Simulating Cyber-Attack Scenarios by Discovering Petri-Nets from Large-Scale Event Logs.
Mohit Dilip MakwanaVedant ThakkarDebanshu DasRajesh KumarPublished in: COMSNETS (2024)
Keyphrases
- petri net
- event logs
- process model
- process mining
- cyber attacks
- security policies
- cyber security
- colored petri nets
- workflow models
- service composition
- fuzzy petri net
- attack detection
- real world
- business process
- network security
- log files
- workflow management systems
- smart grid
- intrusion detection system
- security issues
- critical infrastructure
- computer systems
- knowledge base