Applying Non-Negative Matrix Factorization Methods to Discover User’s Resource Access Patterns for Computer Security Tasksдоклад на конференции