{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:14:12Z","timestamp":1743027252308,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030634780"},{"type":"electronic","value":"9783030634797"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63479-7_27","type":"book-chapter","created":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T08:02:56Z","timestamp":1605600176000},"page":"389-404","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Supporting Process Mining with Recovered Residual Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8546-3017","authenticated-orcid":false,"given":"Ludwig","family":"Englbrecht","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-4482","authenticated-orcid":false,"given":"Stefan","family":"Sch\u00f6nig","sequence":"additional","affiliation":[]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,18]]},"reference":[{"key":"27_CR1","unstructured":"van der Aalst, W.M.P., Adriansyah, A., et al.: Process mining manifesto. In: Business Process Management Workshops, vol. 99, pp. 169\u2013194 (2011)"},{"issue":"5","key":"27_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","volume":"32","author":"WP van der Aalst","year":"2007","unstructured":"van der Aalst, W.P., et al.: Business process mining: an industrial application. Inf. Syst. 32(5), 713\u2013732 (2007)","journal-title":"Inf. Syst."},{"issue":"9","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/TKDE.2004.47","volume":"16","author":"WMP van der Aalst","year":"2004","unstructured":"van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128\u20131142 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"27_CR4","unstructured":"Bala, S.: Mining projects from structured and unstructured data. In: Gulden, J., et al. (eds.) CEUR Workshop Proceedings, vol. 1859, pp. 133\u2013137. CEUR-WS.org (2017)"},{"key":"27_CR5","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-319-94214-8_34","volume-title":"Business Modeling and Software Design","author":"S Bala","year":"2018","unstructured":"Bala, S., Mendling, J.: Monitoring the software development process with process mining. In: Shishkov, B. (ed.) BMSD 2018. LNBIP, vol. 319, pp. 432\u2013442. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94214-8_34"},{"key":"27_CR6","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-39891-9_11","volume-title":"Digital Forensics and Cyber Crime","author":"F Breitinger","year":"2013","unstructured":"Breitinger, F., Baier, H.: Similarity preserving hashing: eligible properties and a new algorithm. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) ICDF2C 2012. LNICST, vol. 114, pp. 167\u2013182. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39891-9_11"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"456","DOI":"10.4018\/978-1-60566-288-6.ch021","volume-title":"Handbook of Research on Business Process Modeling","author":"M Castellanos","year":"2009","unstructured":"Castellanos, M., de Medeiros, A.K.A., Mendling, J., Weber, B., Weijters, A.J.M.M.: Business process intelligence. In: Cardoso, J.S., van der Aalst, W.M.P. (eds.) Handbook of Research on Business Process Modeling, pp. 456\u2013480. IGI Global, Hershey (2009)"},{"key":"27_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-15506-2_2","volume-title":"Advances in Digital Forensics VI","author":"F Cohen","year":"2010","unstructured":"Cohen, F.: Toward a science of digital forensic evidence examination. In: Chow, K.-P., Shenoi, S. (eds.) DigitalForensics 2010. IAICT, vol. 337, pp. 17\u201335. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15506-2_2"},{"key":"27_CR9","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-030-44711-3_22","volume-title":"Innovation in Sustainable Management and Entrepreneurship","author":"D Dakic","year":"2020","unstructured":"Dakic, D., Stefanovic, D., Lolic, T., Narandzic, D., Simeunovic, N.: Event log extraction for the purpose of process mining: a systematic literature review. In: Prostean, G., Lavios Villahoz, J.J., Brancu, L., Bakacsi, G. (eds.) SIM 2019. SPBE, pp. 299\u2013312. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44711-3_22"},{"key":"27_CR10","unstructured":"Dewald, A., Freiling, F.C.: From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate (2014)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Englbrecht, L., Pernul, G.: A privacy-aware digital forensics investigation in enterprises. In: Volkamer, M., Wressnegger, C. (eds.) ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, 25\u201328 August 2020, pp. 58:1\u201358:10. ACM (2020)","DOI":"10.1145\/3407023.3407064"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.diin.2010.05.009","volume":"7","author":"SL Garfinkel","year":"2010","unstructured":"Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, 64\u201373 (2010)","journal-title":"Digit. Invest."},{"key":"27_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-25512-5_4","volume-title":"Digital Forensics and Cyber Crime","author":"V Gupta","year":"2015","unstructured":"Gupta, V., Breitinger, F.: How cuckoo filter can improve existing approximate matching techniques. In: James, J.I., Breitinger, F. (eds.) ICDF2C 2015. LNICST, vol. 157, pp. 39\u201352. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25512-5_4"},{"key":"27_CR14","series-title":"Protocols in Forensic Science","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036930","volume-title":"Principles and Practice of Criminalistics: The Profession of Forensic Science","author":"K Inman","year":"2000","unstructured":"Inman, K., Rudin, N.: Principles and Practice of Criminalistics: The Profession of Forensic Science. Protocols in Forensic Science. CRC Press, Boca Raton (2000)"},{"issue":"3","key":"27_CR15","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10207-014-0249-6","volume":"14","author":"JI James","year":"2014","unstructured":"James, J.I., Gladyshev, P.: Automated inference of past action instances in digital investigations. Int. J. Inf. Secur. 14(3), 249\u2013261 (2014). https:\/\/doi.org\/10.1007\/s10207-014-0249-6","journal-title":"Int. J. Inf. Secur."},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"K\u00e4lber, S., Dewald, A., Freiling, F.C.: Forensic application-fingerprinting based on file system metadata. In: Seventh International Conference on IT Security Incident Management and IT Forensics, pp. 98\u2013112 (2013)","DOI":"10.1109\/IMF.2013.20"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response: NIST SP 800-86 (2006)","DOI":"10.6028\/NIST.SP.800-86"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"151569","DOI":"10.1109\/ACCESS.2019.2948097","volume":"7","author":"H Li","year":"2019","unstructured":"Li, H., Xiao, F., Xiong, N.: Efficient metadata management in block-level CDP system for cyber security. IEEE Access 7, 151569\u2013151578 (2019)","journal-title":"IEEE Access"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Lu, M., Chiueh, T.: File versioning for block-level continuous data protection. In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Qu\u00e9bec, Canada, 22\u201326 June 2009, pp. 327\u2013334. IEEE Computer Society (2009)","DOI":"10.1109\/ICDCS.2009.48"},{"key":"27_CR20","unstructured":"McCreight, S., Weber, D.: System and method for entropy-based near-match analysis (2010), US Patent App. 12\/722,482"},{"key":"27_CR21","unstructured":"Meier, S.: Digitale Forensik in Unternehmen. Universit\u00e4t Regensburg, January 2017"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-319-23063-4_25","volume-title":"Business Process Management","author":"EGL de Murillas","year":"2015","unstructured":"de Murillas, E.G.L., van der Aalst, W.M.P., Reijers, H.A.: Process mining on databases: unearthing historical data from redo logs. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 367\u2013385. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_25"},{"key":"27_CR23","unstructured":"Palmer, G.: A road map for digital forensic research: Report from the first digital forensic research workshop (DFRWS). In: First Digital Forensic Research Workshop, Utica, New York, pp. 27\u201330 (2001)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Pasquier, T., et al.: Practical whole-system provenance capture. In: Proceedings of the 2017 Symposium on Cloud Computing, pp. 405\u2013418. ACM (2017)","DOI":"10.1145\/3127479.3129249"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Sheng, Y., Wang, D., He, J., Ju, D.: TH-CDP: an efficient block level continuous data protection system. In: International Conference on Networking, Architecture, and Storage, pp. 395\u2013404 (2009)","DOI":"10.1109\/NAS.2009.69"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247\u2013253. IEEE (2017)","DOI":"10.1109\/ICCKE.2017.8167885"},{"key":"27_CR27","unstructured":"Weijters, A., van der Aalst, W.M.P., de Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Technical report WP 166, 1\u201334 (2006)"},{"issue":"8","key":"27_CR28","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1007\/s12652-018-0726-2","volume":"10","author":"X Yu","year":"2018","unstructured":"Yu, X., Tan, Y., Sun, Z., Liu, J., Liang, C., Zhang, Q.: A fault-tolerant and energy-efficient continuous data protection system. J. Ambient Intell. Humaniz. Comput. 10(8), 2945\u20132954 (2018). https:\/\/doi.org\/10.1007\/s12652-018-0726-2","journal-title":"J. Ambient Intell. Humaniz. Comput."}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63479-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T00:06:25Z","timestamp":1731801985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63479-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030634780","9783030634797"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63479-7_27","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PoEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Working Conference on The Practice of Enterprise Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Riga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Latvia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poem2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/poem2020.rtu.lv\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}