Author:
Mannhardt Felix,Koschmider Agnes,Baracaldo Nathalie,Weidlich Matthias,Michael Judith
Publisher
Springer Science and Business Media LLC
Reference55 articles.
1. Accorsi R, Stocker T, Müller G (2013) On the exploitation of process mining for security audits: the process discovery case. In: Shin Sung Y, Maldonado JC (eds) Proceedings of the 28th annual ACM symposium on applied computing, SAC ’13, Coimbra, Portugal, March 18–22. ACM, pp 1462–1468
2. Adam K, Netz L, Varga S, Michael J, Rumpe B, Heuser P, Letmathe P (2018) Model-based generation of enterprise information systems. In: Fellmann M, Sandkuhl K (eds) Enterprise modeling and information systems architectures (EMISA’18), volume 2097 of CEUR workshop proceedings, pp 75–79. CEUR-WS.org
3. Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data, SIGMOD ’00. ACM, New York, NY, pp 439–450
4. Aldeen YAAS, Salleh M, Razzaque MA (2015) A comprehensive review on privacy preserving data mining. SpringerPlus 4(1):694
5. Arasu A, Babcock B, Babu S, Cieslewicz J, Datar M, Ito K, Motwani R, Srivastava U, Widom J (2016) STREAM: the Stanford data stream management system. In: Garofalakis MN, Gehrke J, Rastogi R (eds) Data stream management: processing high-speed data streams, data-centric systems and applications. Springer, Berlin, pp 317–336
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A survey of the fusion of traditional data security technology and blockchain;Expert Systems with Applications;2024-10
2. Improving Process Mining Maturity – From Intentions to Actions;Business & Information Systems Engineering;2024-07-30
3. Privacy-Aware Analysis based on Data Series;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13
4. User Behavior Mining;Business & Information Systems Engineering;2024-01-05
5. Process Choreography;Fundamentals of Information Systems Interoperability;2024