Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance (original) (raw)
Related papers
On the exploitation of process mining for security audits
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Process Mining: Auditing Approach Based on Process Discovery Using Frequency Paths Concept
ASM Science Journal
Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor
ACM SIGMOD Record, 2001
Improving Process Mining: a Data Loss Prevention System case study
Process Mining: A 360 Degree Overview
Hybrid association rule learning and process mining for fraud detection
IAENG International Journal of Computer Science
Beyond Process Mining: From the Past to Present and Future
Process-mining-enabled audit of information systems: Methodology and an application
Expert Systems with Applications, 2018
Business process mining for internal fraud risk reduction: Results of a case study
2008
Process Mining of Event Logs in Auditing: Opportunities and Challenges
SSRN Electronic Journal, 2000
Process mining: a research agenda
Computers in Industry, 2004
Applying Process Mining in SOA Environments
Lecture Notes in Computer Science, 2010
Process Mining – New era in process management - A Survey
Active Anomaly Detection for Key Item Selection in Process Auditing
Lecture Notes in Business Information Processing
A business process mining application for internal transaction fraud mitigation
Expert Systems with Applications, 2011
Conformance Checking Techniques of Process Mining: A Survey
Recent Trends in Intensive Computing, 2021
Process Diagnostics: A Method Based on Process Mining
2009 International Conference on Information, Process, and Knowledge Management, 2009
International Journal of Scientific Research in Science, Engineering and Technology IJSRSET
PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining
2021
Abstractions in Process Mining: A Taxonomy of Patterns
Lecture Notes in Computer Science, 2009
Insider Detection by Process Analysis
Mining Audit Data to Build Intrusion Detection Models
1998
From Zero to Hero: A Process Mining Tutorial
Lecture Notes in Computer Science, 2017
Application and Theory of Petri Nets and Concurrency, 2015
A Principled Approach to the Analysis of Process Mining Algorithms
Lecture Notes in Computer Science, 2011
Anomaly Detection for Service-Oriented Business Processes Using Conformance Analysis
Algorithms
LECTURE NOTES IN BUSINESS INFORMATION PROCESSING, 2011
Recommendation of Process Discovery Algorithms Through Event Log Classification
Lecture Notes in Computer Science, 2015
How active learning and process mining can act as Continuous Auditing catalyst
International Journal of Accounting Information Systems, 2019
Intrusion Detection System for Classifying Process Behavior
2010
Path Mining and Process Mining for Workflow Management Systems
Real-time detection of process change using Process Mining
2011
Detecting Security Violations Based on Multilayered Event Log Processing
Journal of telecommunications and information technology, 2015