File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

MarcoComuzzi

Comuzzi, Marco
Intelligent Enterprise Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.startPage 102488 -
dc.citation.title DATA & KNOWLEDGE ENGINEERING -
dc.citation.volume 160 -
dc.contributor.author Ko, Jonghyeon -
dc.contributor.author Comuzzi, Marco -
dc.contributor.author Maggi, Fabrizio Maria -
dc.date.accessioned 2025-07-24T09:30:00Z -
dc.date.available 2025-07-24T09:30:00Z -
dc.date.created 2025-07-24 -
dc.date.issued 2025-11 -
dc.description.abstract Event log anomaly detection and log repairing concern the identification of anomalous traces in an event log and the reconstruction of a correct trace for the anomalous ones, respectively. Trace-level anomalies in event logs often appear according to specific patterns, such events inserted, repeated, or skipped. This paper proposes P-BEAR (Pattern-Based Event Log Anomaly Reconstruction), a semi-supervised pattern-based anomaly detection and log repairing approach that exploits the pattern-based nature of trace-level anomalies in event logs. P-BEAR captures, in a set of ad-hoc graphs, the behaviour of clean traces in a log and uses these to identify anomalous traces, determine the specific anomaly pattern that applies to them, and then reconstruct the correct trace. The proposed approach is evaluated using artificial and real event logs against traditional trace alignment in conformance checking, the edit distance-based alignment method, and an unsupervised method based on deep learning. Overall, the proposed method outperforms the alignment method in anomalous trace reconstruction while providing interpretability with respect to anomaly pattern classification. P-BEAR is also quicker to execute, and its performance is more balanced across different types of anomaly patterns. -
dc.identifier.bibliographicCitation DATA & KNOWLEDGE ENGINEERING, v.160, pp.102488 -
dc.identifier.doi 10.1016/j.datak.2025.102488 -
dc.identifier.issn 0169-023X -
dc.identifier.scopusid 2-s2.0-105010684971 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/87520 -
dc.identifier.wosid 001547958400001 -
dc.language 영어 -
dc.publisher ELSEVIER -
dc.title Detecting and repairing anomaly patterns in business process event logs -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Artificial IntelligenceComputer Science, Information Systems -
dc.relation.journalResearchArea Computer Science -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Business processMining methods and algorithmsEvent log qualityAnomaly patternAnomaly reconstruction -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.