User Tools

Site Tools


processmining

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
processmining [2017/10/24 19:45] zannonenprocessmining [2017/10/24 19:46] zannonen
Line 37: Line 37:
   - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. [[http://security1.win.tue.nl/~zannone/publication/ALIZ-ZANN-16-CODASPY.pdf|PDF]]   - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. [[http://security1.win.tue.nl/~zannone/publication/ALIZ-ZANN-16-CODASPY.pdf|PDF]]
   - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 [[http://security1.win.tue.nl/~zannone/publication/GENG-POTE-MART-ALIZ-DIAM-ZANN-16-NFmcp.pdf|PDF]]   - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 [[http://security1.win.tue.nl/~zannone/publication/GENG-POTE-MART-ALIZ-DIAM-ZANN-16-NFmcp.pdf|PDF]]
-  - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 [http://ceur-ws.org/Vol-1920/BPM_2017_paper_186.pdf|PDF]+  - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 [[http://ceur-ws.org/Vol-1920/BPM_2017_paper_186.pdf|PDF]]
   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) [[http://security1.win.tue.nl/~zannone/publication/ADRI-BOUD-ZANN-13-IT.pdf|PDF]]   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) [[http://security1.win.tue.nl/~zannone/publication/ADRI-BOUD-ZANN-13-IT.pdf|PDF]]
   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 [[http://security1.win.tue.nl/~zannone/publication/ADRI-BOUD-ZANN-13-PASSAT.pdf|PDF]]   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 [[http://security1.win.tue.nl/~zannone/publication/ADRI-BOUD-ZANN-13-PASSAT.pdf|PDF]]
   - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 [[http://security1.win.tue.nl/~zannone/publication/BANE-PETK-ZANN-12-BPM.pdf|PDF]]   - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 [[http://security1.win.tue.nl/~zannone/publication/BANE-PETK-ZANN-12-BPM.pdf|PDF]]
processmining.txt · Last modified: 2021/03/05 16:13 by 127.0.0.1