{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T16:58:39Z","timestamp":1759683519274},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362842"},{"type":"electronic","value":"9783642362859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36285-9_69","type":"book-chapter","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T03:26:30Z","timestamp":1358997990000},"page":"701-706","source":"Crossref","is-referenced-by-count":12,"title":["A Process Deviation Analysis Framework"],"prefix":"10.1007","author":[{"given":"Beno\u00eet","family":"Depaire","sequence":"first","affiliation":[]},{"given":"Jo","family":"Swinnen","sequence":"additional","affiliation":[]},{"given":"Mieke","family":"Jans","sequence":"additional","affiliation":[]},{"given":"Koen","family":"Vanhoof","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., Sidorova, N., van Dongen, B.: Cost-based fitness in conformance checking. In: ACSD, pp. 57\u201366 (2011)","DOI":"10.1109\/ACSD.2011.19"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., van Dongen, B., Van der Aalst, W.M.P.: Conformance checking using cost-based fitness analysis. In: EDOC, pp. 55\u201364. IEEE Computer Society (2011)","DOI":"10.1109\/EDOC.2011.12"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Bezerra, F., Wainer, J.: Anomaly detection algorithms in logs of process aware systems. In: Applied Computing 2008, VOLS 1-3, pp. 951\u2013952 (2008)","DOI":"10.1145\/1363686.1363904"},{"key":"69_CR4","series-title":"LNBIP","first-page":"149","volume-title":"BPMDS 2009 and EMMSAD 2009","author":"F. Bezerra","year":"2009","unstructured":"Bezerra, F., Wainer, J., van der Aalst, W.M.P.: Anomaly Detection Using Process Mining. In: Halpin, T., Krogstie, J., Nurcan, S., Proper, E., Schmidt, R., Soffer, P., Ukor, R. (eds.) BPMDS 2009 and EMMSAD 2009. LNBIP, vol.\u00a029, pp. 149\u2013161. Springer, Heidelberg (2009)"},{"key":"69_CR5","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection - a survey. Technical report, University of Minnesota (2007)"},{"key":"69_CR6","first-page":"304","volume":"64","author":"H. Jalali","year":"2010","unstructured":"Jalali, H., Baraani, A.: Genetic-based anomaly detection in logs of process aware systems. World Academy of Science Engineering and Technology\u00a064, 304\u2013309 (2010)","journal-title":"World Academy of Science Engineering and Technology"},{"key":"69_CR7","unstructured":"Rozinat, A., de Jong, I.S.M., G\u00fcnther, C.W.: Process mining applied to the test process of wafer steppers in asml. IEEE Transactions on Systems, Mand and Cybernetics - Part C Applications and Reviews, 1\u20136 (2010)"},{"key":"69_CR8","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.is.2007.07.001","volume":"33","author":"A. Rozinat","year":"2008","unstructured":"Rozinat, A., van der Aalst, W.M.P.: Conformance checking of processes based on monitoring real behavior. Inf. Syst.\u00a033, 64\u201395 (2008)","journal-title":"Inf. Syst."},{"key":"69_CR9","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-28108-2_8","volume-title":"Business Process Management Workshops","author":"J. Swinnen","year":"2012","unstructured":"Swinnen, J., Depaire, B., Jans, M.J., Vanhoof, K.: A Process Deviation Analysis \u2013 A Case Study. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011 Workshops, Part I. LNBIP, vol.\u00a099, pp. 87\u201398. Springer, Heidelberg (2012)"},{"key":"69_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/s00766-005-0001-x","volume":"10","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P.: Business alignment: using process mining as a tool for delta analysis and conformance testing. Requirements Engineering\u00a010, 198\u2013211 (2005)","journal-title":"Requirements Engineering"},{"issue":"4","key":"69_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2004.10.013","volume":"121","author":"W.M.P. Aalst Van der","year":"2005","unstructured":"Van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: Detecting anomalous process executions and checking process conformance. Electronic Notes in Theoretical Computer Science\u00a0121(4), 3\u201321 (2005)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"69_CR12","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1016\/j.datak.2008.05.001","volume":"66","author":"B. Weber","year":"2008","unstructured":"Weber, B., Reichert, M., Rinderle-Ma, S.: Change patterns and change support features - enhancing flexibility in process-aware information systems. Data & Knowledge Engineering\u00a066, 438\u2013466 (2008)","journal-title":"Data & Knowledge Engineering"}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36285-9_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T17:34:08Z","timestamp":1557509648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36285-9_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362842","9783642362859"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36285-9_69","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}