Author:
Roubtsova Ella,Wiersma Niels
Publisher
Springer International Publishing
Reference25 articles.
1. Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1709–1716. ACM (2012)
2. Lecture Notes in Computer Science;A Awad,2009
3. Barnawi, A., Awad, A., Elgammal, A., Elshawi, R., Almalaise, A., Sakr, S.: An anti-pattern-based runtime business process compliance monitoring framework. Framework 7(2), 551–572 (2016)
4. Becker, J., Delfmann, P., Dietrich, H.A., Steinhorst, M., Eggert, M.: Business process compliance checking-applying and evaluating a generic pattern matching approach for conceptual models in the financial sector. Inf. Syst. Front. 18(2), 359–405 (2016)
5. Business Process Analysis in R (2017).
http://bupar.net/
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献