Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications 2018
DOI: 10.1145/3289402.3289537
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Dataflow Anomalies in Business Process An Overview of Modeling Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…To gather the data needed to model a process, event logs and Open Platform Communications Unified Architecture (OPC/UA) communication protocol are used (Conforti et al 2017;Cavalieri, Salafia, and Scroppo 2019;van der Aalst 2018). Log automaton, Petri nets and data flow matrix-based approaches deal with detection of data anomalies, while statistical analysis aims to reduce data dimensionality and perform 'data preparation' activities (Guzikowski et al 2010;Conforti et al 2017;Chadli et al 2018). Ontology, NoSQL databases and relational data modelling support 'data representation', while Extensible Stylesheet Language Transformations enables 'data transformation' (Gruber 2009;Meyer et al 2013;Krenczyk and Jagodzinski 2015;Meyer et al 2015;Hassani and Ghannouchi 2017).…”
Section: Planmentioning
confidence: 99%
“…To gather the data needed to model a process, event logs and Open Platform Communications Unified Architecture (OPC/UA) communication protocol are used (Conforti et al 2017;Cavalieri, Salafia, and Scroppo 2019;van der Aalst 2018). Log automaton, Petri nets and data flow matrix-based approaches deal with detection of data anomalies, while statistical analysis aims to reduce data dimensionality and perform 'data preparation' activities (Guzikowski et al 2010;Conforti et al 2017;Chadli et al 2018). Ontology, NoSQL databases and relational data modelling support 'data representation', while Extensible Stylesheet Language Transformations enables 'data transformation' (Gruber 2009;Meyer et al 2013;Krenczyk and Jagodzinski 2015;Meyer et al 2015;Hassani and Ghannouchi 2017).…”
Section: Planmentioning
confidence: 99%
“…Modeling and validation of data flow are very important for anomaly detection; thus, Chadli et al [2] explain three approaches that are used for detecting data flow anomalies and its proper method and tools. Tao and Fang [11] opt for workflow nets with tables (WFT-nets) to model workflow systems and detect inconsistent data.…”
Section: Application Of Data Flowmentioning
confidence: 99%
“…The data flow that is represented by data objects (depicted by parallelogram) and is associated with tasks as their input or output, respectively, is often overlooked. Recently, many researchers are starting to take the data flow seriously and use it to create greater value especially, in the data privacy protection and data anomaly detection tasks [2]. Referring to Figure 1, the black part is the business process diagram, which illustrates the execution sequence of the business process.…”
Section: Introductionmentioning
confidence: 99%