H. Azkia, N. Cuppens-boulahia, F. Cuppens, and G. Coatrieux, Log content extraction engine based on ontology for the purpose of a posteriori access control, vol.9, pp.23-42, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01219697

S. O. Kuznetsov, Complexity of learning in concept lattices from positive and negative examples, vol.142, pp.111-125, 2004.

S. O. Kuznetsov, Machine learning and formal concept analysis, Concept Lattices, Second International Conference on Formal Concept Analysis, ICFCA, pp.287-312, 2004.

A. Buzmakov, E. Egho, N. Jay, S. O. Kuznetsov, A. Napoli et al., On mining complex sequential data by means of FCA and pattern structures, Int. J. General Systems, vol.45, issue.2, pp.135-159, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01186715

S. O. Kuznetsov, Learning of simple conceptual graphs from positive and negative examples, Principles of Data Mining and Knowledge Discovery, Third European Conference, PKDD '99, pp.384-391, 1999.

K. Ramamohanarao and H. Fan, Patterns based classifiers, World Wide Web, issue.1, pp.71-83, 2007.

P. K. Novak, N. Lavrac, and G. I. Webb, Supervised descriptive rule discovery: A unifying survey of contrast set, emerging pattern and subgroup mining, Journal of Machine Learning Research, vol.10, pp.377-403, 2009.

M. García-borroto, J. F. Trinidad, and J. A. Carrasco-ochoa, A survey of emerging patterns for supervised classification, Artif. Intell. Rev, vol.42, issue.4, pp.705-721, 2014.

O. Coupelon, D. Dia, F. Labernia, Y. Loiseau, and O. Raynaud, Using closed itemsets for implicit user authentication in web browsing, Proceedings of the Eleventh International Conference on Concept Lattices and Their Applications, pp.131-144, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02074121

E. Shi, Y. Niu, M. Jakobsson, and R. Chow, Implicit authentication through learning user behavior, Information Security-13th International Conference, ISC 2010, pp.99-113, 2010.

R. Kumar and A. Tomkins, A characterization of online browsing behavior, Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp.561-570, 2010.

Y. C. Yang, Web user behavioral profiling for user identification, Decision Support Systems, vol.49, issue.3, pp.261-271, 2010.

S. Goel, J. M. Hofman, and M. I. Sirer, Who does what on the web: A large-scale study of browsing behavior, Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012.

M. Abramson and D. W. Aha, User authentication from web browsing behavior, Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, FLAIRS 2013, 2013.

R. R. Yager, Families of OWA operators, vol.59, pp.125-148, 1993.

R. R. Yager, Constraint satisfaction using soft quantifiers, International Journal of Intelligent Systems in Accounting and Finance Management, vol.12, issue.3, pp.177-186, 2004.

B. Liu, W. Hsu, and Y. Ma, Integrating classification and association rule mining, Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), pp.80-86, 1998.