1. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Bocca, J.B., Jarke, M., Zaniolo, C. (Eds.) Proceedings of VLDB 1994, Morgan Kaufmann, pp. 487–499 (1994)
2. Frank, A., Asuncion, A.: UCI machine learning repository. University of California, School of Information and Computer Science, Irvine, CA (2020). http://mlearn.ics.uci.edu/MLRepository.html. Accessed 7 Jan 2020
3. Lecture Notes in Computer Science;J Fürnkranz,2015
4. Grzymała-Busse, J.W., Werbrouck, P.: On the best search method in the LEM1 and LEM2 algorithms. In: Orłowska, E. (Ed.) Incomplete Information: Rough Set Analysis, Studies in Fuzziness and Soft Computing, vol. 13, pp. 75–91 (1998)
5. Jian, Z., Sakai, H., Watada, J., Roy, A., Hassan, M.: An A priori-based data analysis on suspicious network event recognition. In: Roger, B., Carlo, Z., (Eds.) Proceedings of IEEE Big Data, pp. 5888–5896 (2019)