{"id":"https://openalex.org/W2114600197","doi":"https://doi.org/10.1109/cidm.2013.6597225","title":"Discovering signature patterns from event logs","display_name":"Discovering signature patterns from event logs","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2114600197","doi":"https://doi.org/10.1109/cidm.2013.6597225","mag":"2114600197"},"language":"en","primary_location":{"id":"doi:10.1109/cidm.2013.6597225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cidm.2013.6597225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089187689","display_name":"R. P. Jagadeesh Chandra Bose","orcid":"https://orcid.org/0000-0001-6771-5500"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"R.P. Jagadeesh Chandra Bose","raw_affiliation_strings":["Eindhoven Univ. of Tech., Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven Univ. of Tech., Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069762894","display_name":"Wil M. P. van der Aalst","orcid":"https://orcid.org/0000-0002-0955-6940"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Wil M.P. van der Aalst","raw_affiliation_strings":["Eindhoven Univ. of Tech., Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven Univ. of Tech., Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089187689"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":3.8429,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.9362461,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7940047979354858},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.643120527267456},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6021662354469299},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.551822304725647},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5335643291473389},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5266677737236023},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5069335103034973},{"id":"https://openalex.org/keywords/process-mining","display_name":"Process mining","score":0.4955390691757202},{"id":"https://openalex.org/keywords/business-process-discovery","display_name":"Business process discovery","score":0.48263344168663025},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.4661480188369751},{"id":"https://openalex.org/keywords/knowledge-extraction","display_name":"Knowledge extraction","score":0.4492841064929962},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.4468211829662323},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.4395124018192291},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4313497841358185},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4081763029098511},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29218095541000366},{"id":"https://openalex.org/keywords/business-process-management","display_name":"Business process management","score":0.20876559615135193},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1848205327987671},{"id":"https://openalex.org/keywords/business-process-modeling","display_name":"Business process modeling","score":0.15720465779304504},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.11657419800758362},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09286749362945557}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7940047979354858},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.643120527267456},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6021662354469299},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.551822304725647},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5335643291473389},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5266677737236023},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5069335103034973},{"id":"https://openalex.org/C124670913","wikidata":"https://www.wikidata.org/wiki/Q2608526","display_name":"Process mining","level":5,"score":0.4955390691757202},{"id":"https://openalex.org/C93453677","wikidata":"https://www.wikidata.org/wiki/Q1017580","display_name":"Business process discovery","level":5,"score":0.48263344168663025},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.4661480188369751},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.4492841064929962},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.4468211829662323},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.4395124018192291},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4313497841358185},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4081763029098511},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29218095541000366},{"id":"https://openalex.org/C80309976","wikidata":"https://www.wikidata.org/wiki/Q7007379","display_name":"Business process management","level":4,"score":0.20876559615135193},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1848205327987671},{"id":"https://openalex.org/C207505557","wikidata":"https://www.wikidata.org/wiki/Q4374012","display_name":"Business process modeling","level":4,"score":0.15720465779304504},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.11657419800758362},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09286749362945557},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/cidm.2013.6597225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cidm.2013.6597225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/ca6c0c48-a458-4ed4-8468-7129fe883643","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/ca6c0c48-a458-4ed4-8468-7129fe883643","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bose, R P J C & Aalst, van der, W M P 2013, Discovering signature patterns from event logs. in Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM'13, Singapore, April 16-19, 2013). Institute of Electrical and Electronics Engineers, pp. 111-118, conference; 2013 IEEE Symposium on Computational Intelligence and Data Mining; 2013-04-16; 2013-04-16, 16/04/13. https://doi.org/10.1109/CIDM.2013.6597225","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:tue:oai:pure.tue.nl:publications/ca6c0c48-a458-4ed4-8468-7129fe883643","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/ca6c0c48-a458-4ed4-8468-7129fe883643","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM'13, Singapore, April 16-19, 2013), 111 - 118","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"},{"score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W205883653","https://openalex.org/W1484413656","https://openalex.org/W1490658580","https://openalex.org/W1592254591","https://openalex.org/W1602011302","https://openalex.org/W1680392829","https://openalex.org/W1824264389","https://openalex.org/W1985858614","https://openalex.org/W2039858039","https://openalex.org/W2074923226","https://openalex.org/W2085573882","https://openalex.org/W2098182691","https://openalex.org/W2101739800","https://openalex.org/W2107071518","https://openalex.org/W2107263349","https://openalex.org/W2122111042","https://openalex.org/W2123974696","https://openalex.org/W2125055259","https://openalex.org/W2132870739","https://openalex.org/W2133841540","https://openalex.org/W2137723287","https://openalex.org/W2140190241","https://openalex.org/W2149203879","https://openalex.org/W2149706766","https://openalex.org/W2152024786","https://openalex.org/W2154642793","https://openalex.org/W2161427108","https://openalex.org/W2164816439","https://openalex.org/W2187061311","https://openalex.org/W3145074154","https://openalex.org/W4230145224","https://openalex.org/W4236137412","https://openalex.org/W4238625289","https://openalex.org/W4242838928","https://openalex.org/W4248650647","https://openalex.org/W6608429085","https://openalex.org/W6628750762","https://openalex.org/W6635307206","https://openalex.org/W6637386731","https://openalex.org/W6682837551","https://openalex.org/W6684462498"],"related_works":["https://openalex.org/W2150478723","https://openalex.org/W4365511202","https://openalex.org/W4300560926","https://openalex.org/W2608662023","https://openalex.org/W2158991459","https://openalex.org/W2808742510","https://openalex.org/W4248246100","https://openalex.org/W2979752478","https://openalex.org/W4205089782","https://openalex.org/W2060045119"],"abstract_inverted_index":{"More":[0],"and":[1,21,27,44,103,138,151,157,163,166,178],"more":[2],"information":[3],"about":[4],"processes":[5],"is":[6,126,146,172],"recorded":[7],"in":[8,48,122,149],"the":[9,83,131,176,181],"form":[10],"of":[11,85,180],"so-called":[12],"'event":[13],"logs'.":[14],"High-tech":[15],"systems":[16,137],"such":[17,49],"as":[18,55],"X-ray":[19,124],"machines":[20],"high-end":[22],"copiers":[23],"provide":[24],"their":[25],"manufacturers":[26],"services":[28],"organizations":[29,35],"with":[30],"detailed":[31],"event":[32,50],"data.":[33],"Larger":[34],"record":[36],"relevant":[37],"business":[38],"events":[39],"for":[40,72,111,143],"process":[41],"improvement,":[42],"auditing,":[43],"fraud":[45],"detection.":[46],"Traces":[47],"logs":[51],"can":[52,76,96],"be":[53,77,97,113],"classified":[54],"desirable":[56,102],"or":[57,61,81,87,128],"undesirable":[58,104],"(e.g.,":[59],"faulty":[60],"fraudulent":[62],"behavior).":[63],"In":[64],"this":[65],"paper,":[66],"we":[67],"present":[68],"a":[69,119],"comprehensive":[70],"framework":[71,142],"discovering":[73],"signatures":[74,91,132],"that":[75,95],"used":[78,98,114,173],"to":[79,99,115,135,174],"explain":[80],"predict":[82,116],"class":[84,153],"seen":[86],"unseen":[88],"traces.":[89],"These":[90],"are":[92],"characteristic":[93],"patterns":[94,109],"discriminate":[100],"between":[101],"behavior.":[105],"As":[106],"shown,":[107],"these":[108],"can,":[110],"example,":[112],"remotely":[117],"whether":[118],"particular":[120],"component":[121],"an":[123],"machine":[125],"broken":[127],"not.":[129],"Moreover,":[130],"also":[133],"help":[134],"improve":[136],"organizational":[139],"processes.":[140],"Our":[141],"signature":[144],"discovery":[145],"fully":[147],"implemented":[148],"ProM":[150],"supports":[152],"labeling,":[154],"feature":[155],"extraction":[156],"selection,":[158],"pattern":[159,161],"discovery,":[160],"evaluation":[162],"cross-validation,":[164],"reporting,":[165],"visualization.":[167],"A":[168],"real-life":[169],"case":[170],"study":[171],"demonstrate":[175],"applicability":[177],"scalability":[179],"approach.":[182],"Keywords:":[183],"Discriminatory":[184],"Patterns;":[185],"Event":[186],"Log;":[187],"Process":[188],"Mining;":[189],"Signature":[190],"Patterns":[191]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
