{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T02:17:17Z","timestamp":1774059437018,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319756073","type":"print"},{"value":"9783319756080","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75608-0_4","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T11:15:15Z","timestamp":1521630915000},"page":"37-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Process Mining Approach to the Identification of Normal and Suspect Traffic Behavior"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ferilli","sequence":"first","affiliation":[]},{"given":"Domenico","family":"Redavid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"van der Aalst, W. 1998. The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers 8: 21\u201366.","DOI":"10.1142\/S0218126698000043"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"van der Aalst, W., T. Weijters, and L. Maruster. 2004. Workflow mining: Discovering process models from event logs. IEEE Transactions on Knowledge and Data Engineering 16: 1128\u20131142.","DOI":"10.1109\/TKDE.2004.47"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., D. Gunopulos, and F. Leymann. 1998. Mining process models from workflow logs, Proceedings of the 6th International Conference on Extending Database Technology (EDBT).","DOI":"10.1007\/BFb0101003"},{"key":"4_CR4","unstructured":"Cook, J., and A. Wolf. 1996. Discovering models of software processes from event-based data. Tech. Rep. CU-CS-819-96, Department of Computer Science, University of Colorado."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Coradeschi, S., A. Cesta, G. Cortellessa, L. Coraci, J. Gonzalez, L. Karlsson, F. Furfari, A. Loutfi, A. Orlandini, F. Palumbo, F. Pecora, S. von Rump, A. \u0160timec, J. Ullberg, and B. tslund. 2013. Giraffplus: Combining social interaction and long term monitoring for promoting independent living. Proeedings of the 6th International Conference on Human System Interaction (HSI) 578\u2013585, IEEE.","DOI":"10.1109\/HSI.2013.6577883"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Ferilli, S. 2014. Woman: Logic-based workflow learning and management. IEEE Transaction on Systems, Man and Cybernetics: Systems 44: 744\u2013756.","DOI":"10.1109\/TSMC.2013.2273310"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Ferilli, S., and F. Esposito. 2013. A logic framework for incremental learning of process models. Fundamenta Informaticae 128: 413\u2013443.","DOI":"10.3233\/FI-2013-951"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Ferilli, S., D. Redavid, and S. Angelastro. 2016. Predicting process behavior in woman. In Advances in Artificial Intelligence: AI*IA2016, vol. 10037, ed. G. Adorni, S. Cagnoni, M. Gori, and M. Maratea, 308\u2013320., Lecture Notes in Artificial Intelligence Berlin: Springer.","DOI":"10.1007\/978-3-319-49130-1_23"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Ferilli, S., D. Redavid, and S. Angelastro. 2017. Activity prediction in process management using the woman framework. Advances in Data Mining. Applications and Theoretical Aspects, vol. 10357, 194\u2013208., Lecture Notes in Artificial Intelligence Berlin: Springer.","DOI":"10.1007\/978-3-319-62701-4_15"},{"key":"4_CR10","unstructured":"Herbst, J., and D. Karagiannis. 1999. An inductive approach to the acquisition and adaptation of workflow models, Proceedings of the IJCAI\u201999 Workshop on Intelligent Workflow and Process Management: The New Frontier for AI in Business, pp. 52\u201357."},{"key":"4_CR11","unstructured":"2012. Process mining manifesto. Business Process Management Workshops, vol. 99, 169\u2013194., Lecture Notes in Business Information Processing Berlin: Springer."},{"key":"4_CR12","unstructured":"Lai, M. 2015. Giraffe: Using deep reinforcement learning to play chess. CoRR abs\/1509.01549 (2015), arXiv:1509.01549"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Muggleton, S. 1991. Inductive logic programming. New Generation Computing 8 (4): 295\u2013318.","DOI":"10.1007\/BF03037089"},{"key":"4_CR14","unstructured":"Oshri, B., and N. Khandwala. Predicting moves in chess using convolutional neural networks. In: Stanford University Course Project Reports \u2013 CS231n: Convolutional Neural Networks for Visual Recognition (Winter 2016), cs231n.stanford.edu\/reports\/ConvChess.pdf"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Pesic, M., and W.M.P van\u00a0der Aalst. 2006. A declarative approach for flexible business processes management, Proceedings of the 2006 International Conference on Business Process Management Workshops BPM\u201906, 169\u2013180, Springer.","DOI":"10.1007\/11837862_18"},{"key":"4_CR16","unstructured":"Weijters, A., and W. van\u00a0der Aalst. 2001. Rediscovering workflow models from event-based data, Proceedings of the 11th Dutch-Belgian Conference of Machine Learning (Benelearn 2001), ed. V. Hoste, and G.D. Pauw, pp. 93\u2013100."}],"container-title":["Advances in Intelligent Systems and Computing","Traffic Mining Applied to Police Activities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75608-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T21:30:51Z","timestamp":1604007051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75608-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756073","9783319756080"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75608-0_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}