Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance (original) (raw)

On the exploitation of process mining for security audits

Günter Müller

Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

View PDFchevron_right

Process Mining: Auditing Approach Based on Process Discovery Using Frequency Paths Concept

Zineb Lamghari

ASM Science Journal

View PDFchevron_right

Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor

Wil van der Aalst

View PDFchevron_right

Mining system audit data

Wenke Lee

ACM SIGMOD Record, 2001

View PDFchevron_right

Improving Process Mining: a Data Loss Prevention System case study

Francesco Zavatarelli

View PDFchevron_right

Process Mining: A 360 Degree Overview

Wil van der Aalst

View PDFchevron_right

Hybrid association rule learning and process mining for fraud detection

Riyanarto Sarno

IAENG International Journal of Computer Science

View PDFchevron_right

Beyond Process Mining: From the Past to Present and Future

Wil van der Aalst

View PDFchevron_right

Process Mining in Software Systems Discovering Real-Life Business Transactions and Process Models from Distributed Systems

Wil van der Aalst

View PDFchevron_right

Process-mining-enabled audit of information systems: Methodology and an application

VALERIA MININNO

Expert Systems with Applications, 2018

View PDFchevron_right

Business process mining for internal fraud risk reduction: Results of a case study

Nadine LYBAERT, Koen Vanhoof

2008

View PDFchevron_right

Process Mining of Event Logs in Auditing: Opportunities and Challenges

Michael Alles

SSRN Electronic Journal, 2000

View PDFchevron_right

Process mining: a research agenda

Wil van der Aalst

Computers in Industry, 2004

View PDFchevron_right

Applying Process Mining in SOA Environments

Veit Köppen

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Process Mining – New era in process management - A Survey

JACOTECH The Research Group

View PDFchevron_right

Active Anomaly Detection for Key Item Selection in Process Auditing

Angelique Koopman, Xixi Lu

Lecture Notes in Business Information Processing

View PDFchevron_right

A business process mining application for internal transaction fraud mitigation

Nadine LYBAERT, Koen Vanhoof

Expert Systems with Applications, 2011

View PDFchevron_right

Conformance Checking Techniques of Process Mining: A Survey

Ashok Saini

Recent Trends in Intensive Computing, 2021

View PDFchevron_right

Process Diagnostics: A Method Based on Process Mining

Melike Bozkaya

2009 International Conference on Information, Process, and Knowledge Management, 2009

View PDFchevron_right

Segregate Malicious Behavior and Profit Maximization In Cross Organisational Business Process-As-A-Service (COBPAAS) Event Logs

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

View PDFchevron_right

PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining

Alexander Schnitzler

2021

View PDFchevron_right

Abstractions in Process Mining: A Taxonomy of Patterns

Jagadeesh Chandra Bose R. P.

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Insider Detection by Process Analysis

George Avrunin

View PDFchevron_right

Mining Audit Data to Build Intrusion Detection Models

Wenke Lee

1998

View PDFchevron_right

From Zero to Hero: A Process Mining Tutorial

Marco Montali

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Process Mining Reloaded: Event Structures as a Unified Representation of Process Models and Event Logs

Luciano García-Bañuelos

Application and Theory of Petri Nets and Concurrency, 2015

View PDFchevron_right

A Principled Approach to the Analysis of Process Mining Algorithms

Peter Tino

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Anomaly Detection for Service-Oriented Business Processes Using Conformance Analysis

zeeshan tariq

Algorithms

View PDFchevron_right

Process mining manifesto

Hugo Apátiga Perez

LECTURE NOTES IN BUSINESS INFORMATION PROCESSING, 2011

View PDFchevron_right

Recommendation of Process Discovery Algorithms Through Event Log Classification

Raykenler Yzquierdo Herrera

Lecture Notes in Computer Science, 2015

View PDFchevron_right

How active learning and process mining can act as Continuous Auditing catalyst

Marzie Hosseinpour

International Journal of Accounting Information Systems, 2019

View PDFchevron_right

Intrusion Detection System for Classifying Process Behavior

Ole Winther

2010

View PDFchevron_right

Path Mining and Process Mining for Workflow Management Systems

Jorge Cardoso

View PDFchevron_right

Real-time detection of process change using Process Mining

Behzad Bordbar

2011

View PDFchevron_right

Detecting Security Violations Based on Multilayered Event Log Processing

Monika Piwowar

Journal of telecommunications and information technology, 2015

View PDFchevron_right