Electronic mail and weak ties in organizations
Office Technology and People - Computer-Supported Cooperative Work
Free choice Petri nets
Discovering models of software processes from event-based data
ACM Transactions on Software Engineering and Methodology (TOSEM)
Workflow management: models, methods, and systems
Workflow management: models, methods, and systems
Sap R/3 Process Oriented Implementation
Sap R/3 Process Oriented Implementation
A comparison of three authentication properties
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Mining Process Models from Workflow Logs
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Proceedings of the 27th International Conference on Very Large Data Bases
Discovering Workflow Performance Models from Timed Logs
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Workflow-Based Process Monitoring and Controlling ¾ Technical and Organizational Issues
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance
Organizational Data Mining: Leveraging Enterprise Data Resources for Optimal Performance
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Workflow mining: a survey of issues and approaches
Data & Knowledge Engineering
Workflow Mining: Discovering Process Models from Event Logs
IEEE Transactions on Knowledge and Data Engineering
Rediscovering workflow models from event-based data using little thumb
Integrated Computer-Aided Engineering
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Anomaly detection algorithms in logs of process aware systems
Proceedings of the 2008 ACM symposium on Applied computing
Log-based transactional workflow mining
Distributed and Parallel Databases
Mining and re-engineering transactional workflows for reliable executions
ER'07 Proceedings of the 26th international conference on Conceptual modeling
Fraud detection in process aware systems
Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
Service research challenges and solutions for the future internet
A business process mining application for internal transaction fraud mitigation
Expert Systems with Applications: An International Journal
Monitoring business process compliance using compliance rule graphs
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Process mining and security: visualization in database intrusion detection
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
A comparative study of dimensionality reduction techniques to enhance trace clustering performances
Expert Systems with Applications: An International Journal
On the exploitation of process mining for security audits: the process discovery case
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Proceedings of the 2013 workshop on New security paradigms workshop
Information and Software Technology
Hi-index | 0.00 |
One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This paper advocates the use of process mining techniques to analyze audit trails for security violations. It is shown how a specific algorithm, called the @a-algorithm, can be used to support security efforts at various levels ranging from low-level intrusion detection to high-level fraud prevention.