Publisher
Springer Science and Business Media LLC
Reference46 articles.
1. Accorsi R, Stocker T. On the exploitation of process mining for security audits: the conformance checking case. In: Ossowski S and Lecca P (eds) Proceedings of the ACM symposium on applied computing, SAC 2012, Riva, Trento, Italy, March 26–30, 2012. 2012;pp. 1709–16, ACM.
2. Giacalone M, Cusatelli C, Santarcangelo V. Big data compliance for innovative clinical models. Big Data Res. 2018;12:35–40.
3. Yang S, Sarcevic A, Farneth RA, Chen S, Ahmed OZ, Marsic I, Burd RS. An approach to automatic process deviation detection in a time-critical clinical process. J Biomed Informatics. 2018;85:155–67.
4. Alizadeh M, Lu X, Fahland D, Zannone N, van der Aalst WMP. Linking data and process perspectives for conformance analysis. Comput Secur. 2018;73:172–93.
5. Rubin VA, Mitsyuk AA, Lomazova IA, van der Aalst WMP. Process mining can be applied to software too!. In: Morisio M, Dybå T and Torchiano M (eds) 2014 ACM-IEEE international symposium on empirical software engineering and measurement, ESEM’14, Torino, Italy, September 18–19, 2014. 2014;pp. 57:1–57:8, ACM.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献