Anomaly detection algorithm for business process control flow based on event log: Status and evaluation

被引:0
|
作者
Fu, Jianping [1 ]
Zhao, Haiyan [1 ]
Cao, Jian [2 ]
Chen, Qingkui [1 ]
机构
[1] School of Optoelectronic Information and Computer Engineering, University of Shanghai for Science and Technology, Shanghai,200093, China
[2] School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai,200030, China
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2024年 / 30卷 / 08期
关键词
D O I
10.13196/j.cims.2023.BPM01
中图分类号
学科分类号
摘要
引用
收藏
页码:2631 / 2643
相关论文
共 50 条
  • [1] Event log anomaly detection method based on auto-encoder and control flow
    Kan, Daoyu
    Fang, Xianwen
    MULTIMEDIA SYSTEMS, 2024, 30 (01)
  • [2] Event log anomaly detection method based on auto-encoder and control flow
    Daoyu Kan
    Xianwen Fang
    Multimedia Systems, 2024, 30
  • [3] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Ko, Jonghyeon
    Comuzzi, Marco
    BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2023, 65 (04) : 441 - 462
  • [4] A Systematic Review of Anomaly Detection for Business Process Event Logs
    Jonghyeon Ko
    Marco Comuzzi
    Business & Information Systems Engineering, 2023, 65 : 441 - 462
  • [5] Event Log-based Weaknesses Detection in Business Processes
    Schuh, G.
    Guetzlaff, A.
    Schmitz, S.
    Schopen, M.
    Broehl, F.
    2021 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEE IEEM21), 2021, : 734 - 738
  • [6] Fraud Detection on Event Log of Bank Financial Credit Business Process using Hidden Markov Model Algorithm
    Rahmawati, Dewi
    Sarno, Riyanarto
    Fatichah, Chastine
    Sunaryono, Dwi
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 35 - 40
  • [7] Log File Anomaly Detection Based on Process Mining Graphs
    Luftensteiner, Sabrina
    Praher, Patrick
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2022 WORKSHOPS, 2022, 1633 : 383 - 391
  • [8] A Control Flow Anomaly Detection Algorithm for Industrial Control Systems
    Zhang, Zhigang
    Chang, Chaowen
    Lv, Zhuo
    Han, Peisheng
    Wang, Yutong
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 286 - 293
  • [9] ADELE: Anomaly Detection from Event Log Empiricism
    Khatuya, Subhendu
    Ganguly, Niloy
    Basak, Jayanta
    Bharde, Madhumita
    Mitra, Bivas
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 2123 - 2131
  • [10] Utility-Based Control Flow Discovery from Business Process Event Logs
    Anand, Kritika
    Gupta, Nisha
    Sureka, Ashish
    BIG DATA ANALYTICS, BDA 2015, 2015, 9498 : 69 - 83