[HTML][HTML] Machine learning in business process management: A systematic literature review

S Weinzierl, S Zilker, S Dunzer, M Matzner - Expert Systems with …, 2024 - Elsevier
Abstract Machine learning (ML) provides algorithms to create computer programs based on
data without explicitly programming them. In business process management (BPM), ML …

[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems

ÁJ Varela-Vaca, DG Rosado, LE Sánchez… - Computers in …, 2021 - Elsevier
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …

Two-stage approach to feature set optimization for unsupervised dataset with heterogeneous attributes

A Chaudhuri, D Samanta, M Sarma - Expert Systems with Applications, 2021 - Elsevier
Unsupervised feature selection (UFS) is utilized in various application domains, such as
data mining, pattern recognition, machine learning, etc. UFS follows three basic approaches …

Measuring data-centre workflows complexity through process mining: The Google cluster case

D Fernández-Cerero, ÁJ Varela-Vaca… - The Journal of …, 2020 - Springer
Data centres have become the backbone of large Cloud services and applications,
providing virtually unlimited elastic and scalable computational and storage resources. The …

Discovering configuration workflows from existing logs using process mining

B Ramos-Gutiérrez, ÁJ Varela-Vaca, JA Galindo… - Empirical Software …, 2021 - Springer
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …

[HTML][HTML] CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

Explanations for over-constrained problems using QuickXPlain with speculative executions

C Vidal, A Felfernig, J Galindo, M Atas… - Journal of Intelligent …, 2021 - Springer
Conflict detection is used in various scenarios ranging from interactive decision making (eg,
knowledge-based configuration) to the diagnosis of potentially faulty models (eg, using …

[HTML][HTML] VaryMinions: leveraging RNNs to identify variants in variability-intensive systems' logs

S Fortz, P Temple, X Devroey, P Heymans… - Empirical Software …, 2024 - Springer
From business processes to course management, variability-intensive software systems
(VIS) are now ubiquitous. One can configure these systems' behaviour by activating options …

Process mining with applications to automotive industry

M Siek, RMG Mukti - IOP Conference Series: Materials Science …, 2020 - iopscience.iop.org
Process mining as a modeling and analysis tool can be used to improve the business
performance by looking at the actual business processes. This paper presents the …