{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:18Z","timestamp":1740100458820,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009950","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1109\/iscmi53840.2021.9654821","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T00:46:48Z","timestamp":1640825208000},"page":"48-52","source":"Crossref","is-referenced-by-count":0,"title":["Attention-Based Anomaly Detection in Hospital Process Event Data"],"prefix":"10.1109","author":[{"given":"Philippe","family":"Krajsic","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Franczyk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Improving Process Discover Results by Filtering Outliers using Conditional Behavioral Probabilities","author":"sani","year":"2017","journal-title":"Lecture Notes in Business Information Processing"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-319-91563-0_3"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-030-63119-2_47"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.5220\/0010375905670574"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-93931-5_9"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.artmed.2015.09.001"},{"key":"ref16","first-page":"174","article-title":"Evaluating Trace Encoding Methods in Process Mining","volume":"12611","author":"junior","year":"2021","journal-title":"From Data to Models and Back DataMod 2020 Lecture Notes in Computer Science"},{"key":"ref17","first-page":"5998","article-title":"Attention Is All You Need","author":"vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"year":"2011","author":"van dongen","article-title":"Real-life event logs - Hospital log","key":"ref18"},{"year":"2021","article-title":"Github","key":"ref19"},{"key":"ref4","first-page":"1366","article-title":"Efficient Process Discovery From Event Streams Using Sequential Pattern Matching","volume":"15","author":"hassani","year":"2015","journal-title":"IEEE Proc of SSCI&#x2019;"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-38697-8_17"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-319-46397-1_26"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TKDE.2017.2720601"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICDE.2015.7113270"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-540-68123-6_17"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TKDE.2004.47"},{"year":"2016","author":"van der aalst","article-title":"Process Mining. Data Science in Action","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TKDE.2016.2614680"}],"event":{"name":"2021 8th International Conference on Soft Computing & Machine Intelligence (ISCMI)","start":{"date-parts":[[2021,11,26]]},"location":"Cario, Egypt","end":{"date-parts":[[2021,11,27]]}},"container-title":["2021 8th International Conference on Soft Computing &amp; Machine Intelligence (ISCMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9654797\/9654798\/09654821.pdf?arnumber=9654821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:06Z","timestamp":1652202006000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9654821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscmi53840.2021.9654821","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]}}}