A. V. Aho and M. J. Corasick, Efficient string matching: An aid to bibliographic search, Commun. ACM, vol.18, issue.6, pp.333-340, 1975.

S. O. Al-mamory and H. Zhang, Intrusion detection alarms reduction using root cause analysis and clustering, Computer Communications, vol.32, issue.2, pp.419-430, 2009.

L. Bennacer, Y. Amirat, A. Chibani, A. Mellouk, and L. Ciavaglia, Selfdiagnosis technique for virtual private networks combining bayesian networks and case-based reasoning, vol.12, pp.354-366, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01538572

L. Bennacer, L. Ciavaglia, S. Ghamri-doudane, A. Chibani, Y. Amirat et al., Scalable and fast root cause analysis using inter cluster inference, Proceedings of IEEE International Conference on Communications, ICC, pp.3563-3568, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01676592

J. V. Capacho, A. Subias, L. Travé-massuyès, and F. Jimenez, Alarm management via temporal pattern learning, Engineering Applications of Artificial Intelligence, vol.65, pp.506-516, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01611635

Y. Cheng, I. Izadi, and T. Chen, Pattern matching of alarm flood sequences by a modified Smith-Waterman algorithm. Chemical engineering research and design, vol.91, pp.1085-1094, 2013.

D. Cram, B. Mathern, and A. Mille, A complete chronicle discovery approach: application to activity analysis, Expert Systems, vol.29, issue.4, pp.321-346, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01354577

J. Daciuk, S. Mihov, B. W. Watson, and R. E. Watson, Incremental construction of minimal acyclic finite-state automata. Computational linguistics, vol.26, pp.3-16, 2000.

C. Dousson and T. V. Duong, Discovering chronicles with numerical time constraints from alarm logs for monitoring dynamic systems, IJCAI, vol.99, pp.620-626, 1999.

C. Dousson, P. Gaborit, and M. Ghallab, Situation recognition: Representation and algorithms, IJCAI: International Joint Conference on Artificial Intelligence, vol.01, pp.166-174, 1993.

J. M. Gonzalez, J. A. Jimenez, J. C. Lopez, and H. A. , Root cause analysis of network failures using machine learning and summarization techniques, IEEE Communications Magazine, vol.55, issue.9, pp.126-131, 2017.

M. C. Johannesmeyer, A. Singhal, and D. E. Seborg, Pattern matching in historical data, AIChE journal, vol.48, issue.9, pp.2022-2038, 2002.

K. Julisch, Clustering intrusion detection alarms to support root cause analysis, ACM transactions on information and system security (TISSEC), vol.6, pp.443-471, 2003.

E. M. Mccreight, A space-economical suffix tree construction algorithm, J. ACM, vol.23, issue.2, pp.262-272, 1976.

D. Revuz, Minimisation of acyclic deterministic automata in linear time, Theoretical Computer Science, vol.92, issue.1, pp.181-189, 1992.
URL : https://hal.archives-ouvertes.fr/hal-00619678

A. Singhal and D. E. Seborg, Matching patterns from historical data using PCA and distance similarity factors, Proceedings of the American Control Conference, vol.2, pp.1759-1764, 2001.

T. Smith and M. Waterman, Identification of common molecular subsequences, Journal of Molecular Biology, vol.147, issue.1, pp.195-197, 1981.

A. Subias, L. Travé-massuyès, and E. L. Corronc, Learning chronicles signing multiple scenario instances, IFAC Proceedings Volumes, vol.47, pp.10397-10402, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01162866

E. Ukkonen, On-line construction of suffix trees, Algorithmica, vol.14, issue.3, pp.249-260, 1995.

P. Weiner, Linear pattern matching algorithms, 14th Annual Symposium on Switching and Automata Theory (swat 1973), pp.1-11, 1973.