Author:
Bezerra Fábio,Wainer Jacques
Subject
Hardware and Architecture,Information Systems,Software
Reference49 articles.
1. R. Accorsi, C. Wonnemann, Auditing workflow executions against dataflow policies, in: Business Information Systems, Lecture Notes in Business Information Processing, vol. 47, Springer, 2010, pp. 207–217.
2. R. Accorsi, C. Wonnemann, T. Stocker, Towards forensic data flow analysis of business process logs, in: Sixth International Conference on IT Security Incident Management and IT Forensics (IMF), IEEE Press, 2011, pp. 3–20.
3. R. Agrawal, D. Gunopulos, F. Leymann, Mining process models from workflow logs, in: EDBT '98: Proceedings of the 6th International Conference on Extending Database Technology, Lecture Notes in Computer Science, vol. 1377, Springer, 1998, pp. 469–483.
4. F. Bezerra, J. Wainer, Anomaly detection algorithms in business process logs, in: 10th International Conference on Enterprise Information Systems, SciTePress, 2008, pp. 11–18.
5. F. Bezerra, J. Wainer, Anomaly detection algorithms in logs of process aware systems, in: SAC'08: Proceedings of the ACM Symposium on Applied Computing, 2008, pp. 951–952.
Cited by
81 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献