Author:
Myers David,Radke Kenneth,Suriadi Suriadi,Foo Ernest
Publisher
Springer International Publishing
Reference18 articles.
1. Van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Electron. Notes Theor. Comput. Sci. 121, 3–21 (2005)
2. Accorsi, R., Stocker, T.: On the exploitation of process mining for security audits: the conformance checking case. In: SAC, pp. 1709–1716. ACM (2012)
3. Accorsi, R., Stocker, T., Müller, G.: On the exploitation of process mining for security audits: the process discovery case. In: SAC, pp. 1462–1468. ACM (2013)
4. Daneels, A., Salter, W.: What is SCADA. In: Bulfone, D., Daneels, A. (eds.) International Conference on Accelerator and Large Experimental Physics Control Systems, pp. 339–343. ELETTRA, October 1999
5. Lecture Notes in Computer Science;CW Günther,2007
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献