Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations

@article{Bhmer2017AnomalyDI,
  title={Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations},
  author={Kristof B{\"o}hmer and Stefanie Rinderle-Ma},
  journal={ArXiv},
  year={2017},
  volume={abs/1705.06659}
}
Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security. For such "classic" application domains a wide range of surveys and literature reviews exist already - which is not the case for the process domain. Hence, this systematic literature review strives to provide an organized holistic view on research related to business process runtime behavior anomaly detection. For this the unique… CONTINUE READING

References

Publications referenced by this paper.
SHOWING 1-10 OF 49 REFERENCES

Internet of things data protection and privacy in the era of the general data protection regulation

A. Chaudhuri
  • Data Protection & Privacy, vol. 1, no. 1, pp. 64–75, 2016.
  • 2016

Separation of Concerns in Analysis of Artifact Anomalies within Workflow Models

  • 2016 Third International Conference on Trustworthy Systems and their Applications (TSA)
  • 2016
VIEW 1 EXCERPT