<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Explainable Object-Centric Anomaly Detection: the Role of Domain Knowledge</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Alessandro</forename><surname>Berti</surname></persName>
							<email>a.berti@pads.rwth-aachen.de</email>
							<affiliation key="aff0">
								<orgName type="department">Process and Data Science Chair</orgName>
								<orgName type="institution">RWTH Aachen University</orgName>
								<address>
									<settlement>Aachen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Fraunhofer FIT</orgName>
								<address>
									<settlement>Sankt Augustin</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Urszula</forename><surname>Jessen</surname></persName>
							<email>u.a.jessen@tue.nl</email>
							<affiliation key="aff2">
								<orgName type="department" key="dep1">Process Insights</orgName>
								<orgName type="department" key="dep2">ECE Group Services</orgName>
								<address>
									<settlement>Hamburg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Wil</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Process and Data Science Chair</orgName>
								<orgName type="institution">RWTH Aachen University</orgName>
								<address>
									<settlement>Aachen</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Fraunhofer FIT</orgName>
								<address>
									<settlement>Sankt Augustin</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dirk</forename><surname>Fahland</surname></persName>
							<email>d.fahland@tue.nl</email>
							<affiliation key="aff3">
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Explainable Object-Centric Anomaly Detection: the Role of Domain Knowledge</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F9008A3DA9B030AA7AA4F1DBA7DFA852</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:02+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Object-Centric Anomaly Detection, Object-Centric Feature Extraction, Procurement Processes, Large Language Models (D. Fahland) 0000-0002-3279-4795 (A. Berti)</term>
					<term>0000-0002-7282-8451 (U. Jessen)</term>
					<term>0000-0002-0955-6940 (W. M.P. v. d. Aalst)</term>
					<term>0000-0002-1993-9363 (D. Fahland)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Anomaly detection is used in process mining to identify behavior differing significantly from the other instances. However, providing actionable insights out of the raw scores is challenging. In this paper, we propose three methodologies for explainable anomaly detection. In particular, we focus on object-centric event data as it increases the dimensions for anomaly detection, including the lifecycle of different objects and the interactions between them. Two of the proposed methodologies rely on the provision of domain knowledge, which can also be provided by Large Language Models (LLMs). We test the proposed techniques in a real-life case study on an (object-centric) ERP process.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Object-centric process mining <ref type="bibr" target="#b0">[1]</ref> is a novel discipline that exploits object-centric event data, i.e., event data having each event correlated with several objects of different object types. Object-centric event data contains information related to the lifecycle of the different object types and the interactions between them. Several types of object-centric process models have been proposed, which can be discovered from object-centric event data using object-centric process discovery <ref type="bibr" target="#b1">[2]</ref> algorithms. Object-centric conformance checking aims to compare the behavior contained in the object-centric event data against object-centric process models representing the normative behavior (de-jure models) to identify deviations. However, defining de-jure models in the object-centric setting is complicated due to the potentially large number of object types and their possible interactions.</p><p>Object-centric anomaly detection aims to identify anomalous behavior in the object-centric event data without requiring the definition of object-centric process models. They work by encoding objectcentric event data into numerical situation tables to which anomaly detection algorithms are applied. For instance, if each row of the situation table represents a different object, anomaly detection algorithms assign an anomaly score to each object, which can be used to rank the objects based on their anomalousness.</p><p>A limitation of traditional approaches is the lack of interpretability of such scores, i.e., we are able to identify anomalous objects having a relevant anomaly score, but we are not able to provide any insights on why such objects were classified as anomalous. In this paper, we discuss three methodologies (AF1, AF2, and AF3) to provide actionable insights starting from either the situation tables or the anomaly scores and apply them to a real-life (object-centric) P2P process. Fig. <ref type="figure" target="#fig_0">1</ref> summarizes the contributions of the paper.</p><p>The rest of the paper is organized as follows. In Section 2, we present the related work. In Section 3, we present three methodologies for explainable anomaly detection in the object-centric setting. In Section 4, we present the results of a case study using the techniques proposed in the paper. Finally, Section 5 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Object-centric conformance checking approaches divide between model-based <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> and rule-based <ref type="bibr" target="#b4">[5]</ref>. However, both categories suffer from the curse of dimensionality, as different object types and their interactions need to be modeled.</p><p>In the context of process mining, several anomaly detection approaches exist. Focusing on the object-centric setting, the usage of graph neural networks for anomaly detection is proposed in <ref type="bibr" target="#b5">[6]</ref>. However, the approach focuses on detecting anomalous events, while in this paper we focus on objects and their relationships.</p><p>In <ref type="bibr" target="#b6">[7]</ref>, LLMs are proposed for semantic anomaly detection tasks. However, the approach focuses on traditional process mining instances, while we focus on object-centric process mining.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Approach</head><p>In this section, we propose three methodologies for anomaly detection in the object-centric setting. We assume that the object-centric event data has been encoded to a numerical situation table containing a row for each distinct object <ref type="bibr" target="#b7">[8]</ref>. The numerical features (columns) are either related to the lifecycle of the objects (for example, the duration of the lifecycle, the number of events, or the one-hot encoding of the events' activities) or the interactions between them (for instance, counting how many distinct order items are related to a given order document). We apply traditional anomaly detection algorithms to the situation table. Therefore, an anomaly score is assigned to each object. In Table <ref type="table" target="#tab_1">1</ref>, we see some anomalous objects and their anomaly scores based on the Isolation Forests<ref type="foot" target="#foot_0">1</ref> and Local Outlier Factor<ref type="foot" target="#foot_1">2</ref> techniques.</p><p>The three methodologies follow: Listing 2: Anomalies spotted by an LLM on the lifecycle of a single object (AF2).</p><p>1. * * Duplicate Time Stamps * * : Both the "Approve Requisition" and "Create Purchase Order" events are recorded at the exact timestamp of 2010−10−06 03:44:22, suggesting an immediate creation of the PO after requisition approval, which is atypical due to the expected minor delay between these actions. Similarly, " Submit Purchase Order for Approval" and "Approve Purchase Order" share the timestamp of 2010−10−06 03:45:41, indicating unusual instant approval. 2. * * Order of Events * * : "Approve Purchase Order" is followed by another "Submit Purchase Order for Approval" event at the same timestamp, suggesting redundancy and possibly a recording error or system glitch. AF1 Detection of Anomalous Features using Oracles: we assume that an oracle examines the set of values for each column of the situation table and assigns a strangeness score to each of its values. For example, considering two orders, the first having a lifecycle duration of a week and one related invoice, and the second having a lifecycle duration of a year and 100 related invoices, the oracle can assign the following values:</p><p>• number of related invoices=100: strangeness score 0.9/1.0</p><p>• lifecycle duration=1 year: strangeness score 0.7/1.0</p><p>• lifecycle duration=1 week: strangeness score 0.3/1.0</p><p>• number of related invoices=1: strangeness score 0.1/10.0</p><p>The strangeness scores help to tailor the subsequent analysis. For example, we could search for all the orders in the object-centric event data having at least twenty related invoices, or all the orders having a lifecycle duration of more than six months. This proposed methodology requires domain knowledge of the underlying process. This knowledge can be provided by a human analyst or, alternatively, a Large Language Model (LLM) can be used for the purpose. For instance, Listing 1 represents the output of the GPT-4 LLM on this task. The different values of the situation table are ranked by the LLM, and a textual summary is provided containing the values having the highest strangeness. A limitation of this technique is that the inter-correlations between the values of different columns are ignored, as the focus is on the values of a single column.</p><p>AF2 Objects Lifecycle Assessment: we exploit the anomaly scores obtained with the application of an anomaly detection algorithm to rank the objects and identify the most anomalous ones. Then, for each of the most anomalous objects, the set of events related to the object is explored to spot semantic anomalies or root causes of performance issues. This methodology also requires domain knowledge of the underlying process, which can be provided by a human analyst or by an LLM. For instance, Listing 2 contains the anomalies identified by GPT-4 on the lifecycle of a single anomalous object.</p><p>AF3 Detection of Anomalous Features using the Scores: we exploit the anomaly scores obtained by applying an anomaly detection algorithm to measure the positive/negative correlation of the values of an object's feature with the anomaly score. The features having a lower/higher correlation with the anomaly scores are reported. In Table <ref type="table" target="#tab_2">2</ref>, for instance, we see some features with a negative correlation against the anomaly score. This is the the only approach among the three that does not require the provision of domain knowledge, but potentially it results in a lengthy list of anomalous features that may challenge analysts. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Case Study</head><p>In this section, we discuss the application of the proposed techniques on top of a real-life P2P objectcentric event log (ECE group).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Context:</head><p>The ECE group uses SAP ERP supported by the xFlow document acquisition system. The Celonis platform was adopted in 2020 for traditional process mining. However, due to the deficiency/convergence/divergence issues, ECE quickly adopted object-centric process mining. The results of a case study have been previously published in <ref type="bibr" target="#b8">[9]</ref>. The company was interested in applying anomaly detection to discover deviations from the expected behavior (non-compliance, such as maverick buying, i.e., inserting the order only after its placement, and post-mortem changes to purchase requisitions) and identify behavior leading to a monetary loss in the P2P process (for example, invoice paid twice, discount rates not taken because of invoices taking long to process, or non-justified payment blocks). Tools: Our analysis primarily utilized the pm4py process mining library <ref type="bibr" target="#b9">[10]</ref> and the OC-PM Javascript-based tool <ref type="bibr" target="#b1">[2]</ref>, which both support object-centric feature extraction as outlined in <ref type="bibr" target="#b7">[8]</ref>.</p><p>In previous work, we used these tools in a case study <ref type="bibr" target="#b8">[9]</ref>. pm4py provides a dataframe via pm4py.extract_ocel_features, compatible with any Python machine learning library. OC-PM, after feature extraction, employs the Isolation Forests anomaly detection algorithm. Adopted Dimensionality Reduction Algorithms: Due to the large number of features, we adopted dimensionality reduction to mitigate the curse of dimensionality, reduce computational complexity, and improve model performance.</p><p>In our P2P object-centric setting, FastMap <ref type="bibr" target="#b10">[11]</ref> was the preferred method due to its ability to maintain non-linear relationships and computational efficiency. Unlike PCA <ref type="foot" target="#foot_2">3</ref> , which involves intensive eigendecomposition and can be less suitable for large datasets with ambiguous component interpretations, FastMap efficiently reduces high-dimensional data into lower dimensions without requiring full distance matrix computations. Adopted Anomaly Detection Algorithms: The findings highlight the strengths of Isolation Forests and LOF in anomaly detection. Isolation Forests are effective for high-dimensional data and large volumes, isolating anomalies using decision tree splittings without needing pairwise distance calculations. This accelerates anomaly detection in complex datasets.</p><p>LOF excels at identifying anomalies in specific subgroups by calculating local density deviations, which is useful for clustered data. However, LOF requires more computational resources for large datasets.</p><p>In our analysis, Isolation Forests successfully detect anomalies in object-centric event logs with traditional lifecycle features, while LOF is preferable for graph-based features, focusing on local context to identify anomalies in networks of object interactions. Refinement (Activities): After performing an initial analysis, we performed some postprocessing of the object-centric event log to enhance the results. We had hundreds of activities in the object-centric event log, mostly related to changing field values (change tables in SAP). Most of them are not relevant for object-centric anomaly detection and increase the dimensionality of the data with little gain. After our first application of anomaly detection, we repeated it on an object-centric event log that was filtered keeping only the relevant activities. The selection of relevant activities proved challenging on its own. Some infrequent activities, which were the first candidates for removal, identify indeed important anomalies. We could distinguish between manual and automatic activities, with the latter being less important for anomaly detection. Refinement (Feature Propagation): We discovered that a traditional object-centric feature map based on the lifecycle and interactions of object types gives an incomplete process view. For instance, we found that invoices were often blocked for orders lacking preliminary purchase requisition approval, a pattern not visible when considering only invoices. By extending invoice data with information from related purchase orders using the feature propagation described in <ref type="bibr" target="#b7">[8]</ref>, we identified the root cause of this performance issue. Another observation, illustrated in Figure <ref type="figure" target="#fig_2">2</ref>, is that orders with multiple positions (e.g., maintenance contracts) might appear anomalous when viewed in isolation. However, considering each item's direct relation to an invoice, such behavior is not anomalous. Main Results: Anomaly detection allowed us to identify several non-compliance issues in the P2P process. We identified a non-negligible amount of orders with the maverick buying problem. The order is placed to the supplier skipping all the approval steps, the supplier sends an invoice to the company, and only then the purchase order is formally created in the ERP system. Moreover, we recorded several change activities done to purchase requisitions after their approval in order to match the amounts/quantities of the purchase order (post-mortem changes to PRs). This is a deleterious behavior as the purchase requisition was deliberately proposed to the managers with a lower amount.</p><p>Looking at the inefficiencies in the process leading to a monetary loss, we observed orders invoiced (and paid) several times, which were not maintenance contracts. Moreover, we identified invoices with an excessive number of change activities, signaling an inefficiency in the process (as this behavior is correlated with longer processing times). Considering the interaction between purchase orders, invoices, and payments, we observed that inefficiencies in the purchase orders also lead to inefficient processing of payments. Limitations of LLMs: We used LLMs to interpret results, following methods in <ref type="bibr" target="#b11">[12]</ref>. Specifically, pm4py.llm.abstract_ocel_features was used for textual abstraction in method AF1, and pm4py.llm.abstract_ocel for AF3. The GPT-4-Turbo LLM model, available as of 09-04-2024, was chosen to generate insights due to its large context window. Applying LLMs to textual abstractions from our object-centric event log produced mixed results. For methodology AF1, the insights helped identify anomalous patterns and filter objects for further analysis using the OC-PM tool. However, several limitations arose. The context window of the LLM, despite improvements with the GPT-4-Turbo model, restricted the inclusion of objects' lifecycles containing many events, limiting the application of methodology AF2 to objects with fewer events. Inconsistencies across different sessions were noted <ref type="bibr" target="#b12">[13]</ref>, sometimes requiring the merging of insights from different sessions as an "ensemble". Hallucinations and irrelevant outputs compared to the original prompt also occurred <ref type="bibr" target="#b12">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>In this paper, we tackle anomaly detection in the object-centric setting. By transforming the objectcentric event log into a tabular structure following the method described in <ref type="bibr" target="#b7">[8]</ref>, we are able to encode numerical features related to the lifecycle and the interaction of the different objects contained in the object-centric event log. Therefore, we are able to apply traditional anomaly detection methods and assign an anomaly score to each object.</p><p>A bigger challenge comes with explaining anomalies. The main contribution of this paper is to provide three methodologies for anomaly detection in the object-centric setting. In particular, two of them are based on having domain knowledge of the underlying process, while the third one is based on "transferring" the anomaly scores from the objects to the features level. For the methods requiring domain knowledge, we propose the usage of LLMs as domain knowledge providers given the large amount of process knowledge in their training datasets.</p><p>Applying the techniques in a real-life P2P setting, we found that the choice of the methodology is important, but also other design choices, such as the choice of the dimensionality reduction algorithm, the anomaly detection algorithm, and pre-processing the object-centric event log, are important.</p><p>In our case study, the application of object-centric anomaly detection allowed us to detect several anomalies in the underlying process (maverick buying, post-mortem changes to purchase requisitions, invoices with an excessive number of changes). Some problems, such as hallucinations and nondeterminism, emerged in using LLMs as domain knowledge providers. However, for some of the use cases, LLMs provided excellent support.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Outline of the contributions proposed in the paper. The approaches highlighted with "DK" require domain knowledge.</figDesc><graphic coords="2,108.10,65.61,379.08,174.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>3. * * Long Lifecycle Duration * * : The lifecycle of PO_277871 extends unusually from 2010−10−06 to 2023−07−12, closed initially on 2010−10−08 and then reopened 13 years later, which deviates from standard P2P process durations. 4. * * Close and Reopen of PO * * : PO_277871 was closed on 2010−10−08 and reopened on 2023−07−12, a rare occurrence that may require verification with system administrators to understand if it reflects actual procedural needs or system setup anomalies.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Interaction between maintenance contracts with several positions and invoices.</figDesc><graphic coords="5,128.41,613.94,338.46,120.92" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Objects with an unusually high number of interactions in the graph may indicate anomalies. 6. * * Lifecycle Start and Completion Time * * : Analyze objects with exceptionally short or long lifecycles compared to the dataset trend. 7. * * Objects Starting/Ending Lifecycle Together * * : Examine cases where a notably high number of objects start or end their lifecycle simultaneously with the current object.</figDesc><table><row><cell>Listing 1: Anomalies spotted by an LLM</cell></row><row><cell>starting from the feature table (AF1)</cell></row><row><cell>1.  *  * High Duration of Lifecycle *  * : The range of lifecycle durations is broad, with the</cell></row><row><cell>maximum value at 722,032,120 while the 75% quantile is 1,215,387, indicating</cell></row><row><cell>potential abnormally long lifecycles.</cell></row><row><cell>2.  *  * Activity Occurrence Consistencies *  * : "Submit Purchase Order for Approval" and "</cell></row><row><cell>Approve Purchase Order" activities typically occur once per object but have</cell></row><row><cell>outliers with up to 100 occurrences. Investigate objects where these activities are</cell></row><row><cell>repeated excessively.</cell></row><row><cell>3.  *  * Degree of Centrality *  * : There's a significant jump in degree centrality values from the</cell></row><row><cell>75% quantile to the maximum. High centrality objects, potential interaction hubs</cell></row><row><cell>, warrant further investigation.</cell></row><row><cell>4.  *  * Rare Activities *  * : Activities like "Reject Purchase Order" and "(Re)Open Purchase</cell></row><row><cell>Order" are infrequent. Focusing on these can reveal anomalies.</cell></row><row><cell>5.  *  * Object Interactions *  * :</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 :</head><label>1</label><figDesc>Anomaly scores for some purchase orders of the considered log.</figDesc><table><row><cell>Object ID</cell><cell cols="2">Isolation Forest Scores Local Outlier Factor Scores</cell><cell></cell><cell></cell><cell></cell></row><row><cell>PO_23667 PO_23507 PO_23508 PO_23512 PO_23513</cell><cell>-0.200785 -0.200311 -0.200311 -0.200311 -0.200311</cell><cell>-40.049412 -7.200163 -7.200163 -7.200163 -7.200163</cell><cell>Feature (with Value) 1 Occurrence of the activity Cancel Purchase Or-der 1 Occurrence of the activity (Re)Open Purchase</cell><cell cols="2">Count Correlation 300 -0.07 167 -0.12</cell></row><row><cell>PO_23514 PO_23515 PO_23516 PO_23517 PO_277871</cell><cell>-0.200311 -0.200311 -0.200311 -0.200311 -0.195874</cell><cell>-7.200163 -7.200163 -7.200163 -7.200163 -7.622763</cell><cell>Order 44 other orders are terminating with the same event 45 other objects are interacting with the order</cell><cell>45 45</cell><cell>-0.21 -0.21</cell></row><row><cell>PO_23511 PO_3903 PO_133097 PO_23668</cell><cell>-0.189318 -0.187092 -0.175762 -0.174838</cell><cell>-7.200163 -54.929239 -8.086049 -39.503084</cell><cell>The activity Approve Purchase Order is not exe-cuted There are 2 activities in the lifecycle of the order</cell><cell>131 72</cell><cell>-0.07 -0.09</cell></row><row><cell>PO_23669</cell><cell>-0.174838</cell><cell>-39.503084</cell><cell>29 other orders are terminating with the same</cell><cell>30</cell><cell>-0.19</cell></row><row><cell>PO_23510 PO_86355 PO_85465 PO_23518</cell><cell>-0.174382 -0.172010 -0.171363 -0.170136</cell><cell>-7.217331 -3.117746 -0.125512 -7.212333</cell><cell>event 30 other objects are interacting with the order 27 other orders are terminating with the same</cell><cell>30 28</cell><cell>-0.19 -0.19</cell></row><row><cell>PO_23519</cell><cell>-0.170136</cell><cell>-7.212333</cell><cell>event</cell><cell></cell><cell></cell></row><row><cell>PO_23520 PO_23521 PO_23522 PO_84184</cell><cell>-0.170136 -0.170136 -0.170136 -0.169095</cell><cell>-7.212333 -7.212333 -1.549233 -7.212333</cell><cell>28 other objects are interacting with the order event 20 other orders are terminating with the same</cell><cell>28 21</cell><cell>-0.19 -0.18</cell></row><row><cell>PO_3836 PO_3837 PO_3838 PO_3839 PO_3840</cell><cell>-0.168964 -0.168964 -0.168964 -0.168964 -0.168964</cell><cell>-213.993317 -213.982787 -213.974041 -213.967588 -213.960370</cell><cell>There is a single event in the lifecycle of the order The activity Submit Purchase Order for Approval is not executed There are 13 events in the lifecycle of the order</cell><cell>53 53 41</cell><cell>-0.04 -0.04 -0.05</cell></row><row><cell>PO_3841</cell><cell>-0.168964</cell><cell>-213.953323</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 :</head><label>2</label><figDesc>Features' values correlated with anomalies (methodology AF3).</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://scikit-learn.org/stable/modules/generated/sklearn.ensemble.IsolationForest.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">https://scikit-learn.org/stable/modules/generated/sklearn.neighbors.LocalOutlierFactor.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">https://scikit-learn.org/stable/modules/generated/sklearn.decomposition.PCA.html</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Object-centric process mining: Dealing with divergence and convergence in event data</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SEFM 2019</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11724</biblScope>
			<biblScope unit="page" from="3" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">OC-PM: analyzing object-centric event logs and process models</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Softw. Tools Technol. Transf</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="1" to="17" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Object-centric alignments</title>
		<author>
			<persName><forename type="first">L</forename><surname>Liss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">N</forename><surname>Adams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ER</title>
		<imprint>
			<biblScope unit="volume">14320</biblScope>
			<biblScope unit="page" from="201" to="219" />
			<date type="published" when="2023">2023. 2023</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Precision and fitness in object-centric process mining</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">N</forename><surname>Adams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICPM 2021</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="128" to="135" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Monitoring constraints in business processes using object-centric constraint graphs</title>
		<author>
			<persName><forename type="first">G</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICPM 2022 Workshops</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">468</biblScope>
			<biblScope unit="page" from="479" to="492" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Detecting anomalous events in object-centric business processes via graph neural networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Niro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Werner</surname></persName>
		</author>
		<idno>CoRR abs/2403.00775</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Guan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Qian</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2406.15781</idno>
		<title level="m">Dabl: Detecting semantic anomalies in business processes using large language models</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Graph-based feature extraction on object-centric event logs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Herforth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Qafari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Data Science and Analytics</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Analyzing interconnected processes: using object-centric process mining to analyze procurement processes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Jessen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rafiei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Data Science and Analytics</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Pm4py: A process mining library for python</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Van Zelst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schuster</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Softw. Impacts</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page">100556</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">On fastmap and the convex hull of multivariate data: Toward fast and robust dimension reduction</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ostrouchov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Samatova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Pattern Anal. Mach. Intell</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="1340" to="1343" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Abstractions, scenarios, and prompt definitions for process mining with llms: A case study</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schuster</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">M P</forename><surname>Van Der Aalst</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">BPM 2023 Workshops</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">492</biblScope>
			<biblScope unit="page" from="427" to="439" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Evaluating Large Language Models in Process Mining: Capabilities, Benchmarks, Evaluation Strategies, and Future Challenges</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kourani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hafke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Yun-Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Schuster</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of BPM-DS 2024 Working Conference</title>
				<meeting>BPM-DS 2024 Working Conference</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
