{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:16:04Z","timestamp":1777889764956,"version":"3.51.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031161704","type":"print"},{"value":"9783031161711","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16171-1_12","type":"book-chapter","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T18:02:58Z","timestamp":1662487378000},"page":"190-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Context-Aware Deviations in\u00a0Process Executions"],"prefix":"10.1007","author":[{"given":"Gyunam","family":"Park","sequence":"first","affiliation":[]},{"given":"Janik-Vasily","family":"Benzin","sequence":"additional","affiliation":[]},{"given":"Wil M. P.","family":"van der Aalst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst, W.M.P., Adriansyah, A., van Dongen, B.F.: Replaying history on process models for conformance checking and performance analysis. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2(2), 182\u2013192 (2012)","DOI":"10.1002\/widm.1045"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2012.12","volume":"16","author":"WMP van der Aalst","year":"2012","unstructured":"van der Aalst, W.M.P., Dustdar, S.: Process mining put into context. IEEE Internet Comput. 16(1), 82\u201386 (2012)","journal-title":"IEEE Internet Comput."},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.is.2012.04.004","volume":"38","author":"F Bezerra","year":"2013","unstructured":"Bezerra, F., Wainer, J.: Algorithms for anomaly detection of traces in logs of process aware information systems. Inf. Syst. 38(1), 33\u201344 (2013)","journal-title":"Inf. Syst."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"B\u00f6hmer, K., Rinderle-Ma, S.: Anomaly detection in business process runtime behavior - challenges and limitations. CoRR abs\/1705.06659 (2017)","DOI":"10.1007\/978-3-319-65000-5_5"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-65000-5_5","volume-title":"Business Process Management","author":"K B\u00f6hmer","year":"2017","unstructured":"B\u00f6hmer, K., Rinderle-Ma, S.: Multi instance anomaly detection in business process executions. In: Carmona, J., Engels, G., Kumar, A. (eds.) BPM 2017. LNCS, vol. 10445, pp. 77\u201393. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65000-5_5"},{"key":"12_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101438","volume":"90","author":"K B\u00f6hmer","year":"2020","unstructured":"B\u00f6hmer, K., Rinderle-Ma, S.: Mining association rules for anomaly detection in dynamic process runtime behavior and explaining the root cause to users. Inf. Syst. 90, 101438 (2020)","journal-title":"Inf. Syst."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dockhorn Costa, P., Almeida, J.P.A., Ferreira Pires, L., van Sinderen, M.: Situation specification and realization in rule-based context-aware applications. In: Indulska, J., Raymond, K. (eds.) Distributed Applications and Interoperable Systems, pp. 32\u201347 (2007)","DOI":"10.1007\/978-3-540-72883-2_3"},{"issue":"4","key":"12_CR8","first-page":"304","volume":"64","author":"H Jalali","year":"2010","unstructured":"Jalali, H., Baraani, A.: Genetic-based anomaly detection in logs of process aware systems. World Acad. Sci. Eng. Technol. 64(4), 304\u2013309 (2010)","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"12_CR9","unstructured":"Kronsbein, D., Meiser, D., Leyer, M.: Conceptualisation of contextual factors for business process performance. Lecture Notes in Engineering and Computer Science 2210 (2014)"},{"key":"12_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-06257-0_6","volume-title":"Business Process Management Workshops","author":"SJJ Leemans","year":"2014","unstructured":"Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured process models from event logs containing infrequent behaviour. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013. LNBIP, vol. 171, pp. 66\u201378. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06257-0_6"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.3233\/IDA-160044","volume":"21","author":"G Li","year":"2017","unstructured":"Li, G., van der Aalst, W.M.P.: A framework for detecting deviations in complex event logs. Intell. Data Anal. 21(4), 759\u2013779 (2017)","journal-title":"Intell. Data Anal."},{"issue":"4","key":"12_CR12","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s00607-015-0441-1","volume":"98","author":"F Mannhardt","year":"2015","unstructured":"Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P.: Balanced multi-perspective checking of process conformance. Computing 98(4), 407\u2013437 (2015). https:\/\/doi.org\/10.1007\/s00607-015-0441-1","journal-title":"Computing"},{"issue":"11","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s10994-018-5702-8","volume":"107","author":"T Nolle","year":"2018","unstructured":"Nolle, T., Luettgen, S., Seeliger, A., M\u00fchlh\u00e4user, M.: Analyzing business process anomalies using autoencoders. Mach. Learn. 107(11), 1875\u20131893 (2018). https:\/\/doi.org\/10.1007\/s10994-018-5702-8","journal-title":"Mach. Learn."},{"key":"12_CR14","unstructured":"Nolle, T., Luettgen, S., Seeliger, A., M\u00fchlh\u00e4user, M.: BINet: Multi-perspective business process anomaly classification. CoRR abs\/1902.03155 (2019)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Pauwels, S.: An anomaly detection technique for business processes based on extended dynamic Bayesian networks. In: Proceedings of the ACM Symposium on Applied Computing Part, F1477, pp. 494\u2013501 (2019)","DOI":"10.1145\/3297280.3297326"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Song, R., Vanthienen, J., Cui, W., Wang, Y., Huang, L.: Towards a comprehensive understanding of the context concepts in context-aware business processes. In: Betz, S. (ed.) S-BPM ONE 2019, pp. 5:1\u20135:10 (2019)","DOI":"10.1145\/3329007.3329020"},{"key":"12_CR17","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.A.: Detecting intrusions using system calls: Alternative data models. In: 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)"},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.pmcj.2011.01.004","volume":"8","author":"J Ye","year":"2012","unstructured":"Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1), 36\u201366 (2012)","journal-title":"Pervasive Mob. Comput."}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16171-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:20:54Z","timestamp":1709832054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16171-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031161704","9783031161711"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16171-1_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"M\u00fcnster","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bpm2022.uni-muenster.de","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the BPM Forum 13 papers have been accepted out of the total of 98 submissions. The Blockchain, RPA and CEE Forum accepted 20 papers out of a total of 40 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}