Author:
Vidacic Tomislav,Strahonja Vjeran
Publisher
Springer International Publishing
Reference25 articles.
1. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):1–58
2. Teng H, Chen K, Lu S (1990) Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of IEEE computer society symposium on research in security and privacy. IEEE Computer Society, pp 278–284
3. Solti-Rogge A, Kunze M, Awad A, Weske M (2011) Business process configuration wizard and consistency checker for bpmn 2.0. In: 12th international conference, BPMDS 2011 and 16th international conference, EMMSAD 2011 held at CAiSE 2011, London, UK, June 2011, Proceedings. Springer, Berlin, pp 231–245
4. Awad A, Decker G, Lohmann N (2010) Diagnosing and repairing data anomalies in process models. In: Business process management workshops, BPM 2009 international workshops, Ulm, Germany, September 2009. Springer, Berlin, pp 5–16
5. Kim GW, Lee JH, Soon JH (2009) Classification and analyses of business process anomalies. In: Communication software and networks. ICCSN’09. International. pp 433–437
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献