2009
DOI: 10.1007/978-3-642-01862-6_13
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Using Process Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
47
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 66 publications
(47 citation statements)
references
References 15 publications
0
47
0
Order By: Relevance
“…That is, the method loops through the steps of mining the ''most appropriate model'' (in that case using heuristic mining) and removing all instances of one or more activities that makes the mined model particularly complex. [8] does not propose an automatic method to select the activities that are ''causing'' the complexity of the mined model, and thus that selection was necessarily performed by a specialist. Once the activity or activities are selected, all instances of those activities are removed from all traces.…”
Section: Example With a Real Logmentioning
confidence: 99%
See 3 more Smart Citations
“…That is, the method loops through the steps of mining the ''most appropriate model'' (in that case using heuristic mining) and removing all instances of one or more activities that makes the mined model particularly complex. [8] does not propose an automatic method to select the activities that are ''causing'' the complexity of the mined model, and thus that selection was necessarily performed by a specialist. Once the activity or activities are selected, all instances of those activities are removed from all traces.…”
Section: Example With a Real Logmentioning
confidence: 99%
“…The result of the most appropriate model method described in [8] to the Dutch municipality logs required the filtering out of two activities, and resulted in six traces as potential anomalies. Notice that we have no independent confirmation that those six traces were anomalous, or that there was no other anomalies among the traces deemed ''normal''.…”
Section: Example With a Real Logmentioning
confidence: 99%
See 2 more Smart Citations
“…By the intervention of cost inclusion factor, the solution gets more realistic. Bezerra (2009) propose a method to detect anomalies by using a process mining technique. First, the log gets trimmed by scoping.…”
Section: Anomaly Detection Using Process Miningmentioning
confidence: 99%