1. Alkasassbeh, M.: An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods (2017). arXiv:1712.09623
2. Avramenko, V., Malikov, A., Kotenko, I., Saenko, I.: Combined neural network model for diagnosing computer incidents. In: 2020 CEUR Workshop Proceedings, pp. 280–294. CEUR (2020)
3. Baldi, P.: Autoencoders, unsupervised learning, and deep architectures. In: Proceedings of ICML Workshop on Unsupervised and Transfer Learning, pp. 37–49. JMLR Workshop and Conference Proceedings (2012)
4. Bose, R.J.C., Mans, R.S., van der Aalst, W.M.: Wanna improve process mining results? In: 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 127–134. IEEE (2013)
5. Cheng, H.-J., Kumar, A.: Process mining on noisy logs—can log sanitization help to improve performance? Decis. Support Syst. 79, 138–149 (2015)