Login / Signup

Abducing Compliance of Incomplete Event Logs.

Federico ChesaniRiccardo De MasellisChiara Di FrancescomarinoChiara GhidiniPaola MelloMarco MontaliSergio Tessaris
Published in: AI*IA (2016)
Keyphrases
  • event logs
  • process mining
  • process model
  • business process
  • log files
  • security policies
  • intrusion detection
  • formal concept analysis
  • control flow