. We also propose an algorithm for solving the problem. Using terrorism group data, our experiment shows the validity of our approach as well as the practical value of our defined problem in security informatics.\",\"PeriodicalId\":220165,\"journal\":{\"name\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2011.5983996\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2011.5983996","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mining actionable behavioral rules from group data
Many security-related applications can benefit from constructing models to predict the behavior of an entity. However, such models do not provide the user with explicit knowledge that can be directly used to influence the behavior for his/her interest. This type of knowledge is called actionable knowledge. Actionability is a very important aspect of the interestingness of mined patterns. In this paper, we formally define a new problem of mining actionable behavioral rules from group data. We also propose an algorithm for solving the problem. Using terrorism group data, our experiment shows the validity of our approach as well as the practical value of our defined problem in security informatics.