Discovering models of software processes from event-based data
ACM Transactions on Software Engineering and Methodology (TOSEM)
Data Mining and Knowledge Discovery
Mining Process Models from Workflow Logs
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Workflow mining: a survey of issues and approaches
Data & Knowledge Engineering
Process mining: a research agenda
Computers in Industry - Special issue: Process/workflow mining
Computers in Industry - Special issue: Process/workflow mining
Mining exact models of concurrent workflows
Computers in Industry - Special issue: Process/workflow mining
Discovering workflow models from activities' lifespans
Computers in Industry - Special issue: Process/workflow mining
Discovering models of behavior for concurrent workflows
Computers in Industry - Special issue: Process/workflow mining
Early detection of insider trading in option markets
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
An Empirical Bayes Approach to Detect Anomalies in Dynamic Multidimensional Arrays
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Interactive workflow mining: requirements, concepts and implementation
Data & Knowledge Engineering - Special issue: Business process management
Netprobe: a fast and scalable system for fraud detection in online auction networks
Proceedings of the 16th international conference on World Wide Web
Anomaly detection algorithms in logs of process aware systems
Proceedings of the 2008 ACM symposium on Applied computing
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Electronic Notes in Theoretical Computer Science (ENTCS)
A workflow mining method through model rewriting
CRIWG'05 Proceedings of the 11th international conference on Groupware: design, Implementation, and Use
Conformance testing: measuring the fit and appropriateness of event logs and process models
BPM'05 Proceedings of the Third international conference on Business Process Management
Genetic process mining: a basic approach and its challenges
BPM'05 Proceedings of the Third international conference on Business Process Management
Hi-index | 0.00 |
In the last years, some large companies have been involved in scandals related to accounting and financial mismanagement, which represented a large financial damage to their stockholders. To recover the stock market confidence, certifications and manuals for best practices of governance were developed, and in some cases, harder federal laws were implemented (eg.: Sarbox, in USA). Companies adhered to these changes as a response to the market, deploying process aware information systems (PAS) and adopting the best practices of governance. On the other hand, companies demand a rapid response to strategic changes, so the adoption of normative PAS may compromise their competitiveness. That is, the companies need flexible PAS for competitiveness reasons; whereas, flexibility may compromise the security of the system because the users can execute tasks that characterize a fraudulent execution. In order to re-balance the trade-off between security and flexibility, we present in this work an anomaly detection algorithm for logs of PAS. We believe that the identification of anomalous events can help the adoption of flexible PAS without the loss of security properties.