{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:02:30Z","timestamp":1773172950017,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031057595","type":"print"},{"value":"9783031057601","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05760-1_15","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T07:03:06Z","timestamp":1652425386000},"page":"248-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Analysis of Online Event Streams: Predicting the Next Activity for Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8089-0960","authenticated-orcid":false,"given":"Suhwan","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9844-3330","authenticated-orcid":false,"given":"Xixi","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9634-5852","authenticated-orcid":false,"given":"Hajo A.","family":"Reijers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,14]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-49851-4_1","volume-title":"Process Mining","author":"WMP van der Aalst","year":"2016","unstructured":"van der Aalst, W.M.P.: Data science in action. In: Process Mining, pp. 3\u201323. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49851-4_1"},{"key":"15_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-74030-0_12","volume-title":"Business Process Management Workshops","author":"A Burattin","year":"2018","unstructured":"Burattin, A., Carmona, J.: A framework for online conformance checking. In: Teniente, E., Weidlich, M. (eds.) BPM 2017. LNBIP, vol. 308, pp. 165\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74030-0_12"},{"key":"15_CR3","unstructured":"Burattin, A., Sperduti, A., van der Aalst, W.M.P.: Heuristics miners for streaming event data. arXiv preprint arXiv:1212.6383 (2012)"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A., et al.: Fundamentals of Business Process Management, vol. 1. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-662-56509-4","DOI":"10.1007\/978-3-662-56509-4"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Ghionna, L., Greco, G., Guzzo, A., Pontieri, L.: Outlier detection techniques for process mining applications. In: An, A., Matwin, S., Ra\u015b, Z.W. (eds.) ISMIS 2008. LNCS (LNAI), vol. 4994, pp. 150\u2013159. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68123-6_17","DOI":"10.1007\/978-3-540-68123-6_17"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Guo, H., Meamari, E., Shen, C.C.: Blockchain-inspired event recording system for autonomous vehicles. In: 2018 1st IEEE international conference on hot information-centric networking (HotICN), pp. 218\u2013222. IEEE (2018)","DOI":"10.1109\/HOTICN.2018.8606016"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Hulten, G., Spencer, L., Domingos, P.: Mining time-changing data streams. In: Proceedings of the seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 97\u2013106 (2001)","DOI":"10.1145\/502512.502529"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Khatuya, S., Ganguly, N., Basak, J., Bharde, M., Mitra, B.: Adele: anomaly detection from event log empiricism. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2114\u20132122. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8486257"},{"key":"15_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-030-72693-5_15","volume-title":"Process Mining Workshops","author":"J Ko","year":"2021","unstructured":"Ko, J., Comuzzi, M.: Online anomaly detection using statistical leverage for streaming business process events. In: Leemans, S., Leopold, H. (eds.) ICPM 2020. LNBIP, vol. 406, pp. 193\u2013205. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-72693-5_15"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Kolozali, S., Bermudez-Edo, M., Puschmann, D., Ganz, F., Barnaghi, P.: A knowledge-based approach for real-time IoT data stream annotation and processing. In: 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), pp. 215\u2013222. IEEE (2014)","DOI":"10.1109\/iThings.2014.39"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23063-4_21","volume-title":"Business Process Management","author":"A Leontjeva","year":"2015","unstructured":"Leontjeva, A., Conforti, R., Di Francescomarino, C., Dumas, M., Maggi, F.M.: Complex symbolic sequence encodings for predictive monitoring of business processes. In: Motahari-Nezhad, H.R., Recker, J., Weidlich, M. (eds.) BPM 2015. LNCS, vol. 9253, pp. 297\u2013313. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23063-4_21"},{"key":"15_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-319-42887-1_11","volume-title":"Business Process Management Workshops","author":"X Lu","year":"2016","unstructured":"Lu, X., Fahland, D., van den Biggelaar, F.J.H.M., van der Aalst, W.M.P.: Detecting deviating behaviors without models. In: Reichert, M., Reijers, H.A. (eds.) BPM 2015. LNBIP, vol. 256, pp. 126\u2013139. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42887-1_11"},{"key":"15_CR13","first-page":"1","volume":"17","author":"M Maisenbacher","year":"2017","unstructured":"Maisenbacher, M., Weidlich, M.: Handling concept drift in predictive process monitoring. SCC 17, 1\u20138 (2017)","journal-title":"SCC"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.eswa.2019.04.052","volume":"131","author":"HTC Nguyen","year":"2019","unstructured":"Nguyen, H.T.C., Lee, S., Kim, J., Ko, J., Comuzzi, M.: Autoencoders for improving quality of process event logs. Expert Syst. Applicat. 131, 132\u2013147 (2019)","journal-title":"Expert Syst. Applicat."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Nolle, T., Luettgen, S., Seeliger, A., M\u00fchlh\u00e4user, M.: Binet: multi-perspective business process anomaly classification. Inf. Syst. 103 (2022). Article no. 101458","DOI":"10.1016\/j.is.2019.101458"},{"key":"15_CR16","unstructured":"Paszke, A., et al.: Pytorch: an imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, vol. 32, pp. 8026\u20138037 (2019)"},{"key":"15_CR17","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Sani, M.F., van Zelst, S.J., van\u00a0der Aalst, W.M.P.: Improving process discovery results by filtering outliers using conditional behavioural probabilities. In: Teniente, E., Weidlich, M. (eds.) BPM 2017. LNBIP, vol. 308, pp. 216\u2013229. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74030-0_16","DOI":"10.1007\/978-3-319-74030-0_16"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Savickas, T., Vasilecas, O.: Belief network discovery from event logs for business process analysis. Comput. Ind. 100, 258\u2013266 (2018). Article no. 101458","DOI":"10.1016\/j.compind.2018.04.020"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Tavares, G.M., Ceravolo, P., Da Costa, V.G.T., Damiani, E., Junior, S.B.: Overlapping analytic stages in online process mining. In: 2019 IEEE International Conference on Services Computing (SCC), pp. 167\u2013175. IEEE (2019)","DOI":"10.1109\/SCC.2019.00037"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Teinemaa, I., Dumas, M., Rosa, M.L., Maggi, F.M.: Outcome-oriented predictive process monitoring: review and benchmark. ACM Trans. Knowl. Discov. Data (TKDD) 13(2), 1\u201357 (2019). 101458","DOI":"10.1145\/3301300"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Vertuam Neto, R., Tavares, G., Ceravolo, P., Barbon, S.: On the use of online clustering for anomaly detection in trace streams. In: XVII Brazilian Symposium on Information Systems, pp. 1\u20138 (2021)","DOI":"10.1145\/3466933.3466979"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"van Zelst, S.J., Fani Sani, M., Ostovar, A., Conforti, R., La Rosa, M.: Filtering spurious events from event streams of business processes. In: Krogstie, J., Reijers, H.A. (eds.) CAiSE 2018. LNCS, vol. 10816, pp. 35\u201352. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91563-0_3","DOI":"10.1007\/978-3-319-91563-0_3"}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05760-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:44:50Z","timestamp":1710258290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05760-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031057595","9783031057601"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05760-1_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rcis-conf.com\/rcis2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}