Can process mining help in anomaly-based intrusion detection?

Can process mining help in anomaly-based intrusion detection?

Papers citing "Can process mining help in anomaly-based intrusion detection?"