Login / Signup
On the exploitation of process mining for security audits: the conformance checking case.
Rafael Accorsi
Thomas Stocker
Published in:
SAC (2012)
Keyphrases
</>
process mining
process model
event logs
information security
intrusion detection
domain specific
access control
business processes
information retrieval
website
case based reasoning
business process
network security
security issues
clinical pathway