참고문헌
- Breunig, M. M., Kriegel, H. P., Ng R. T. and Sander, J., "LOF : Identifying Density Based Local Outliers," In Proceedings of the ACM SIGMOD Conference, Dallas, TX, 2000.
- Buytendijk, F. and Flint, D., "How BAM can turn a business into a real-time enterprise," Gartner Research, AV-15-4650, 2002.
- Castellanos, M., Salazar, N., Casati, F., Dayal U. and Shan, M. C., "Predictive business operations management," International Journal of Computational Science and Engineering, Vol. 2, No. 5/6, 2006, pp. 292-301. https://doi.org/10.1504/IJCSE.2006.014772
- Chen, J. C. and Lin, K. Y., "Diagnosis for monitoring system of municipal solid waste incineration plant," Expert Systems with Applications, Vol. 34, No. 1, 2008, pp. 247-255. https://doi.org/10.1016/j.eswa.2006.09.002
- Curtis, B., Seshagiri, G. V., Reifer, D., Hirmanpour, I. and Keeni, G., "The cases for quantitative process management," IEEE software, Vol. 25, No. 3, 2008, pp. 24-28. https://doi.org/10.1109/MS.2008.80
- Ek, A. R., Robinson, A. P., Radtke, P. J. and Walters, D. K., "Development and testing of regeneration imputation models for forests in Minnesota," Forest Ecology and Management, Vol. 94, No. 1-3, 1997, pp. 129-140. https://doi.org/10.1016/S0378-1127(96)03970-9
- Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal M., and Shan, M. C., "Business process intelligence," Computers in Industry, Vol. 53, No. 3, 2004, pp. 321-343. https://doi.org/10.1016/j.compind.2003.10.007
- Grigori, D., Casati, F., Dayal U., and Shan, M. C., "Improving business process quality through exception understanding, prediction, and prevention," In Proceedings of the 27th Very Large Data Base Endowment Conference, Roma, Italy, 2001, pp. 159-168.
- Kang, B., Cho N. W. and Kang, S. H., "Real-time risk measurement for Business Activity Monitoring(BAM)," International Journal of Innovative Computing, Information and Control, Vol. 5, No. 11(A), 2009, pp. 3647-3657.
- Kang, B., Lee, S. K., Min, Y., Kang S. H. and Cho, N. W., "Real-time Process Quality Control for Business Activity Monitoring," In Proceedings of the 2009 International Conference on Computational Science and Its Applications, Yongin, Korea, 2009, pp. 237-242.
- Keung, P. and Kawalek, P., "Goalbased business process models: Creation and evaluation," Business Process Management Journal, Vol. 3 No. 1, 1997, pp. 17-38. https://doi.org/10.1108/14637159710161567
- Kim, K., Choi, I. and Park, C., "A rulebased approach to proactive exception handling in business processes," Expert Systems with Applications, Vol. 38, No. 1, 2011, pp. 394-409. https://doi.org/10.1016/j.eswa.2010.06.078
- Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J. and Kumar, V., "A comparative study of anomaly detection schemes in network intrusion detection," In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA, 2003.
- Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar S., and Leymann, F., "Runtime prediction of service level agreement violations for composite services," In Proceedings of the 3rd Workshop on Non-Functional Properties and SLA Management in Service-Oriented Computing, Stockholm, Sweden, 2009.
- Medioni, G., Cohen, I., Hongeng, S., Bremond F., and Nevatia. R., "Event Detection and Analysis from Video Streams," IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 8, No. 23, 2001, pp. 873-889.
- Nie, G., Zhang, L., Liu, Y., Zheng, X. and Shi, Y., "Decision analysis of data mining project based on Bayesian risk," Expert Systems with Applications, Vol. 36, No. 3, 2009, pp. 4589-4594. https://doi.org/10.1016/j.eswa.2008.05.014
- Pokrajac, D., Lazarevic, A. and Latecki, L. J., "Incremental Local Outlier Detection for Data Streams," IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 2007.
- Rao, U. S., Kestur, S. and Pradhan, C., "Stochastic optimization modeling and quantitative project management," IEEE software, Vol. 25, No. 3, 2008, pp. 29-36.
- Rusinov, L. A., Rudakova, I. V., and Kurkina, V. V., "Real time diagnostics of technological processes and field equipment," Chemometrics and Intelligent Laboratory Systems, Vol. 88, No. 1, 2007, pp. 18-25. https://doi.org/10.1016/j.chemolab.2006.11.007
- Viaene, S., Dedene, G. and Derrig, R. A., "Auto claim fraud detection using Bayesian learning neural networks," Expert Systems with Applications, Vol. 29, No. 3, 2005, pp. 653-666. https://doi.org/10.1016/j.eswa.2005.04.030
- Wang, D. and Romagnoli, J. A., "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, Vol. 15, No. 8, 2005, pp. 869-882. https://doi.org/10.1016/j.jprocont.2005.04.001
- Yue, D., Wu, X., Wang, Y., Li, Y. and Chu, C. H., "A Review of Data Mining-Based Financial Fraud Detection Research," In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, China, 2007, pp. 5514-5517.