{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:29:59Z","timestamp":1774690199348,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297326","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"494-501","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["An anomaly detection technique for business processes based on extended dynamic bayesian networks"],"prefix":"10.1145","author":[{"given":"Stephen","family":"Pauwels","sequence":"first","affiliation":[{"name":"University of Antwerp, Antwerp"}]},{"given":"Toon","family":"Calders","sequence":"additional","affiliation":[{"name":"University of Antwerp, Antwerp"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1694-0_16"},{"key":"e_1_3_2_1_2_1","unstructured":"Roel Bertens. 2017. Insight Information: from Abstract to Anomaly. Universiteit Utrecht."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939761"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795114.1795121"},{"key":"e_1_3_2_1_5_1","volume-title":"Enterprise, business-process and information systems modeling","author":"Bezerra F\u00e1bio","unstructured":"F\u00e1bio Bezerra, Jacques Wainer, and Wil MP van der Aalst. 2009. Anomaly detection using process mining. In Enterprise, business-process and information systems modeling. Springer, 149--161."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48472-3_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/645803.669364"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ismail Ilkan Ceylan Adnan Darwiche and Guy Van den Broeck. 2016. Open-World Probabilistic Databases.. In Description Logics.","DOI":"10.24963\/ijcai.2017\/669"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_3_2_1_11_1","volume-title":"Elements of information theory","author":"Cover Thomas M","unstructured":"Thomas M Cover and Joy A Thomas. 2012. Elements of information theory. John Wiley & Sons."},{"key":"e_1_3_2_1_12_1","unstructured":"Luc De Raedt Angelika Kimmig and Hannu Toivonen. 2007. ProbLog: A probabilistic Prolog and its application in link discovery. (2007)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"e_1_3_2_1_16_1","volume-title":"Inductive Logic Programming","author":"Lavrac Nada","unstructured":"Nada Lavrac and Saso Dzeroski. 1994. Inductive Logic Programming.. In WLP. Springer, 146--160."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Aleksandar Lazarevic and Vipin Kumar. 2005. Feature bagging for outlier detection. In Procs of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM 157--166. 10.1145\/1081870.1081891","DOI":"10.1145\/1081870.1081891"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"e_1_3_2_1_19_1","volume-title":"Object Management Group","author":"Model Business Process","year":"2011","unstructured":"Business Process Model. 2011. Notation (BPMN) version 2.0. OMG Specification, Object Management Group (2011), 22--31."},{"key":"e_1_3_2_1_20_1","volume-title":"DWOF: A Robust Density-Based Outlier Detection Approach. In Iberian Conference on Pattern Recognition and Image Analysis. Springer, 517--525","author":"Momtaz Rana","year":"2013","unstructured":"Rana Momtaz, Nesma Mohssen, and Mohammad A Gowayyed. 2013. DWOF: A Robust Density-Based Outlier Detection Approach. In Iberian Conference on Pattern Recognition and Image Analysis. Springer, 517--525."},{"key":"e_1_3_2_1_21_1","volume-title":"BINet: Multivariate Business Process Anomaly Detection Using Deep Learning. In International Conference on Business Process Management. Springer, 271--287","author":"Nolle Timo","year":"2018","unstructured":"Timo Nolle, Alexander Seeliger, and Max M\u00fchlh\u00e4user. 2018. BINet: Multivariate Business Process Anomaly Detection Using Deep Learning. In International Conference on Business Process Management. Springer, 271--287."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"e_1_3_2_1_23_1","volume-title":"Mining multi-dimensional complex log data. Benelearn","author":"Pauwels Stephen","year":"2016","unstructured":"Stephen Pauwels and Toon Calders. 2016. Mining multi-dimensional complex log data. Benelearn (2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"Detecting and Explaining Drifts in Yearly Grant Applications. arXiv preprint arXiv:1809.05650","author":"Pauwels Stephen","year":"2018","unstructured":"Stephen Pauwels and Toon Calders. 2018. Detecting and Explaining Drifts in Yearly Grant Applications. arXiv preprint arXiv:1809.05650 (2018)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1403886"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1671238"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824115"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2773799.2773926"},{"key":"e_1_3_2_1_31_1","volume-title":"d.}. (2015) BPI Challenge","author":"van Dongen B.F.","year":"2015","unstructured":"B.F. van Dongen. {n. d.}. (2015) BPI Challenge 2015. Eindhoven University of Technology."},{"key":"e_1_3_2_1_32_1","unstructured":"B.F. (Boudewijn) Van Dongen and F. (Florian) Borchert. 2018. Eindhoven University of Technology. Dataset."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2785635"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of Interface 2004","author":"White JV","year":"2004","unstructured":"JV White, Sam Steingold, and CG Fournelle. 2004. Performance metrics for group-detection algorithms. Proceedings of Interface 2004 (2004)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1341681.1341690"},{"key":"e_1_3_2_1_36_1","unstructured":"Nong Ye et al. 2000. A markov chain model of temporal behavior for anomaly detection. In Procs of the 2000 IEEE Systems Man and Cybernetics Information Assurance and Security Workshop Vol. 166. West Point NY 169."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656286"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","location":"Limassol Cyprus","acronym":"SAC '19","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":37,"alternative-id":["10.1145\/3297280.3297326","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297326","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}