User Tools

Site Tools


processmining

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
processmining [2017/10/24 19:45]
zannonen
processmining [2017/10/24 19:46] (current)
zannonen
Line 34: Line 34:
 == References: == == References: ==
   - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: Constructing Probable Explanations of Nonconformity:​ A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 [[http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-deLE-ZANN-15-CIDM.pdf|PDF]]   - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: Constructing Probable Explanations of Nonconformity:​ A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 [[http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-deLE-ZANN-15-CIDM.pdf|PDF]]
-  - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 [http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-deLE-ZANN-14-SIMPDA-PostProc.pdf|PDF] +  - Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone: History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 [[http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-deLE-ZANN-14-SIMPDA-PostProc.pdf|PDF]
-  - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. [http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-ZANN-16-CODASPY.pdf|PDF] +  - Mahdi Alizadeh and Nicola Zannone. Risk-based analysis of business process executions. In Proceedings of ACM Conference on Data and Application Security and Privacy, pages 130–132. ACM, 2016. [[http://​security1.win.tue.nl/​~zannone/​publication/​ALIZ-ZANN-16-CODASPY.pdf|PDF]
-  - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/​ECML 2016: 181-197 [http://​security1.win.tue.nl/​~zannone/​publication/​GENG-POTE-MART-ALIZ-DIAM-ZANN-16-NFmcp.pdf|PDF] +  - Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone: Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/​ECML 2016: 181-197 ​[[http://​security1.win.tue.nl/​~zannone/​publication/​GENG-POTE-MART-ALIZ-DIAM-ZANN-16-NFmcp.pdf|PDF]
-  - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 [http://​ceur-ws.org/​Vol-1920/​BPM_2017_paper_186.pdf|PDF]+  - Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone: APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 [[http://​ceur-ws.org/​Vol-1920/​BPM_2017_paper_186.pdf|PDF]]
   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) [[http://​security1.win.tue.nl/​~zannone/​publication/​ADRI-BOUD-ZANN-13-IT.pdf|PDF]]   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Privacy Analysis of User Behavior Using Alignments. it - Information Technology 55(6): 255-260 (2013) [[http://​security1.win.tue.nl/​~zannone/​publication/​ADRI-BOUD-ZANN-13-IT.pdf|PDF]]
   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 [[http://​security1.win.tue.nl/​~zannone/​publication/​ADRI-BOUD-ZANN-13-PASSAT.pdf|PDF]]   - Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone: Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 [[http://​security1.win.tue.nl/​~zannone/​publication/​ADRI-BOUD-ZANN-13-PASSAT.pdf|PDF]]
   - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 [[http://​security1.win.tue.nl/​~zannone/​publication/​BANE-PETK-ZANN-12-BPM.pdf|PDF]]   - Sebastian Banescu, Milan Petkovic, Nicola Zannone: Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 [[http://​security1.win.tue.nl/​~zannone/​publication/​BANE-PETK-ZANN-12-BPM.pdf|PDF]]
processmining.txt · Last modified: 2017/10/24 19:46 by zannonen