
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly detection in business processes logs using social network analysis
Mina Ebrahim, Alireza Hashemi Golpayegani
Journal of Computer Virology and Hacking Techniques (2021) Vol. 18, Iss. 2, pp. 127-139
Closed Access | Times Cited: 19
Mina Ebrahim, Alireza Hashemi Golpayegani
Journal of Computer Virology and Hacking Techniques (2021) Vol. 18, Iss. 2, pp. 127-139
Closed Access | Times Cited: 19
Showing 19 citing articles:
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model
Wei Guan, Jian Cao, Yang Gu, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 5, pp. 3412-3424
Closed Access | Times Cited: 11
Wei Guan, Jian Cao, Yang Gu, et al.
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 5, pp. 3412-3424
Closed Access | Times Cited: 11
Event log anomaly detection method based on auto-encoder and control flow
Daoyu Kan, Xianwen Fang
Multimedia Systems (2024) Vol. 30, Iss. 1
Closed Access | Times Cited: 2
Daoyu Kan, Xianwen Fang
Multimedia Systems (2024) Vol. 30, Iss. 1
Closed Access | Times Cited: 2
GAMA: A multi-graph-based anomaly detection framework for business processes via graph neural networks
Wei Guan, Jian Cao, Yang Gu, et al.
Information Systems (2024) Vol. 124, pp. 102405-102405
Open Access | Times Cited: 2
Wei Guan, Jian Cao, Yang Gu, et al.
Information Systems (2024) Vol. 124, pp. 102405-102405
Open Access | Times Cited: 2
Advancing Process Audits With Process Mining: A Systematic Review of Trends, Challenges, and Opportunities
Mohammad Imran, Suraya Hamid, Maizatul Akmar Ismail
IEEE Access (2023) Vol. 11, pp. 68340-68357
Open Access | Times Cited: 6
Mohammad Imran, Suraya Hamid, Maizatul Akmar Ismail
IEEE Access (2023) Vol. 11, pp. 68340-68357
Open Access | Times Cited: 6
WAKE: A Weakly Supervised Business Process Anomaly Detection Framework via a Pre-Trained Autoencoder
Wei Guan, Jian Cao, Haiyan Zhao, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 6, pp. 2745-2758
Closed Access | Times Cited: 5
Wei Guan, Jian Cao, Haiyan Zhao, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 6, pp. 2745-2758
Closed Access | Times Cited: 5
Behavioral and Performance Analysis of a Real-Time Case Study Event Log: A Process Mining Approach
Naveed Anwer Butt, Zafar Mahmood, Muhammad Usman Sana, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4145-4145
Open Access | Times Cited: 4
Naveed Anwer Butt, Zafar Mahmood, Muhammad Usman Sana, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4145-4145
Open Access | Times Cited: 4
Social Network Mining from Natural Language Text and Event Logs for Compliance Deviation Detection
Henryk Mustroph, Karolin Winter, Stefanie Rinderle‐Ma
Lecture notes in computer science (2023), pp. 347-365
Closed Access | Times Cited: 4
Henryk Mustroph, Karolin Winter, Stefanie Rinderle‐Ma
Lecture notes in computer science (2023), pp. 347-365
Closed Access | Times Cited: 4
MODEL OF SYSTEMATIZATION OF CLASSIFIERS OF DESTRUCTIVE AND CONSTRUCTIVE EVENTS IN THE DIGITAL SPACE
Voprosy kiberbezopasnosti (2024), Iss. 3 (61)
Open Access | Times Cited: 1
Voprosy kiberbezopasnosti (2024), Iss. 3 (61)
Open Access | Times Cited: 1
Unveiling Use Cases for Human Resource Mining
Niels Martin, Iris Beerepoot
Business & Information Systems Engineering (2024)
Closed Access | Times Cited: 1
Niels Martin, Iris Beerepoot
Business & Information Systems Engineering (2024)
Closed Access | Times Cited: 1
Anomalous Behavior Detection Based on the Isolation Forest Model with Multiple Perspective Business Processes
Na Fang, Xianwen Fang, Ke Lu
Electronics (2022) Vol. 11, Iss. 21, pp. 3640-3640
Open Access | Times Cited: 4
Na Fang, Xianwen Fang, Ke Lu
Electronics (2022) Vol. 11, Iss. 21, pp. 3640-3640
Open Access | Times Cited: 4
Improving event log quality using autoencoders and performing quantitative analysis with conformance checking
Uphar Singh, Arefa Muzaffar, Ranjana Vyas, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2023), pp. 598-604
Closed Access | Times Cited: 2
Uphar Singh, Arefa Muzaffar, Ranjana Vyas, et al.
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2023), pp. 598-604
Closed Access | Times Cited: 2
Simulating Cyber-Attack Scenarios by Discovering Petri-Nets from Large-Scale Event Logs
M. Makwana, Vedant Thakkar, Debanshu Das, et al.
(2024), pp. 49-54
Closed Access
M. Makwana, Vedant Thakkar, Debanshu Das, et al.
(2024), pp. 49-54
Closed Access
GHM: An Ensemble Approach to Fraud Detection with a Graph-Based HMM Method
Samiyeh Khosravi, Mehrdad Kargari, Babak Teimourpour, et al.
(2024), pp. 99-104
Closed Access
Samiyeh Khosravi, Mehrdad Kargari, Babak Teimourpour, et al.
(2024), pp. 99-104
Closed Access
GAMA: A Multi-graph-based Anomaly Detection Framework for Business Processes via Graph Neural Networks
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access | Times Cited: 1
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access | Times Cited: 1
Development of a method for targeted monitoring and processing of information security incidents of economic entities
Aleksei D. Kirov, В. А. Сизов
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 3, pp. 381-386
Closed Access | Times Cited: 1
Aleksei D. Kirov, В. А. Сизов
Journal of Computer Virology and Hacking Techniques (2022) Vol. 19, Iss. 3, pp. 381-386
Closed Access | Times Cited: 1
GAMA: A Multi-graph-based Anomaly Detection Framework for Business Processes via Graph Neural Networks
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access
GAMA: A Multi-graph-based Anomaly Detection Framework for Business Processes via Graph Neural Networks
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access
Wei Guan, Jian Cao, Yang Gu, et al.
(2023)
Open Access
SMART BOTNET OR INTELLIGENT DESTRUCTOR MODEL
Voprosy kiberbezopasnosti (2023), Iss. 5 (57)
Open Access
Voprosy kiberbezopasnosti (2023), Iss. 5 (57)
Open Access
MACHINE LEARNING FOR E-COMMERCE FRAUD DETECTION
Rahayu Damayanti, Zaldy Adrianto
Jurnal Riset Akuntansi Dan Bisnis Airlangga (2023) Vol. 8, Iss. 2, pp. 1562-1577
Open Access
Rahayu Damayanti, Zaldy Adrianto
Jurnal Riset Akuntansi Dan Bisnis Airlangga (2023) Vol. 8, Iss. 2, pp. 1562-1577
Open Access