1. Gartner says detection and response is top security priority for organizations in 2017;Gartner,2017
2. Anomaly detection using process mining;Bezerra,2009
3. Anomaly detection in business process runtime behavior–challenges and limitations;Böhmer,2017
4. A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions;Leitner;Inf. Softw. Technol.,2014
5. Clustering intrusion detection alarms to support root cause analysis;Julisch;Inf. Syst. Secur.,2003