Applying non-negative matrix factorization methods to discover user;s resource access patterns for computer security tasks | IEEE Conference Publication | IEEE Xplore