1. Prom tools (2020). http://www.promtools.org
2. Rafael, A., Thomas, S.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1709–1716. ACM (2012)
3. Rafael, A., Thomas, S., Günter, M.: On the exploitation of process mining for security audits: the process discovery case. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 1462–1468. ACM (2013)
4. Mahdi, A., Xixi, L., Dirk, F., Nicola, Z., van der Aalst, W.M.P.: Linking data and process perspectives for conformance analysis. Comput. Secur. 73, 172–193 (2018)
5. Michael, A., Rodrigo, S., Marques, M.R., Munoz-Gama, J., Marcos, S.: Human resource allocation in business process management and process mining. Management Decision (2018)