[1] Julisch K,Dacier M.Mining intrusion detection alarms for actionable knowledge[C]//Proc of the 8th ACM SIGKDD Int'l Conf.on Knowledge Discovery in Data Mining.New York:ACM Press,2002:366-375. [2]Cortes C,Fisher K,Pregibon D,et al.Hancock:A language for extracting signatures from data streams[C]//Proc of the 6th ACM SIGKDD Int'l Conf.on Knowledge Discovery in Data Mining.New York:ACM Press,2000:9-17. [3]Ng A,Fu AW.Mining frequent episodes for relating financial events and stock trends[C]//Proceedings of the 7th Pacific-Asia Conference on Knowledge Discovery and Data Mining.Seoul,2003:27-39. [4]Mannila H,Toivonen H,Verkamo A I.Discovering frequent episodes in sequences[C]//Proceedings of the 1st ACM SICKDD Conference on Knowledge Discovery and Data Mining.Montreal,1995:210-215. [5]Zhou W,Liu H,Cheng H.Mining closed episodes from event sequences efficiently[C]//The Pacific-Asia Conference on Knowledge Discovery and Data Mining(PAKDD).India.2010:310-318. [6]Tatti N,Cule B.Mining closed strict episodes[C].Sydney:IEEE International Conference on Data Mining.2010:501-510. [7]Zhu H,Wang P,Wang W,et al.Discovering frequent closed episodes from an event sequence[C].Brisbane:WCCI 2012 IEEE World Congress on Computational Intelligence.2012:2 292-2 299. [8]Zhu H,Wang P,He X,et al.Efficient episode mining with minimal and non-overlapping occurrences[C]//Proceedings of the 10th IEEE International Conference on Data Mining.Sydney,2010:1211-1216. [9]朱辉生,汪卫,施伯乐.基于最小且非重叠发生的频繁闭情节挖掘[J].计算机研究与发展,2013,50(4):852-860. Zhu Huisheng,Wang Wei,Shi Baile.Frequent closed episode mining based on minimal and non-overlapping occurrences[J].Journal of Computer Research and Development,2013,50(4):852-860.(in Chinese) [10]Wang J,Han J.BIDE:efficient mining of frequent closed sequences[C]//Proceedings of the 20th International Conference on Data Engineering.Boston:IEEE,2004:79-90.