Thomas Stocker

According to our database1, Thomas Stocker authored at least 13 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Sicherheit in Geschäftsprozessen : Prozessrekonstruktion als Werkzeug nachgelagerter Prozessanalysen (Security in business processes : process discovery as a tool for a posteriory process analysis)
PhD thesis, 2014

Security Workflow Analysis Toolkit.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

SecSy: A Security-oriented Tool for Synthesizing Process Event Logs.
Proceedings of the BPM Demo Sessions 2014 Co-located with the 12th International Conference on Business Process Management (BPM 2014), 2014

2013
Computergestützte Prozessauditierung mit Process Mining.
HMD Prax. Wirtsch., 2013

IF-Net: A Meta-Model for Security-Oriented Process Specification.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

On the exploitation of process mining for security audits: the process discovery case.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

SecSy: Synthesizing Smart Process Event Logs.
Proceedings of the Enterprise Modelling and Information Systems Architectures: Proceedings of the 5th International Workshop on Enterprise Modelling and Information Systems Architectures, 2013

2012
On the exploitation of process mining for security audits: the conformance checking case.
Proceedings of the ACM Symposium on Applied Computing, 2012

2011
Discovering Workflow Changes with Time-Based Trace Clustering.
Proceedings of the Data-Driven Process Discovery and Analysis, 2011

Towards Forensic Data Flow Analysis of Business Process Logs.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Data Flow-Oriented Process Mining to Support Security Audits.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011

Time-Based Trace Clustering for Evolution-Aware Security Audits.
Proceedings of the Business Process Management Workshops, 2011

2008
Automated Privacy Audits Based on Pruning of Log Data.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008


  Loading...