discovery  from  event  logs  using  machine  learning 
algorithms,  the  frameworks  can  then  be  used  to 
design future process mining systems. 
Limitations of this research include missing some 
relevant  references  due  to  performing  a  manual 
search process, selecting only three databases for the 
search, and selecting the articles written only in the 
English language. Accordingly, for future work, it is 
recommended  to  perform  an  automated  search 
instead of a manual search, to include more databases 
for the search, and to search for articles in languages 
other than the English language. 
REFERENCES 
Abou Rida, A., Assy, N., & Gaaloul, W. (2019). Extracting 
Attribute-Based  Access  Control  Rules  from  Business 
Process Event Logs. In BDCSIntell (pp. 38-45). 
Acheli,  M.,  Grigori,  D.,  &  Weidlich,  M.  (2021). 
Discovering  and  Analyzing  Contextual  Behavioral 
Patterns  from  Event  Logs.  IEEE  Transactions  on 
Knowledge and Data Engineering.  
Bemthuis, R., Wang, W., Iacob, M. E., & Havinga, P. 
(2023).  Business  rule  extraction  using  decision  tree 
machine learning techniques: A case study into smart 
returnable transport items. Procedia Computer Science, 
220, 446-455. 
Berti,  A.,  &  van  der  Aalst,  W.  M.  (2023).  OC-PM: 
analyzing object-centric event logs and process models. 
International Journal on Software Tools for 
Technology Transfer, 25(1), 1-17. 
Bezerra, F., & Wainer, J. (2013). Algorithms for anomaly 
detection of traces in logs of process aware information 
systems. Information Systems, 38(1), 33-44. 
Bozorgi, Z. D., Teinemaa, I., Dumas, M., La Rosa, M., & 
Polyvyanyy, A. (2020, October). Process mining meets 
causal machine learning: Discovering causal rules from 
event  logs.  In  2020 2nd International Conference on 
Process Mining (ICPM) (pp. 129-136). IEEE. 
Campos,  J.,  Richetti,  P.,  Baião,  F.  A.,  &  Santoro,  F.  M. 
(2018).  Discovering  business  rules  in  knowledge-
intensive  processes  through  decision  mining:  an 
experimental study. In Business Process Management 
Workshops: BPM 2017 International Workshops, (pp. 
556-567). Springer International Publishing. 
Chen, K., Abtahi, F., Carrero, J. J., Fernandez-Llatas, C., & 
Seoane,  F.  (2023).  Process  mining  and  data  mining 
applications  in  the  domain  of  chronic  diseases:  A 
systematic review. Artificial Intelligence in Medicine, 
102645. 
Corea,  C.,  &  Delfmann,  P.  (2020).  A  Taxonomy  of 
Business  Rule  Organizing  Approaches  in  Regard  to 
Business  Process  Compliance.  Enterprise Modeling 
and Information Systems Architectures (EMISAJ), 15, 
4-1. 
Crerie,  R.,  Baião,  F.  A.,  &  Santoro,  F.  M.  (2009). 
Discovering business rules through process mining. In 
Enterprise, Business-Process and Information Systems 
Modeling (pp. 136-148). Springer, Berlin, Heidelberg. 
Dalmas,  B.,  Fournier-Viger,  P.,  &  Norre,  S.  (2017). 
Twincle:  A  constrained  sequential  rule  mining 
algorithm for  event  logs.  Procedia computer science, 
112, 205-214 
Djenouri,  Y.,  Belhadi,  A.,  &  Fournier-Viger,  P.  (2018). 
Extracting  useful  knowledge  from  event  logs:  a 
frequent  itemset  mining  approach.  Knowledge-Based 
Systems, 139, 132-148. 
Fani Sani, M., Zelst, S. J. V., & van der Aalst, W. M. (2018, 
October).  Applying  sequence  mining  for  outlier 
detection  in  process  mining.  In  OTM Confederated 
International Conferences" On the Move to Meaningful 
Internet Systems" (pp. 98-116). Springer, Cham. 
Fournier-Viger, P., Li, J., Lin, J. C. W., Chi, T. T., & Kiran, 
R.  U.  (2020).  Mining  cost-effective patterns  in  event 
logs. Knowledge-Based Systems, 191, 105241. 
Genga,  L.,  Potena,  D.,  Chiorrini,  A.,  Diamantini,  C.,  & 
Zannone, N. (2020). A latitudinal study on the use of 
sequential  and  concurrency  patterns  in  deviance 
mining.  In  Complex Pattern Mining  (pp.  103-119). 
Springer, Cham. 
Graml,  T.,  Bracht,  R.,  &  Spies,  M.  (2007,  October). 
Patterns  of  business  rules  to  enable  agile  business 
processes.  In  11th IEEE International Enterprise 
Distributed Object Computing Conference (EDOC) 
(pp. 365-365). IEEE 
Gupta, N., Anand, K., & Sureka, A. (2015, March). Pariket: 
Mining business process logs for root cause analysis of 
anomalous  incidents.  In  International Workshop on 
Databases in Networked Information Systems (pp. 244-
263). Springer, Cham. 
Huang, Z., Lu, X., & Duan, H. (2011). Mining association 
rules to support resource allocation in business process 
management. Expert Systems with Applications, 38(8), 
9483-9490. 
Khanbabaei, M., Sobhani, F. M., Alborzi, M., & Radfar, R. 
(2018). Developing an integrated framework for using 
data  mining  techniques  and  ontology  concepts  for 
process  improvement.  Journal of Systems and 
Software, 137, 78-95. 
Imran, M., Ismail, M. A., Hamid, S., & Nasir, M. H. N. M. 
(2022). Complex process modeling in Process mining: 
A systematic review. In IEEE Access. 
Liu, T., Cheng, Y., & Ni, Z. (2012). Mining event logs to 
support  workflow  resource  allocation.  Knowledge-
Based Systems, 35, 320-331. 
Ly, L. T., Rinderle, S., Dadam, P., & Reichert, M. (2005, 
September). Mining staff assignment rules from event-
based  data.  In  International Conference on Business 
Process Management (pp. 177-190). Springer, Berlin, 
Heidelberg. 
Mannhardt,  F.,  Leoni,  M.  D.,  Reijers,  H.  A.,  &  van  der 
Aalst,  W.  M.  (2017,  June).  Data-driven  process 
discovery-revealing  conditional  infrequent  behavior 
from  event  logs.  In  International conference on 
advanced information systems engineering  (pp.  545-
560). Springer, Cham.