Transaction analysis assumes discrete states/transactions, in contrast to continuous observations. A major research area is intrusion detection (ID), which aims to detect attacks against information systems, in general. There are two types of ID systems, signature-based and anomaly-based, that broadly follow the suspicious and anomalous pattern detection that was described in the previous sections. A comprehensive review of ID approaches was published by Gyanchandani, et al. (2012).
Furthermore, applications in ambient assisted living that are based on wearable sensors also fit to transaction analysis as sensing is typically event-based. Lymberopoulos, et al. (2008) proposed a system for automatic extraction of the user ...