dc.creator | Bezerra, F | |
dc.creator | Wainer, J | |
dc.date | 2012 | |
dc.date | MAR | |
dc.date | 2014-08-01T18:19:13Z | |
dc.date | 2015-11-26T18:01:34Z | |
dc.date | 2014-08-01T18:19:13Z | |
dc.date | 2015-11-26T18:01:34Z | |
dc.date.accessioned | 2018-03-29T00:43:10Z | |
dc.date.available | 2018-03-29T00:43:10Z | |
dc.identifier | Information Systems. Pergamon-elsevier Science Ltd, v. 38, n. 1, n. 33, n. 44, 2012. | |
dc.identifier | 0306-4379 | |
dc.identifier | 1873-6076 | |
dc.identifier | WOS:000310173200003 | |
dc.identifier | 10.1016/j.is.2012.04.004 | |
dc.identifier | http://www.repositorio.unicamp.br/jspui/handle/REPOSIP/77128 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/77128 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1292012 | |
dc.description | This paper discusses four algorithms for detecting anomalies in logs of process aware systems. One of the algorithms only marks as potential anomalies traces that are infrequent in the log. The other three algorithms: threshold, iterative and sampling are based on mining a process model from the log, or a subset of it. The algorithms were evaluated on a set of 1500 artificial logs, with different profiles on the number of anomalous traces and the number of times each anomalous traces was present in the log. The sampling algorithm proved to be the most effective solution. We also applied the algorithm to a real log, and compared the resulting detected anomalous traces with the ones detected by a different procedure that relies on manual choices. (c) 2012 Elsevier Ltd. All rights reserved. | |
dc.description | 38 | |
dc.description | 1 | |
dc.description | 33 | |
dc.description | 44 | |
dc.language | en | |
dc.publisher | Pergamon-elsevier Science Ltd | |
dc.publisher | Oxford | |
dc.publisher | Inglaterra | |
dc.relation | Information Systems | |
dc.relation | Inf. Syst. | |
dc.rights | fechado | |
dc.rights | http://www.elsevier.com/about/open-access/open-access-policies/article-posting-policy | |
dc.source | Web of Science | |
dc.subject | Anomaly detection | |
dc.subject | Process mining | |
dc.subject | Process-aware systems | |
dc.subject | Process Models | |
dc.subject | Event Logs | |
dc.subject | Concurrent Workflows | |
dc.subject | Challenges | |
dc.subject | Framework | |
dc.subject | Behavior | |
dc.subject | Issues | |
dc.subject | Fraud | |
dc.title | Algorithms for anomaly detection of traces in logs of process aware information systems | |
dc.type | Artículos de revistas | |