{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:31:30Z","timestamp":1725903090190},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614601"},{"type":"electronic","value":"9783319614618"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61461-8_12","type":"book-chapter","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T10:22:58Z","timestamp":1498904578000},"page":"181-197","source":"Crossref","is-referenced-by-count":3,"title":["Subgraph Mining for Anomalous Pattern Discovery in Event Logs"],"prefix":"10.1007","author":[{"given":"Laura","family":"Genga","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Potena","sequence":"additional","affiliation":[]},{"given":"Orazio","family":"Martino","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Alizadeh","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Diamantini","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1002\/widm.1045","volume":"2","author":"W Aalst van der","year":"2012","unstructured":"van der Aalst, W., Adriansyah, A., van Dongen, B.: Replaying history on process models for conformance checking and performance analysis. Wiley Int. Rev. Data Min. Knowl. Discov. 2(2), 182\u2013192 (2012)","journal-title":"Wiley Int. Rev. Data Min. Knowl. Discov."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of Annual Symposium on Applied Computing, pp. 1709\u20131716. ACM (2012)","DOI":"10.1145\/2245276.2232051"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B.F., Zannone, N.: Controlling break-the-glass through alignment. In: Proceedings of International Conference on Social Computing, pp. 606\u2013611. IEEE (2013)","DOI":"10.1109\/SocialCom.2013.91"},{"key":"12_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-319-27243-6_3","volume-title":"Data-Driven Process Discovery and Analysis","author":"M Alizadeh","year":"2015","unstructured":"Alizadeh, M., de Leoni, M., Zannone, N.: History-based construction of alignments for conformance checking: formalization and implementation. In: Ceravolo, P., Russo, B., Accorsi, R. (eds.) SIMPDA 2014. LNBIP, vol. 237, pp. 58\u201378. Springer, Cham (2015). doi:\n10.1007\/978-3-319-27243-6_3"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Alizadeh, M., de Leoni, M., Zannone, N.: Constructing probable explanations of nonconformity: a data-aware and history-based approach. In: Proceedings of Symposium Series on Computational Intelligence, pp. 1358\u20131365. IEEE (2015)","DOI":"10.1109\/SSCI.2015.194"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-32885-5_8","volume-title":"Business Process Management","author":"S Banescu","year":"2012","unstructured":"Banescu, S., Petkovi\u0107, M., Zannone, N.: Measuring privacy compliance using fitness metrics. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 114\u2013119. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-32885-5_8"},{"issue":"11","key":"12_CR7","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1016\/j.eswa.2014.03.010","volume":"41","author":"D Borrego","year":"2014","unstructured":"Borrego, D., Barba, I.: Conformance checking and diagnosis for declarative business process models in data-aware scenarios. Expert Syst. Appl. 41(11), 5340\u20135352 (2014)","journal-title":"Expert Syst. Appl."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03848-8_12","volume-title":"Business Process Management","author":"RP Jagadeesh Chandra Bose","year":"2009","unstructured":"Jagadeesh Chandra Bose, R.P., van der Aalst, W.M.P.: Abstractions in process mining: a taxonomy of patterns. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. LNCS, vol. 5701, pp. 159\u2013175. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-03848-8_12"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Caron, F., Vanthienen, J., Baesens, B.: Comprehensive rule-based compliance checking and risk management with process mining. Decis. Support Syst. 54(3), 1357\u20131369 (2013)","DOI":"10.1016\/j.dss.2012.12.012"},{"key":"12_CR10","unstructured":"Diamantini, C., Genga, L., Potena, D.: Esub: exploration of subgraphs. In: Proceedings of the BPM Demo Session, pp. 70\u201374 (2015). CEUR-WS.org"},{"issue":"1","key":"12_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10844-016-0394-7","volume":"47","author":"C Diamantini","year":"2016","unstructured":"Diamantini, C., Genga, L., Potena, D.: Behavioral process mining for unstructured processes. J. Intell. Inf. Syst. 47(1), 5\u201332 (2016)","journal-title":"J. Intell. Inf. Syst."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Diamantini, C., Genga, L., Potena, D., van\u00a0der Aalst, W.: Building instance graphs for highly variable processes. Expert Syst. Appl. 59, 101\u2013118 (2016)","DOI":"10.1016\/j.eswa.2016.04.021"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Greco, G., Guzzo, A., Manco, G., Sacc\u00e0, D.: Mining and reasoning on workflows. IEEE Trans. Knowl. Data Eng. 17(4), 519\u2013534 (2005)","DOI":"10.1109\/TKDE.2005.63"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: ACM Sigmod Record, vol. 29, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/342009.335372"},{"key":"12_CR15","unstructured":"Holder, L., Cook, D., Djoko, S.: Substructure discovery in the SUBDUE system. In: Proceedings of the AAAI Workshop on Knowledge Discovery in Databases, pp. 169\u2013180 (1994)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Huang, Z., Lu, X., Duan, H.: On mining clinical pathway patterns from medical behaviors. Artif. Intell. Med. 56(1), 35\u201350 (2012)","DOI":"10.1016\/j.artmed.2012.06.002"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Hwang, S., Wei, C., Yang, W.: Discovery of temporal patterns from process instances. Comput. Indus. 53(3), 345\u2013364 (2004)","DOI":"10.1016\/j.compind.2003.10.006"},{"key":"12_CR18","unstructured":"Jonyer, I., Cook, D., Holder, L.: Graph-based hierarchical conceptual clustering. J. Mach. Learn. Res. 2, 19\u201343 (2002)"},{"key":"12_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-27243-6_1","volume-title":"Data-Driven Process Discovery and Analysis","author":"M Leemans","year":"2015","unstructured":"Leemans, M., Aalst, W.M.P.: Discovery of frequent episodes in event logs. In: Ceravolo, P., Russo, B., Accorsi, R. (eds.) SIMPDA 2014. LNBIP, vol. 237, pp. 1\u201331. Springer, Cham (2015). doi:\n10.1007\/978-3-319-27243-6_1\n\n. \nCEUR-ws.org"},{"key":"12_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-15895-2_7","volume-title":"Business Process Management Workshops","author":"X Lu","year":"2015","unstructured":"Lu, X., Fahland, D., Aalst, W.M.P.: Conformance checking based on partially ordered event data. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 75\u201388. Springer, Cham (2015). doi:\n10.1007\/978-3-319-15895-2_7"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Rozinat, A., van\u00a0der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst. 33(1), 64\u201395 (2008)","DOI":"10.1016\/j.is.2007.07.001"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-662-45563-0_14","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Conferences","author":"ER Taghiabadi","year":"2014","unstructured":"Taghiabadi, E.R., Gromov, V., Fahland, D., der Aalst, W.M.P.: Compliance checking of data-aware and resource-aware compliance requirements. In: Meersman, R., Panetto, H., Dillon, T., Missikoff, M., Liu, L., Pastor, O., Cuzzocrea, A., Sellis, T. (eds.) OTM 2014. LNCS, vol. 8841, pp. 237\u2013257. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-662-45563-0_14"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Valk, R., Vidal-Naquet, G.: Petri nets and regular languages. J. Comput. Syst. Sci. 23(3), 299\u2013325 (1981)","DOI":"10.1016\/0022-0000(81)90067-2"}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Mining Complex Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61461-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T10:28:24Z","timestamp":1498904904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61461-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614601","9783319614618"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61461-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}