“…Examples include detecting network intrusion or network failure , Idé and Kashima, 2004, credit card fraud [Bolton and Hand, 2001], calling card and telecommunications fraud [Cortes et al, 2002, Taniguchi et al, 1998, auto insurance fraud [Phua et al, 2004], health insurance claim errors [Kumar et al, 2010], accounting inefficiencies [McGlohon et al, 2009], email and Web spam [Castillo et al, 2007], opinion deception and reviews spam [Ott et al, 2012], auction fraud [Pandit et al, 2007], tax evasion [Abe et al, 2010, Wu et al, 2012, customer activity monitoring and user profiling Provost, 1996, 1999], click fraud [Jansen, 2008, Kshetri, 2010, securities fraud [Neville et al, 2005], malicious cargo shipments [Das andSchneider, 2007, Eberle andHolder, 2007] malware/spyware detection [Invernizzi and Comparetti, 2012, Ma et al, 2009, Provos et al, 2007, false advertising , data-center monitoring [Li et al, 2011b], insider threat [Eberle and Holder, 2009], image/video surveillance [Damnjanovic et al, 2008, Krausz andHerpers, 2010], and many others.…”