The presence of anomalous information in a business process event log, such as missing, duplicated or swapped events, hampers the possibility of extracting useful insights from event log analysis. A number of approaches exist in the literature to detect anomalous cases in event logs based on different paradigms, such as probabilistic, distance-based or reconstruction-based anomaly detection. This paper proposes a novel method for anomaly detection in event logs based on the information-theoretic paradigm, which has not been considered before in event log anomaly detection. In particular, we propose an anomaly score for cases of a process based on statistical leverage and three different methods to set the anomaly detection threshold. The pr...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
Business process event logs consist of the actual process followed by employees of a business by whi...
We present a novel information-theoretic framework to detect anomalous traces in business process ev...
While several techniques for detecting trace-level anomalies in event logs in offline settings have ...
Business processes allow anomalies to occur during execution. Anomaly detection aims to discover beh...
Y Event log anomaly detection aims at identifying anomalous information in the logs generated by the...
In this work, we explore approaches for detecting anomalies in system event logs. We define the syst...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
A mineração de processos é uma área que visa a usar dados de eventos para extrair informação útil so...
In some domains of application, like software development and health care processes, a normative bus...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
Business process event logs consist of the actual process followed by employees of a business by whi...
We present a novel information-theoretic framework to detect anomalous traces in business process ev...
While several techniques for detecting trace-level anomalies in event logs in offline settings have ...
Business processes allow anomalies to occur during execution. Anomaly detection aims to discover beh...
Y Event log anomaly detection aims at identifying anomalous information in the logs generated by the...
In this work, we explore approaches for detecting anomalies in system event logs. We define the syst...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
Business process event logs consist of the actual process followed by employees of a business by whi...
A mineração de processos é uma área que visa a usar dados de eventos para extrair informação útil so...
In some domains of application, like software development and health care processes, a normative bus...
Business processes are prone to subtle changes over time, as unwanted behavior slowly manifests in t...
This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One o...
Business process event logs consist of the actual process followed by employees of a business by whi...