Suriadi Suriadi

Orcid: 0000-0002-6311-5927

According to our database1, Suriadi Suriadi authored at least 43 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Data quality challenges in educational process mining: building process-oriented event logs from process-unaware online learning systems.
Int. J. Bus. Inf. Syst., 2022

2020
Robotic Process Automation: Contemporary themes and challenges.
Comput. Ind., 2020

Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs.
Proceedings of the 2nd International Conference on Process Mining, 2020

Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture.
Proceedings of the Advanced Information Systems Engineering, 2020

2019
A Contextual Approach to Detecting Synonymous and Polluted Activity Labels in Process Event Logs.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019

An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019

Grounding Process Data Analytics in Domain Knowledge: A Mixed-Method Approach to Identifying Best Practice.
Proceedings of the Business Process Management Forum, 2019

2018
Anomaly detection for industrial control systems using process mining.
Comput. Secur., 2018

Towards Event Log Querying for Data Quality - Let's Start with Detecting Log Imperfections.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

Detection and Interactive Repair of Event Ordering Imperfection in Process Logs.
Proceedings of the Advanced Information Systems Engineering, 2018

Improving performance of intrusion detection system using ensemble methods and feature selection.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

Improving Patient Flows at St. Andrew's War Memorial Hospital's Emergency Department Through Process Mining.
Proceedings of the Business Process Management Cases, 2018

2017
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs.
Inf. Syst., 2017

Discovering work prioritisation patterns from event logs.
Decis. Support Syst., 2017

Process Discovery for Industrial Control System Cyber Attack Detection.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017

2016
Turning event logs into process movies: animating what has really happened.
Softw. Syst. Model., 2016

Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
Complex Syst. Informatics Model. Q., 2016

Business Process Deviance Mining: Review and Evaluation.
CoRR, 2016

Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes.
Proceedings of the CAiSE'16 Forum, 2016

2015
Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals.
ACM Trans. Manag. Inf. Syst., 2015

Analysis of two authorization protocols using Colored Petri Nets.
Int. J. Inf. Sec., 2015

Event interval analysis: Why do processes take time?
Decis. Support Syst., 2015

Opportunities and challenges of mobile learning for promoting mathematical literacy.
Proceedings of the Australasian Conference on Information Systems, 2015

2014
Security properties analysis in a TPM-based protocol.
Int. J. Secur. Networks, 2014

Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis.
Commun. Assoc. Inf. Syst., 2014

Mining Business Process Deviance: A Quest for Accuracy.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014

Measuring Patient Flow Variations: A Cross-Organisational Process Mining Approach.
Proceedings of the Asia Pacific Business Process Management, 2014

2013
Understanding Process Behaviours in a Large Insurance Company in Australia: A Case Study.
Proceedings of the Advanced Information Systems Engineering, 2013

2012
Privacy Compliance Verification in Cryptographic Protocols.
Trans. Petri Nets Other Model. Concurr., 2012

Root Cause Analysis with Enriched Process Logs.
Proceedings of the Business Process Management Workshops, 2012

Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Defending Web Services against Denial of Service Attacks Using Client Puzzles.
Proceedings of the IEEE International Conference on Web Services, 2011

2010
Validating Denial of Service Vulnerabilities in Web Services.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Risk Modelling the Transition of SCADA System to IPv6.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

A Distributed Denial of Service Testbed.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
A user-centric federated single sign-on system.
J. Netw. Comput. Appl., 2009

Modeling and Verification of Privacy Enhancing Protocols.
Proceedings of the Formal Methods and Software Engineering, 2009

2008
A User-Centric Protocol for Conditional Anonymity Revocation.
Proceedings of the Trust, 2008

Conditional Privacy Using Re-encryption.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Layered Identity Infrastructure Model for Identity Meta Systems.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
Usability and Privacy in Identity Management Architectures.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007


  Loading...