1. Van der Aalst, W.M., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Theor. Comput. Sci. 121, 3–21 (2005)
2. Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Very Large Data Bases, vol. 1215, pp. 487–499 (1994)
3. Bezerra, F., et al.: Anomaly detection using process mining. Enterp. Bus. Process Inf. Syst. Model. 29, 149–161 (2009)
4. Böhmer, K., Rinderle-Ma, S.: Anomaly detection in business process runtime behavior-challenges and limitations. arXiv arXiv:1705.06659 (2017)
5. Lecture Notes in Computer Science;K Böhmer,2017