, Almerys est un acteur majeur dans le domaine du traitement industriel des données numériques et est un opérateur de tiers-payant santé

, Le travail de [2] permet de faire de l'identification sur Internet en se basant sur des données de navigation web multi-siteségalementsiteségalement. Elle utilise commé eléments caractéristiques du comportement de l'internaute : le nom de domaine visité, le nombre de pages vues, l'heure de démarrage d'une session et sa durée. Le jeu de données, collecté par un fournisseur de services, est constitué des 300premì eres connections de 2798 utilisateurs sur une période de 12 mois. Les profils utilisateurs sont composés d'itemsets fréquents de taille 1, extraits avec l'algorithme Apriori (cf, pas suffisantes pour authentifier ou distinguer les utilisateurs. La taille de la base de données est aussi un paramètre déterminant qui pourrait expliquer pourquoi leur modèle n'est pas capable de fournir de bons résultats

, En effet, un temps de pause de 25, 5 minutes permet de définir une session. A partir d'un ensemble de sessions d'URL, les auteurs en déduisent le nombre de fois qu'une page a ´ eté demandée, le nombre de fois qu'une page a ´ eté lapremì ere page d'une session et enfin le nombre de fois qu'une page a ´ eté ladernì ere page d'une session. Les auteurs proposent une modélisation des parcours sur un site sous forme de grammaire probabiliste hypertextuelle ou en anglais Hypertext Probabilistic Grammar (HPG) qui permet de fouiller des bases de parcours et d'identifier des séquences 9 récurrentes suivies par les internautes. Les auteurs utilisent un modèlè a base de N-grammes (cf, L'auteur compare deux approches de sélection d'itemsets fréquents en particulier : le support et le lift. L'´ etude montre que pour des comportements anonymes de petite taille (jusqu'` a une vingtaine de sites visités) les modèles les plus efficaces restent des modèles de classification traditionnels comme les arbres de décision, vol.135

, Une séquence utilise le principe de précédence c'est-` a-dire chaqué elément de la liste est précédé desélémentsdeséléments qui l

, 2 Motivations : limites des approches existantes, p.95

. .. Classification-na¨?vena¨?ve-bayésienne, 99 3.3.1 Adaptation simple de la classification na¨?vena¨?ve bayésienne . . 99 3.3.2 Classification na¨?vena¨?ve bayésiennè a base d'itemsets fermés fréquents discriminants

, ClassificationàClassificationà base d'itemsets fermés fréquents discriminants

. .. Mesures-de-distance,

.. .. Résumé,

, Ladeuxì eme boucle indique le nombre d'informations porté par chaque flux de test (une seule session, ou bien une agrégation de plusieurs sessions). Enfin, latroisì eme boucle permet de lisser les résultats en créant plusieurs jeux d'exécution (cf. random subsampling). Dans la table 5.3, nous fixons X ` a 100. La boucle ligne 10 calcule les itemsets fermés fréquents spécifiquesspécifiques`spécifiquesà chaque utilisateur etétablitetétablit les vecteurs de profil. La boucle ligne 13 calcule la valeur de chaque vecteur de profil utilisateur

D. Olivier-coupelon, Y. Dia, O. Loiseau, and . Raynaud, Am I Really Who I Claim To Be ?, The 2014 World Conference on Information Systems and Technologies (WorldCIST'14)

O. ?-diyé-dia, Y. Coupelon, O. Loiseau, and . Raynaud, Implicit Authentication, poster, The 27th International Conference of the Florida Artificial Intelligence Research Society (FLAIRS-27)

D. Olivier-coupelon, F. Dia, Y. Labernia, and . Loiseau, Olivier Raynaud, Using Closed Itemsets for Implicit User Authentication in Web Browsing, The Eleventh International Conference on Concept Lattices and Their Applications, 2014.

. Conférences, . De-lecture-?-diyé, O. Dia, Y. Coupelon, O. Loiseau et al., Suisje celui que je prétendsprétendsêtre ?, 25es Journées francophones d'Ingénierie des Connaissances (IC2014)

D. Olivier-coupelon, F. Dia, Y. Labernia, and . Loiseau, Olivier Raynaud, Using Closed Itemsets for Implicit User Authentication in Web Browsing, The first Symposium on Digital Trust in Auvergne (SDTA 2014)

J. Pei, J. Han, and R. Mao, Closet : An efficient algorithm for mining frequent closed itemsets, ACM SIGMOD workshop on research issues in data mining and knowledge discovery, vol.4, pp.21-30, 2000.

Y. Yinghui-catherine, Web user behavioral profiling for user identification. Decision Support Systems, pp.261-271, 2010.

U. Fayyad, G. Piatetsky-shapiro, and P. Smyth, From data mining to knowledge discovery in databases. AI magazine, vol.17, p.37, 1996.

D. Kaplan and R. Francou,

C. Baromètre, Résultats de la 3` emé edition du baromètre caisse des dépôts/acsel sur la confiance des français dans le numérique, 2013.

A. Peyrefitte, La société de confiance

A. Basu, A Reputation Framework for Behavioural History, 2010.

A. B. Seligman, Complexité du rôle, risque et emergence de la confiance, Réseaux, vol.4, issue.108, pp.37-61, 2001.

A. Donovan and G. Yolanda, A survey of trust in computer science and the semantic web, Web Semantics : Science, Services and Agents on the WWW, vol.5, pp.58-71, 2007.

C. Adams, G. Bochmann, and J. Shi, A trust model with statistical foundation, 18th International Federation for Information Processing (IFIP) World Computer Congress TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), IFIP, vol.173, pp.145-158, 2005.

S. Marsh, Formalising Trust as a Computational Concept, 1994.

A. Abdul-rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on, p.9, 2000.

F. Gomez-marmol and G. Pérez, Security threats scenarios in trust and reputation models for distributed systems. computers & security, vol.28, pp.545-556, 2009.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation, Proceedings of the, p.35, 2002.

, Annual Hawaii International Conference on, pp.2431-2439, 2002.

M. Oa and A. Agreda, Trust models and applications in communication and multi-agent systems, Int. J. Know.-Based Intell. Eng. Syst, vol.17, issue.2, pp.187-193, 2013.

A. Jøsang, T. A?derska, and S. Marsh, Trust transitivity and conditional belief reasoning, Trust Management VI, pp.68-83, 2012.

S. Ruohomaa and L. Kutvonen, Trust management survey, Trust Management, pp.77-92, 2005.

. Van-hoan and . Vu, Infrastructure de gestion de la confiance sur internet, 2010.

H. Chivers, Trust without identification, Security in Pervasive Computing, pp.1-2, 2006.

L. Krzywiecki, Przemyss law Kubiak, and Miross law Kutyy lowski. Stamp and extend -instant but undeniable timestamping based on lazy trees, pp.5-24, 2012.

J. Kohl and C. Neuman, The Kerberos Network Authentication Service (V5). RFC 1510 (Proposed Standard), 1993.

T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons, Adaptive trust negotiation and access control, Proceedings of the tenth ACM symposium on Access control models and technologies, pp.139-146, 2005.

J. Li, N. Li, and W. H. Winsborough, Automated trust negotiation using cryptographic credentials, Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05, pp.46-57, 2005.

M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson et al., Negotiating trust on the web, IEEE Internet Comput, vol.6, issue.6, pp.30-37, 2002.

M. Benantar, Access control systems : security, identity management and trust models, 2006.

N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody, Using trust and risk in role-based access control policies, Proceedings of the ninth ACM symposium on Access control models and technologies, pp.156-162, 2004.

A. Josang, A. Kent, C. Varmedal, R. Rosenberger, and . Kumar, Service provider authentication assurance, Tenth Annual International Conference on, pp.203-210, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00998929

D. E. and R. Denning, Cryptography and Data Security, 1982.

E. Gudes, N. Gal-oz, and A. Grubshtein, Methods for computing trust and reputation while preserving privacy, Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, pp.291-298, 2009.

Z. Noorian and M. Ulieru, The state of the art in trust and reputation systems : a framework for comparison, Journal of theoretical and applied electronic commerce research, vol.5, issue.2, pp.97-117, 2010.

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision. Decision support systems, vol.43, pp.618-644, 2007.

Y. Wang and J. Vassileva, Toward trust and reputation based web service selection : A survey, International Transactions on Systems Science and Applications, vol.3, issue.2, pp.118-132, 2007.

S. Wei and J. Mirkovic, Building reputations for internet clients, Proceedings of the Second International Workshop on Security and Trust Management, vol.179, pp.17-30, 2006.

A. Danek, J. Urbano, A. P. Rocha, and E. Oliveira, Engaging the dynamics of trust in computational trust and reputation systems, Agent and Multi-Agent Systems : Technologies and Applications, pp.22-31

. Springer, , 2010.

A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, Fuzzy reputation-based trust model, Applied soft computing, vol.11, issue.1, pp.345-355, 2011.

K. Kamal, M. Bharadwaj, H. Yahya, and . Al-shamri, Fuzzy computational models for trust and reputation systems, Electronic Commerce Research and Applications, vol.8, issue.1, pp.37-47, 2009.

A. Jsang and R. Ismail, The beta reputation system, Proceedings of the 15th bled electronic commerce conference, vol.5, pp.2502-2511, 2002.

A. Whitby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, Proc. 7th Int. Workshop on Trust in Agent Societies, vol.6, pp.106-117, 2004.

S. P. José-de, V. Guedes, C. Silva, and . Lucena, A reputation model based on testimonies, Agent-Oriented Information Systems IV, pp.37-52, 2008.

J. Félix-gómez-mármol, G. Girao, and . Pérez, Trims, a privacy-aware trust and reputation model for identity management systems, Computer Networks, vol.54, issue.16, pp.2899-2912, 2010.

E. Zheleva, A. Kolcz, and L. Getoor, Trusting spam reporters : A reporter-based reputation system for email filtering, ACM Transactions on Information Systems (TOIS), vol.27, issue.1, p.3, 2008.

N. Mezzetti, A socially inspired reputation model, Public Key Infrastructure, pp.191-204, 2004.

. Sj-knapskog, A metric for trusted systems, Proceedings of the 21st National Security Conference, pp.16-29, 1998.

A. Gutowska, A. Sloane, and K. A. Buckley, On desideratum for b2c e-commerce reputation systems, Journal of computer science and technology, vol.24, issue.5, pp.820-832, 2009.

V. Legrand, S. Ubéda, J. Morêt-bailly, A. Rabagny, L. Guihéry et al., Vers un modèle de confiance pour les objets communicants : une approche sociale-draft, 2004.

H. Mcknight and N. L. Chervany, The meanings of trust, 1996.

J. P. Soto, A. Vizcaíno, J. Portillo-rodríguez, and M. Piattini, Why should i trust in a virtual community member ?, Groupware : Design, Implementation, and Use, pp.126-133, 2009.

A. Jøsang, S. Marsh, and S. Pope, Exploring different types of trust propagation, Trust management, pp.179-192, 2006.

M. Mohtashemi and L. Mui, Evolution of indirect reciprocity by social information : the role of trust and reputation in evolution of altruism, Journal of Theoretical Biology, vol.223, issue.4, pp.523-531, 2003.

E. Viet-an-nguyen, H. Lim, J. Tan, A. Jiang, and . Sun, Do you trust to get trust ? a study of trust reciprocity behaviors and reciprocal trust prediction, SDM, pp.72-83, 2010.

C. James and . Cox, How to identify trust and reciprocity, Games and economic behavior, vol.46, issue.2, pp.260-281, 2004.

D. Lauterbach, H. Truong, T. Shah, and L. Adamic, Surfing a web of trust : Reputation and reciprocity on couchsurfing, Computational Science and Engineering, 2009. CSE'09. International Conference on, vol.4, pp.346-353, 2009.

C. Nevejan and F. Brazier, Granularity in reciprocity. AI & society, vol.27, pp.129-147, 2012.

M. Stephen and B. Pamela, Examining trust, forgiveness and regret as computational concepts, Computing with Social Trust, pp.9-43, 2009.

S. Marsh, A. Basu, and N. Dwyer, Rendering unto caesar the things that are caesar's : Complex trust models and human understanding, Trust Management VI, pp.191-200, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01517660

A. David, C. L. Marca, and . Mcgowan, SADT : Structured Analysis and Design Technique, 1987.

F. Lagier, Cybercriminalité : 120.000 victimes d'usurpation d'identité chaque année en france, 2013.

I. Cagri, I. Guvence-rodoper, R. T. Benbasat, and . Cenfetelli, Adoption of b2b exchanges : Effects of it-mediated website services, website functionality, benefits, and costs, ICIS, 2008.

D. Filson, The impact of e-commerce strategies on firm value : Lessons from amazon.com and its early competitors, The Journal of Business, vol.77, issue.S2, pp.135-154, 2004.

C. Yinghui, B. Yang, and . Padmanabhan, Toward user patterns for online security : Observation time and online user identification. Decision Support Systems, vol.48, pp.548-558, 2010.

J. Gustavus and . Simmons, A survey of information authentication, Proceedings of the IEEE, vol.76, issue.5, pp.603-620, 1988.

J. Lopez, R. Oppliger, and G. Pernul, Authentication and authorization infrastructures (aais) : a comparative survey, Computers & Security, vol.23, issue.7, pp.578-590, 2004.

M. Kasper-b-rasmussen, I. Roeschlin, G. Martinovic, and . Tsudik, Authentication using pulse-response biometrics, Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2014.

J. Bigun, J. Fiérrez-aguilar, J. Ortega-garcia, and J. Gonzalezrodriguez, Combining biometric evidence for person authentication, Advanced Studies in Biometrics, pp.1-18, 2005.

M. Abramson and D. W. Aha, User authentication from web browsing behavior, Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, pp.268-273, 2013.

M. Jakobsson, E. Shi, P. Golle, and R. Chow, Implicit authentication for mobile devices, Proceeding HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security, pp.9-9, 2009.

R. He, M. Yuan, J. Hu, H. Zhang, Z. Kan et al., A novel service-oriented aaa architecture, vol.3, pp.2833-2837, 2003.

T. Stockinger, Implicit authentication on mobile devices. the Media Informatics Advanced Seminar on Ubiquitous Computing, 2011.

E. Shi, Y. Niu, M. Jakobsson, and R. Chow, Implicit authentication through learning user behavior, ISC 2010, vol.6531, pp.99-113, 2011.

E. Pn-ali-fahmi, D. Kodirov, G. Choi, and . Lee, Implicit authentication based on ear shape biometrics using smartphone camera during a call, 2012 IEEE International Conference on, pp.2272-2276, 2012.

A. Nashad, R. Safa, . Safavi-naini, F. Siamak, and . Shahandashti, Privacy-preserving implicit authentication, ICT Systems Security and Privacy Protection, pp.471-484, 2014.

A. De-luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann, Touch me once and i know it's you ! : implicit authentication based on touch screen patterns, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.987-996, 2012.

H. Khan and U. Hengartner, Towards application-centric implicit authentication on smartphones, Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, p.10, 2014.

S. Yazji, X. Chen, P. Robert, P. Dick, and . Scheuermann, Implicit user re-authentication for mobile devices, Ubiquitous Intelligence and Computing, pp.325-339, 2009.

K. Anil, A. Jain, S. Ross, and . Prabhakar, An introduction to biometric recognition, IEEE Trans. on Circuits and Systems for Video Technology, vol.14, pp.4-20, 2004.

R. De-luis-garcia, C. Alberola-lopez, O. Aghzout, and J. Ruizalzola, Biometric identification systems, Signal Processing, vol.83, issue.12, pp.2539-2557, 2003.

M. Fabrègue, Extraction d'informations synthétiquessynthétiquesà partir de données séquentielles : ApplicationàApplication`Applicationà l'´ evaluation de la qualité desrivì eres, 2014.

R. Agrawal and R. Srikant, Fast algorithms for mining association rules in large databases, Proceedings of the 20th International Conference on Very Large Data Bases, VLDB '94, pp.487-499, 1994.

B. Ganter and R. Wille, Formal concept analysis -mathematical foundations, 1999.

J. Mohammed, C. Zaki, and H. Jui, Charm : An efficient algorithm for closed itemset mining, pp.457-473, 2002.

H. Pinto, J. Han, J. Pei, K. Wang, Q. Chen et al., Multi-dimensional sequential pattern mining, Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM '01, pp.81-88, 2001.
DOI : 10.1145/502598.502600

G. Fang, Z. Wei, and Q. Yin, An algorithm of constrained spatial association rules based on binary, Proceedings of the 5th International Symposium on Neural Networks : Advances in Neural Networks, Part II, ISNN '08, pp.21-29, 2008.

J. Han, J. Pei, and Y. Yin, Mining frequent patterns without candidate generation, SIGMOD Rec, vol.29, issue.2, pp.1-12, 2000.
DOI : 10.1145/335191.335372

R. Agrawal and R. Srikant, Mining sequential patterns, Proceedings of the Eleventh International Conference on Data Engineering, pp.3-14, 1995.

J. Pei, J. Han, B. Mortazavi-asl, H. Pinto, Q. Chen et al., Prefixspan : Mining sequential patterns efficiently by prefix-projected pattern growth, pp.215-224, 2001.

X. Yan, J. Han, and R. Afshar, Clospan : Mining closed sequential patterns in large datasets, SDM, pp.166-177, 2003.
DOI : 10.1137/1.9781611972733.15

A. Da-jiménez, F. Berzal, and J. Cubero, Frequent tree pattern mining : A survey, Intell. Data Anal, vol.14, issue.6, pp.603-622, 2010.

A. Deepak, D. Fernández-baca, S. Tirthapura, M. J. Sanderson, and M. M. Mcmahon, Evominer : Frequent subtree mining in phylogenetic databases, Knowl. Inf. Syst, vol.41, issue.3, pp.559-590, 2014.
DOI : 10.1007/s10115-013-0676-0

URL : https://lib.dr.iastate.edu/cgi/viewcontent.cgi?article=1011&context=cs_techreports

X. Yan and J. Han, gspan : graph-based substructure pattern mining, Data Mining, 2002. ICDM 2003. Proceedings. 2002 IEEE International Conference on, pp.721-724, 2002.

P. Shelokar, A. Quirin, and C. Andíscarandíscar, A multiobjective evolutionary programming framework for graph-based data mining, Inf. Sci, vol.237, pp.118-136, 2013.
DOI : 10.1016/j.ins.2013.02.014

C. Jiang, F. Coenen, and M. Zito, A survey of frequent subgraph mining algorithms, The Knowledge Engineering Review, vol.28, pp.75-105, 2013.

J. Mohammed, C. Zaki, and . Hsiao, Efficient algorithms for mining closed itemsets and their lattice structure, IEEE TRANSACTIONS ON KNOW-LEDGE AND DATA ENGINEERING, vol.17, 2005.

S. Ben-yahia, T. Hamrouni, and E. Mephu-nguifo, Frequent closed itemset based algorithms : A thorough structural and analytical survey, SIGKDD Explor. Newsl, vol.8, issue.1, pp.93-104, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00109569

K. Gouda, . Mohammedj, and . Zaki, Genmax : An efficient algorithm for mining maximal frequent itemsets, Data Mining and Knowledge Discovery, vol.11, issue.3, pp.223-242, 2005.
DOI : 10.1007/s10618-005-0002-x

R. Agrawal, T. Imieli´nskiimieli´nski, and A. Swami, Mining association rules between sets of items in large databases, SIGMOD Rec, vol.22, issue.2, pp.207-216, 1993.

J. Rabatel, Extraction de motifs contextuels, Enjeux et applications dans les données séquentielles, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00670979

A. Salleb, Recherche de motifs fréquents pour l'extraction de r` egles d'association et de caractérisation, 2003.

N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal, Discovering frequent closed itemsets for association rules, Database Theory-ICDT'99, pp.398-416, 1999.
URL : https://hal.archives-ouvertes.fr/hal-00467747

N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal, Efficient mining of association rules using closed itemset lattices. Information systems, vol.24, pp.25-46, 1999.

N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal, Pruning closed itemset lattices for association rules, BDA'1998 international conference on Advanced Databases, pp.177-196, 1998.
URL : https://hal.archives-ouvertes.fr/hal-00467745

Y. Bastide, N. Pasquier, R. Taouil, G. Stumme, and L. Lakhal, Mining minimal non-redundant association rules using frequent closed itemsets, Computational Logic-CL 2000, pp.972-986, 2000.
URL : https://hal.archives-ouvertes.fr/hal-00467751

Y. Bastide, R. Taouil, N. Pasquier, G. Stumme, and L. Lakhal, Mining frequent patterns with counting inference, ACM SIGKDD Explorations Newsletter, vol.2, issue.2, pp.66-75, 2000.
URL : https://hal.archives-ouvertes.fr/hal-00467750

G. Stumme, R. Taouil, Y. Bastide, N. Pasquier, and L. Lakhal, Intelligent structuring and reducing of association rules with formal concept analysis, KI 2001 : Advances in Artificial Intelligence, pp.335-350, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00100665

G. Stumme, R. Taouil, Y. Bastide, N. Pasquier, and L. Lakhal, Computing iceberg concept lattices with titanic. Data & knowledge engineering, vol.42, pp.189-222, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00578830

T. Uno, T. Asai, Y. Uchida, and H. Arimura, Lcm : An efficient algorithm for enumerating frequent closed item sets, FIMI, vol.90, 2003.

C. Lucchese, S. Orlando, and R. Perego, Dci closed : A fast and memory efficient algorithm to mine frequent closed itemsets, FIMI, 2004.

B. Sadok, . Yahia, M. Engelbert, and . Nguifo, Approches d'extraction de r` egles d'association basées sur la correspondance de galois. Ingénierie des systèmes d'information, vol.9, pp.23-55, 2004.

R. Wille, Concept lattices and conceptual knowledge systems, Computers & mathematics with applications, vol.23, issue.6, pp.493-515, 1992.

N. Pasquier, Data mining : algorithmes d'extraction et de reduction des regles d'association dans les bases de donnees, Lotfi Sciences et techniques Clermont Ferrand, vol.2, 2000.
URL : https://hal.archives-ouvertes.fr/tel-00467764

J. Wang, J. Han, and J. Pei, Closet+ : Searching for the best strategies for mining frequent closed itemsets, Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.236-245, 2003.

S. Brin, R. Motwani, and C. Silverstein, Beyond market baskets : Generalizing association rules to correlations, SIGMOD Rec, vol.26, issue.2, pp.265-276, 1997.

H. Cheng, X. Yan, and P. S. Yu, Direct discriminative pattern mining for effective classification, ICDE, 2008.

G. Salton, Automatic text processing : The transformation, analysis and retrieval of information by computer, 1989.

. So-kuznetsov, Stability as an estimate of the degree of substantiation of hypotheses derived on the basis of operational similarity. Automatic Documentation and Mathematical Linguistics, 1990.

A. Buzmakov, S. O. Kuznetsov, and A. Napoli, Is concept stability a measure for pattern selection ?, 2nd International Conference on Information Technology and Quantitative Management, vol.31, pp.918-927, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01095914

M. Klimushkin, S. Obiedkov, and C. Roth, Approaches to the selection of relevant concepts in the case of noisy data, Formal concept analysis, pp.255-266, 2010.

J. Han, M. Kamber, and J. Pei, Data Mining : Concepts and Techniques, 2011.

M. J. Zaki and M. J. Wagner, Data mining and analysis : Fundamental concepts and algorithms, p.624

J. and R. Quinlan, Induction of decision trees, Machine learning, vol.1, issue.1, pp.81-106, 1986.

B. Liu, W. Hsu, and Y. Ma, Integrating classification and association rule mining, pp.80-86, 1998.

W. Li, J. Han, and J. Pei, Cmar : Accurate and efficient classification based on multiple class-association rules, Proceedings of the 2001 IEEE International Conference on Data Mining, ICDM '01, pp.369-376, 2001.

O. Raynaud, Y. Loiseau, D. Dia, O. Coupelon, and F. Labernia, Using closed itemsets for implicit user authentication in web browsing, CLA 2014, Proceedings of the Eleventh International Conference on Concept Lattices and Their Applications, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02074121

R. Rakotomalala and S. Lallich, Construction d'arbres de décision par optimisation, vol.16, pp.685-703, 2002.

J. Dougherty, R. Kohavi, and M. Sahami, Supervised and unsupervised discretization of continuous features, Machine learning : proceedings of the twelfth international conference, vol.12, pp.194-202, 1995.

. William-w-cohen, Learning trees an rules with set-valued features, 1996.

J. R. Quinlan and R. M. Cameron-jones, Foil : A midterm report, Proceedings of the European Conference on Machine Learning, pp.3-20

. Springer-verlag, , 1993.

Y. Okada, T. Tada, K. Fukuta, and T. Nagashima, Audio classification based on a closed itemset mining algorithm, Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on, pp.60-65, 2010.

E. Hüllermeier and J. Fürnkranz, Comparison of ranking procedures in pairwise preference learning, Proceedings of the 10th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU-04), 2004.

V. Vasilis, JAVA implementation of Multinomial Naive Bayes Text Classifier

J. Roberto, R. Bayardo, D. Agrawal, and . Gunopulos, Constraintbased rule mining in large, dense databases, Proceedings., 15th International Conference on, pp.188-197, 1999.

L. Szathmary, Symbolic Data Mining Methods with the Coron Platform, 2006.
URL : https://hal.archives-ouvertes.fr/tel-01754284

L. Breiman, Random forests. Machine learning, vol.45, pp.5-32, 2001.

C. Cortes and V. Vapnik, Support-vector networks, Machine Learning, vol.20, issue.3, pp.273-297, 1995.

R. Agrawal, . Mannila, H. Srikant, . Toivonen, and A. I. Verkamo, Fast discovery of association rules. Advances in Knowledge Discovery and Data Mining, Ch, vol.12, 1996.

J. Borges and M. Levene, Data mining of user navigation patterns, Web usage analysis and user profiling, pp.92-112, 2000.

D. Lara, J. E. Catledge, and . Pitkow, Characterizing browsing strategies in the world-wide web. Computer Networks and ISDN systems, vol.27, pp.1065-1073, 1995.

E. Charniak, Statistical language learning, 1996.

D. Tanasa and B. Trousse, Le prétraitement des fichiers logs web dans le "web usage mining" multi-sites, Journées Francophones de la Toile (JFT'2003), pp.113-122, 2003.

B. Efron and . Efron, The jackknife, the bootstrap and other resampling plans, vol.38, 1982.