{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:29:58Z","timestamp":1769884198345,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T00:00:00Z","timestamp":1767398400000},"content-version":"vor","delay-in-days":2,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PID2023-149549NB-I00"],"award-info":[{"award-number":["PID2023-149549NB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PID2023-149549NB-I00"],"award-info":[{"award-number":["PID2023-149549NB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PID2023-149549NB-I00"],"award-info":[{"award-number":["PID2023-149549NB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PID2023-149549NB-I00"],"award-info":[{"award-number":["PID2023-149549NB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00607-025-01604-x","type":"journal-article","created":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T08:52:31Z","timestamp":1767430351000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting anomalous patterns in process executions"],"prefix":"10.1007","volume":"108","author":[{"given":"Pedro","family":"Gamallo-Fern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Alexandre","family":"Cabodevila","sequence":"additional","affiliation":[]},{"given":"Juan Carlos","family":"Vidal","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Lama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,3]]},"reference":[{"issue":"3","key":"1604_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.compind.2003.10.001","volume":"53","author":"WMP Aalst","year":"2004","unstructured":"Aalst WMP, Weijters AJMM (2004) Process mining: a research agenda. Comput Ind 53(3):231\u2013244","journal-title":"Comput Ind"},{"key":"1604_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6hmer K, Rinderle-Ma S (2016) Multi-perspective anomaly detection in business process execution events. In: On the move to meaningful internet systems: OTM 2016 conferences, pp 80\u201398","DOI":"10.1007\/978-3-319-48472-3_5"},{"key":"1604_CR3","doi-asserted-by":"crossref","unstructured":"Weerdt JD, Wynn MT (2022) Foundations of process event data. Process Mining Handbook, vol 448. LNBIP. Springer, Heidelberg, pp 193\u2013211","DOI":"10.1007\/978-3-031-08848-3_6"},{"key":"1604_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2004.10.013","volume":"121","author":"WMP van der Aalst","year":"2005","unstructured":"van der Aalst WMP, de Medeiros AKA (2005) Process mining and security: detecting anomalous process executions and checking process conformance. Electron Notes Theor Comput Sci 121:3\u201321","journal-title":"Electron Notes Theor Comput Sci"},{"issue":"1","key":"1604_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.is.2012.04.004","volume":"38","author":"F Bezerra","year":"2013","unstructured":"Bezerra F, Wainer J (2013) Algorithms for anomaly detection of traces in logs of process aware information systems. Inform Syst 38(1):33\u201344","journal-title":"Inform Syst"},{"key":"1604_CR6","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.cose.2018.06.002","volume":"78","author":"D Myers","year":"2018","unstructured":"Myers D, Suriadi S, Radke K, Foo E (2018) Anomaly detection for industrial control systems using process mining. Comput Secur 78:103\u2013125","journal-title":"Comput Secur"},{"issue":"1","key":"1604_CR7","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/TKDE.2024.3484159","volume":"37","author":"W Guan","year":"2025","unstructured":"Guan W, Cao J, Zhao H, Gu Y, Qian S (2025) Survey and benchmark of anomaly detection in business processes. Trans Knowl Data Eng 37(1):493\u2013512","journal-title":"Trans Knowl Data Eng"},{"issue":"11","key":"1604_CR8","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s10994-018-5702-8","volume":"107","author":"T Nolle","year":"2018","unstructured":"Nolle T, Luettgen S, Seeliger A, M\u00fchlh\u00e4user M (2018) Analyzing business process anomalies using autoencoders. Mach Learn 107(11):1875\u20131893","journal-title":"Mach Learn"},{"key":"1604_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.eswa.2019.04.052","volume":"131","author":"HTC Nguyen","year":"2019","unstructured":"Nguyen HTC, Lee S, Kim J, Ko J, Comuzzi M (2019) Autoencoders for improving quality of process event logs. Expert Syst Appl 131:132\u2013147","journal-title":"Expert Syst Appl"},{"issue":"5","key":"1604_CR10","doi-asserted-by":"publisher","first-page":"3412","DOI":"10.1109\/TSC.2023.3262405","volume":"16","author":"W Guan","year":"2023","unstructured":"Guan W, Cao J, Gu Y, Qian S (2023) GRASPED: a GRU-AE network based multi-perspective business process anomaly detection model. IEEE Trans Serv Comput 16(5):3412\u20133424","journal-title":"IEEE Trans Serv Comput"},{"key":"1604_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.procs.2021.08.005","volume":"192","author":"P Krajsic","year":"2021","unstructured":"Krajsic P, Franczyk B (2021) Semi-supervised anomaly detection in business process event data using self-attention based classification. Procedia Comput Sci 192:39\u201348","journal-title":"Procedia Comput Sci"},{"key":"1604_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107028","volume":"126","author":"GM Tavares","year":"2023","unstructured":"Tavares GM, Oyamada RS, Barbon S, Ceravolo P (2023) Trace encoding in process mining: a survey and benchmarking. Eng Appl Artif Intell 126:107028","journal-title":"Eng Appl Artif Intell"},{"key":"1604_CR13","unstructured":"Vijayakamal M, Vasumathi D (2020) Unsupervised learning methods for anomaly detection and log quality improvement using process event log. Int J Adv Sci Technol 29(1):1109\u20131125"},{"key":"1604_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2024.102405","volume":"124","author":"W Guan","year":"2024","unstructured":"Guan W, Cao J, Gu Y, Qian S (2024) GAMA: a multi-graph-based anomaly detection framework for business processes via graph neural networks. Inform Syst 124:102405","journal-title":"Inform Syst"},{"key":"1604_CR15","doi-asserted-by":"crossref","unstructured":"Lahann J, Pfeiffer P, Fettke P (2022) Lstm-based anomaly detection of process instances: Benchmark and tweaks. In: ICPM 2022 International Workshops, pp 229\u2013241","DOI":"10.1007\/978-3-031-27815-0_17"},{"key":"1604_CR16","first-page":"5998","volume":"30","author":"A Vaswani","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30:5998\u20136008","journal-title":"Adv Neural Inf Process Syst"},{"key":"1604_CR17","doi-asserted-by":"crossref","unstructured":"Jalali H, Baraani A (2012) Process aware host-based intrusion detection model. Int J Commun Networks Inf Secur 4(2):117\u2013124","DOI":"10.17762\/ijcnis.v4i2.181"},{"key":"1604_CR18","doi-asserted-by":"crossref","unstructured":"Bezerra F, Wainer J, Aalst WM (2009) Anomaly detection using process mining. In: BPMDS","DOI":"10.1007\/978-3-642-01862-6_13"},{"key":"1604_CR19","doi-asserted-by":"crossref","unstructured":"Leemans SJJ, Fahland D, Aalst WMP (2013) Discovering block-structured process models from event logs containing infrequent behaviour. In: BPM 2013 International Workshops","DOI":"10.1007\/978-3-319-06257-0_6"},{"issue":"5","key":"1604_CR20","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s00607-017-0582-5","volume":"100","author":"SJ Zelst","year":"2018","unstructured":"Zelst SJ, Dongen BF, Aalst WMP, Verbeek HMW (2018) Discovering workflow nets using integer linear programming. Computing 100(5):529\u2013556","journal-title":"Computing"},{"issue":"4","key":"1604_CR21","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s12599-023-00794-y","volume":"65","author":"J Ko","year":"2023","unstructured":"Ko J, Comuzzi M (2023) A systematic review of anomaly detection for business process event logs. Bus Inf Syst Eng 65(4):441\u2013462","journal-title":"Bus Inf Syst Eng"},{"key":"1604_CR22","doi-asserted-by":"crossref","unstructured":"Nolle T, Seeliger A, M\u00fchlh\u00e4user M (2016) Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: 19th Int Conf on Discovery Science, pp 442\u2013456","DOI":"10.1007\/978-3-319-46307-0_28"},{"issue":"6","key":"1604_CR23","doi-asserted-by":"publisher","first-page":"2745","DOI":"10.1109\/TKDE.2023.3322411","volume":"36","author":"W Guan","year":"2024","unstructured":"Guan W, Cao J, Zhao H, Gu Y, Qian S (2024) WAKE: a weakly supervised business process anomaly detection framework via a pre-trained autoencoder. IEEE Trans Knowl Data Eng 36(6):2745\u20132758","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1604_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s40537-023-00708-5","volume":"10","author":"EA Elaziz","year":"2023","unstructured":"Elaziz EA, Fathalla R, Shaheen M (2023) Deep reinforcement learning for data-efficient weakly supervised business process anomaly detection. J Big Data 10(1):33","journal-title":"J Big Data"},{"key":"1604_CR25","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.patrec.2023.05.016","volume":"171","author":"M Kwon","year":"2023","unstructured":"Kwon M, Moon Y, Lee B, Noh J (2023) Autoencoders with exponential deviation loss for weakly supervised anomaly detection. Pattern Recognit Lett 171:131\u2013137","journal-title":"Pattern Recognit Lett"},{"key":"1604_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101458","volume":"103","author":"T Nolle","year":"2022","unstructured":"Nolle T, Luettgen S, Seeliger A, M\u00fchlh\u00e4user M (2022) Binet: multi-perspective business process anomaly classification. Inf Syst 103:101458","journal-title":"Inf Syst"},{"key":"1604_CR27","doi-asserted-by":"crossref","unstructured":"Devlin J, Chang M, Lee K, Toutanova K (2019) BERT: pre-training of deep bidirectional transformers for language understanding. In: 2019 Conf. North American Chapter of the ACL: Human Language Technologies, pp 4171\u20134186","DOI":"10.18653\/v1\/N19-1423"},{"key":"1604_CR28","doi-asserted-by":"crossref","unstructured":"Clark J, Liu Z, Japkowicz N (2018) Adaptive threshold for outlier detection on data streams. In: 5th DSAA, pp 41\u201349","DOI":"10.1109\/DSAA.2018.00014"},{"key":"1604_CR29","doi-asserted-by":"crossref","unstructured":"Nolle T, Seeliger A, M\u00fchlh\u00e4user M (2018) Binet: multivariate business process anomaly detection using deep learning. In: 16th BPM, pp 271\u2013287","DOI":"10.1007\/978-3-319-98648-7_16"},{"key":"1604_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ins.2020.11.017","volume":"549","author":"J Ko","year":"2021","unstructured":"Ko J, Comuzzi M (2021) Detecting anomalies in business process event logs using statistical leverage. Inform Sci 549:53\u201367","journal-title":"Inform Sci"},{"issue":"6","key":"1604_CR31","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TEVC.2022.3208110","volume":"26","author":"J Rojas-Delgado","year":"2022","unstructured":"Rojas-Delgado J, Ceberio J, Calvo B, Lozano JA (2022) Bayesian performance analysis for algorithm ranking comparison. IEEE Trans Evol Comput 26(6):1281\u20131292","journal-title":"IEEE Trans Evol Comput"},{"key":"1604_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2024.101734","volume":"26","author":"P Gamallo-Fernandez","year":"2024","unstructured":"Gamallo-Fernandez P, Rama-Maneiro E, Vidal JC, Lama M (2024) VERONA: a python library for benchmarking deep learning in business process monitoring. SoftwareX 26:101734","journal-title":"SoftwareX"},{"issue":"1","key":"1604_CR33","first-page":"739","volume":"16","author":"E Rama-Maneiro","year":"2023","unstructured":"Rama-Maneiro E, Vidal JC, Lama M (2023) Deep learning for predictive business process monitoring: Review and benchmark. IEEE Trans Serv Comput 16(1):739\u2013756","journal-title":"IEEE Trans Serv Comput"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01604-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01604-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01604-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:19:15Z","timestamp":1769836755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01604-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["1604"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01604-x","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"23 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"19"}}