1. Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D.: An Analysis of Private Browsing Modes in Modern Browsers. In: Proceedings of Usenix Security (2010)
2. Baoyao, Z.: Intelligent Web Usage Mining (2004)
3. Lecture Notes in Artificial Intelligence;K. Becker,2000
4. Farley, J.D.: The N.S.A.’s Math Problem. The New York Times (May 16, 2006)
5. Ganapathy, V., King, D., Jaeger, T., Jha, S.: Mining Security-Sensitive Operations in Legacy Code using Concept Analysis. In: Proceedings of the 29th International Conference on Software Engineering (2007)