processmining
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
processmining [2017/10/19 18:29] – zannonen | processmining [2021/03/05 16:13] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 29: | Line 29: | ||
perspective) or checking user activities against the activities needed to conduct business | perspective) or checking user activities against the activities needed to conduct business | ||
processes (process perspective). Analyzing user behavior from these perspectives | processes (process perspective). Analyzing user behavior from these perspectives | ||
- | independently may not be sufficient to expose security incidents. We have studied how different perspective can be combined to analyze user behavior. | + | independently may not be sufficient to expose security incidents. We have studied how analyze user behavior |
== References: == | == References: == | ||
- | - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: Constructing Probable Explanations of Nonconformity: | + | - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: Constructing Probable Explanations of Nonconformity: |
- | - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 | + | - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 [[http:// |
- | - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. | + | - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. [[http:// |
- | - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ | + | - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ |
- | - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 | + | - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 [[http:// |
- | - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) | + | - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) |
- | - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 | + | - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 |
- | - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 | + | - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 |
processmining.1508430540.txt.gz · Last modified: 2021/01/10 20:59 (external edit)