Login / Signup
On the exploitation of process mining for security audits: the process discovery case.
Rafael Accorsi
Thomas Stocker
Günter Müller
Published in:
SAC (2013)
Keyphrases
</>
process mining
process model
event logs
business process
business processes
data mining
formal concept analysis
clinical pathway
website
case study
pattern recognition
intrusion detection
network security