Discovering models of software processes from event-based data
ACM Transactions on Software Engineering and Methodology (TOSEM)
Information Retrieval
Data Mining and Knowledge Discovery
Mining Process Models from Workflow Logs
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Workflow mining: a survey of issues and approaches
Data & Knowledge Engineering
Process mining: a research agenda
Computers in Industry - Special issue: Process/workflow mining
Computers in Industry - Special issue: Process/workflow mining
Mining exact models of concurrent workflows
Computers in Industry - Special issue: Process/workflow mining
Discovering workflow models from activities' lifespans
Computers in Industry - Special issue: Process/workflow mining
Discovering models of behavior for concurrent workflows
Computers in Industry - Special issue: Process/workflow mining
Early detection of insider trading in option markets
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
Process Aware Information Systems: Bridging People and Software Through Process Technology
Process Aware Information Systems: Bridging People and Software Through Process Technology
Interactive workflow mining: requirements, concepts and implementation
Data & Knowledge Engineering - Special issue: Business process management
Discovering Expressive Process Models by Clustering Log Traces
IEEE Transactions on Knowledge and Data Engineering
Netprobe: a fast and scalable system for fraud detection in online auction networks
Proceedings of the 16th international conference on World Wide Web
Rediscovering workflow models from event-based data using little thumb
Integrated Computer-Aided Engineering
Conformance checking of processes based on monitoring real behavior
Information Systems
Anomaly detection algorithms in logs of process aware systems
Proceedings of the 2008 ACM symposium on Applied computing
On a Quest for Good Process Models: The Cross-Connectivity Metric
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
ACM Computing Surveys (CSUR)
Robust Process Discovery with Artificial Negative Events
The Journal of Machine Learning Research
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Electronic Notes in Theoretical Computer Science (ENTCS)
Process Mining: Discovery, Conformance and Enhancement of Business Processes
Process Mining: Discovery, Conformance and Enhancement of Business Processes
Process compliance analysis based on behavioural profiles
Information Systems
Towards Forensic Data Flow Analysis of Business Process Logs
IMF '11 Proceedings of the 2011 Sixth International Conference on IT Security Incident Management and IT Forensics
Process diagnostics using trace alignment: Opportunities, issues, and challenges
Information Systems
Detecting implicit dependencies between tasks from event logs
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
The prom framework: a new era in process mining tool support
ICATPN'05 Proceedings of the 26th international conference on Applications and Theory of Petri Nets
A workflow mining method through model rewriting
CRIWG'05 Proceedings of the 11th international conference on Groupware: design, Implementation, and Use
Conformance testing: measuring the fit and appropriateness of event logs and process models
BPM'05 Proceedings of the Third international conference on Business Process Management
Genetic process mining: a basic approach and its challenges
BPM'05 Proceedings of the Third international conference on Business Process Management
Investigations on Stochastic Information Control Nets
Information Sciences: an International Journal
Efficient recovery of missing events
Proceedings of the VLDB Endowment
Hi-index | 0.00 |
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One of the algorithms only marks as potential anomalies traces that are infrequent in the log. The other three algorithms: threshold, iterative and sampling are based on mining a process model from the log, or a subset of it. The algorithms were evaluated on a set of 1500 artificial logs, with different profiles on the number of anomalous traces and the number of times each anomalous traces was present in the log. The sampling algorithm proved to be the most effective solution. We also applied the algorithm to a real log, and compared the resulting detected anomalous traces with the ones detected by a different procedure that relies on manual choices.