Anomaly detection algorithms in logs of process aware systems
暂无分享,去创建一个
[1] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[2] Andrew W. Moore,et al. Detecting anomalous patterns in pharmacy retail data , 2005 .
[3] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[4] Dimitrios Gunopulos,et al. Mining Process Models from Workflow Logs , 1998, EDBT.
[5] Steven K. Donoho,et al. Early detection of insider trading in option markets , 2004, KDD.
[6] Christos Faloutsos,et al. Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.
[7] Wil M. P. van der Aalst,et al. Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance , 2005, WISP@ICATPN.
[8] Deepak K. Agarwal,et al. An empirical Bayes approach to detect anomalies in dynamic multidimensional arrays , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[9] Jacques Wainer,et al. A Workflow Mining Method Through Model Rewriting , 2005, CRIWG.