Suriadi Suriadi
Titre
Citée par
Citée par
Année
Usability and privacy in identity management architectures
A Josang, M AlZomai, S Suriadi
ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid …, 2007
1942007
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information Systems 64, 132-150, 2017
1332017
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
1272015
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
932014
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
722013
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
722009
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
692012
Robotic process automation: contemporary themes and challenges
R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ...
Computers in Industry 115, 103162, 2020
642020
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
592014
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific Conference on Business Process Management, 43-58, 2014
542014
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2018
482018
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
382010
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
32*2015
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
292011
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
262018
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
232010
On predicting academic performance with process mining in learning analytics
R Umer, T Susnjak, A Mathrani, S Suriadi
Journal of Research in Innovative Teaching & Learning, 2017
172017
A learning analytics approach: Using online weekly student engagement data to make predictions on student performance
R Umer, T Susnjak, A Mathrani, S Suriadi
2018 International Conference on Computing, Electronic and Electrical …, 2018
162018
Detection and interactive repair of event ordering imperfection in process logs
PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ...
International Conference on Advanced Information Systems Engineering, 274-290, 2018
162018
Semi-supervised log pattern detection and exploration using event concurrence and contextual information
X Lu, D Fahland, R Andrews, S Suriadi, MT Wynn, AHM ter Hofstede, ...
OTM Confederated International Conferences" On the Move to Meaningful …, 2017
152017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20