共 50 条
- [11] Anomaly Detection Algorithms in Logs of Process Aware Systems [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 951 - 952
- [13] Explanation of Anomalies in Business Process Event Logs with Linguistic Summaries [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2022,
- [14] FARE: Schema-Agnostic Anomaly Detection in Social Event Logs [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2019), 2019, : 337 - 350
- [15] Converting Unstructured System Logs into Structured Event List for Anomaly Detection [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
- [16] Anomaly detection in business processes logs using social network analysis [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 127 - 139
- [18] Fraud Detection on Event Logs of Goods and Services Procurement Business Process Using Heuristics Miner Algorithm [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND SYSTEMS (ICTS), 2016, : 249 - 254
- [20] Log Delta Analysis: Interpretable Differencing of Business Process Event Logs [J]. BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 386 - 405