共 50 条
- [2] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
- [3] Unsupervised Anomaly Detection in Noisy Business Process Event Logs Using Denoising Autoencoders [J]. DISCOVERY SCIENCE, (DS 2016), 2016, 9956 : 442 - 456
- [5] Anomaly Detection on Event Logs with a Scarcity of Labels [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [6] Sampling business process event logs with guarantees [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (13):
- [7] Discovering Business Process Architectures from Event Logs [J]. BUSINESS PROCESS MANAGEMENT FORUM (BPM 2021), 2021, 427 : 162 - 177
- [8] Mining Business Process Stages from Event Logs [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 577 - 594
- [9] A Comprehensive Review of Anomaly Detection in Web Logs [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
- [10] How to Configure Masked Event Anomaly Detection on Software Logs? [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418