Leveraging Anomaly Detection in Business Process with Data Stream Mining
نویسندگان
چکیده
منابع مشابه
Anomaly Detection Using Process Mining
Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, certifications and manuals for best practices of governance were developed, and in some cases, tougher federal laws were implemented (e.g. the Sarboness Oxley Act). Companies adhered to these changes adopting the best practices ...
متن کاملAnomaly Detection Algorithms in Business Process Logs
In some domains of application, like software development and health care processes, a normative business process system (e.g. workflow management system) is not appropriate because a flexible support is needed to the participants. On the other hand, while it is important to support flexibility of execution in these domains, security requirements can not be met whether these systems do not offe...
متن کاملData Mining for Anomaly Detection
Since its founding, NASA has been dedicated to the advancement of aeronautics and space science. The NASA scientific and technical information (STI) program plays a key part in helping NASA maintain this important role. The NASA STI program operates under the auspices of the Agency Chief Information Officer. It collects, organizes, provides for archiving, and disseminates NASA's STI. The NASA S...
متن کاملBusiness process impact visualization and anomaly detection
Received: 25 February 2005 Revised: 29 November 2005 Accepted: 3 January 2006; Online publication date: 10 April 2006 Abstract Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes of complex data. The operational data are instances of the process flow, taking different p...
متن کاملAnomaly Detection in Business Process Runtime Behavior - Challenges and Limitations
Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security. For such “classic” application domains a wide range of surveys and literature reviews exist already – which is not the case for the process domain. Hence, this systematic literature review strives to provide an organized holistic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: iSys - Brazilian Journal of Information Systems
سال: 2019
ISSN: 1984-2902
DOI: 10.5753/isys.2019.383