Mining actionable behavioral rules from group data

Peng Su, Wenji Mao, Daniel Zeng, Huimin Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Many security-related applications can benefit from constructing models to predict the behavior of an entity. However, such models do not provide the user with explicit knowledge that can be directly used to influence the behavior for his/her interest. This type of knowledge is called actionable knowledge. Actionability is a very important aspect of the interestingness of mined patterns. In this paper, we formally define a new problem of mining actionable behavioral rules from group data. We also propose an algorithm for solving the problem. Using terrorism group data, our experiment shows the validity of our approach as well as the practical value of our defined problem in security informatics.

Original languageEnglish (US)
Title of host publicationProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011
Pages181-183
Number of pages3
DOIs
StatePublished - Sep 22 2011
Event2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011 - Beijing, China
Duration: Jul 10 2011Jul 12 2011

Publication series

NameProceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011

Other

Other2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011
CountryChina
CityBeijing
Period7/10/117/12/11

Keywords

  • Actionable behavioral rules
  • Actionable knowledge discovery
  • actionability

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Fingerprint Dive into the research topics of 'Mining actionable behavioral rules from group data'. Together they form a unique fingerprint.

  • Cite this

    Su, P., Mao, W., Zeng, D., & Zhao, H. (2011). Mining actionable behavioral rules from group data. In Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011 (pp. 181-183). [5983996] (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011). https://doi.org/10.1109/ISI.2011.5983996