참고문헌
- 손성호, 정재윤, 조남욱, 강석호; "프로세스 기반 이 벤트 분석을 이용한 비즈니스 활동 모니터링", 한국전자거래학회지, 12 : 219-231, 2007
- Abadeh, M. S., Habibi, J., Barzegar, Z., and Sergi, M.; "A parallel genetic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8) : 1058-1069, 2007 https://doi.org/10.1016/j.engappai.2007.02.007
- Adams, P.; "What's going on? [business activity monitoring]," Manufacturing Engineer, 81(6) : 282-283, 2002 https://doi.org/10.1049/me:20020611
- Adi, A., Botzer, D., and Etzion, O.;"Semantic Event Model and Its Implication on Situation Detection," Proceedings of the 2000 European Conference on Information, 2000
- Albaghdadi, M., Briley, B., and Evens, M.; "Event storm detection and identification in communication systems," Reliability Engineering and System Safety, 91 (5) : 602-613, 2006 https://doi.org/10.1016/j.ress.2005.05.001
- Camci, F. and Chinnam, R. B.; "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10) : 3021-3034, 2008 https://doi.org/10.1016/j.patcog.2008.04.001
- Duda, R. O., Hart, P. E. and Stork, D. G.; Pattern Classification, Wiley-interscience, 2001
- Golfarelli, M., Rizzi, S., and Cella, I.; "Beyond data warehousing : what's next in business intelligence?," Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, : 1-6, 2004
- Grigori, D., Casati, F., Castellanos, M., Dayal, U., Sayal, M., and Shan, M-C.; "Business Process Intelligence," Computers in Industry, 53 : 321-343, 2004 https://doi.org/10.1016/j.compind.2003.10.007
- Gross, P. N., Gupta, S., Kasier, G. E., Gaurav, S. K., and Parekh, J. J.; "An Active Events Model for Systems Monitoring," Working Conference on Complex and Dynamic Systems, 2001
- Lamport, L.; "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 21(7) : 558-565, 1978 https://doi.org/10.1145/359545.359563
- Leymann, F., Roller, D., and Schmidt, M-T.; "Web Services and Business Process Management," IBM Systems Journal, 41(2), 2002
- Luckham, D. C.; The Power of Events, Person Education, 2002
- Luckham, D. C. and Frasca, B.; "Complex Event Processing in Distributed Systems," Stanford University, 1998
- Lundberg, A.; "Leverage Complex Event Processing to Improve Operational Performance," Business Intelligence, 11(1) : 55-65, 2006
- Mendling, J., Verbeek, H. M. W., van Dongen, B. F., van der Aalst, W. M. P., and Neumann, G.; "Detection and prediction of errorsin EPCs of the SAP reference model," Data and Knowledge Engineering, 64(1) : 312-329, 2008 https://doi.org/10.1016/j.datak.2007.06.019
- Perrochon, L., Mann, W., Kasriel, S., and Luckham, D. C.; "Event Mining with Event Processing Networks," Proceedings of Methodologies for Knowledge Discovery and Data Mining : Third Pacific-Asia Conference, 1574 : 474-478, 1999
- Rolland, C.; "Modeling the Requirements Engineering Process," 3rd European-Japanese Seminar on Information Modelling and Knowledge Bases, 1993
- Sharma, A., Pujari, A. K., and Paliwal, K. K.; "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers and Security, 26 : 488-495, 2007 https://doi.org/10.1016/j.cose.2007.10.003
- Wang D. and Romagnoli, J. A.; "Robust multi-scale principal components analysis with applications to process monitoring," Journal of Process Control, 15(8) : 869-882, 2005 https://doi.org/10.1016/j.jprocont.2005.04.001
- Mitchell, T. M.; Machine Learning, McGraw-Hill, Inc., New York, 1997