Business Process Impact Visualization and Anomaly Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Business process impact visualization and anomaly detection

Received: 25 February 2005 Revised: 29 November 2005 Accepted: 3 January 2006; Online publication date: 10 April 2006 Abstract Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes of complex data. The operational data are instances of the process flow, taking different p...

متن کامل

Anomaly Detection Algorithms in Business Process Logs

In some domains of application, like software development and health care processes, a normative business process system (e.g. workflow management system) is not appropriate because a flexible support is needed to the participants. On the other hand, while it is important to support flexibility of execution in these domains, security requirements can not be met whether these systems do not offe...

متن کامل

Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations

Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security. For such “classic” application domains a wide range of surveys and literature reviews exist already – which is not the case for the process domain. Hence, this systematic literature review strives to provide an organized holistic ...

متن کامل

Multi-perspective Anomaly Detection in Business Process Execution Events

Ensuring anomaly-free process model executions is crucial in order to prevent fraud and security breaches. Existing anomaly detection approaches focus on the control flow, point anomalies, and struggle with false positives in the case of unexpected events. By contrast, this paper proposes an anomaly detection approach that incorporates perspectives that go beyond the control flow, such as, time...

متن کامل

Cyber Security Network Anomaly Detection and Visualization

In this Major Qualifying Project, we present a novel anomaly detection system for computer networks and a visualization system to help users explore network captures. The detection algorithm uses Robust Principal Component Analysis to produce a lower dimensional subspace of the original data for which a sparse matrix of outliers occurs. This low dimensional data subspace is determined by a nove...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Visualization

سال: 2006

ISSN: 1473-8716,1473-8724

DOI: 10.1057/palgrave.ivs.9500115