P Empl, F Böhm, G Pernul - … of the Fourteenth ACM Conference on Data …, 2024 - dl.acm.org
Intrusion Detection Systems (IDS) allow for detecting malicious activities in organizational networks and hosts. As the Industrial Internet of Things (Industrial IoT) has gained …
User interaction events can give an accurate picture of tasks executed in a process, since they capture work performed across applications in a detailed manner. However, such data …
The rapid development of cutting-edge technologies, the increasing volume of data and also the availability and processability of new types of data sources has led to a paradigm shift in …
Event logs are the main source for business process mining techniques. However, not all information systems produce a standard event log. Furthermore, logs may reflect only parts …
The introduction of the Industrial Internet of Things (IIoT) has led to major changes in the industry. Thanks to machine data, business process management methods and techniques …
Event logs are the main source for business process mining techniques. However, readily available logs are produced only by part of the existing systems, which may not always be …
Process mining comprises methods to analyze organizational processes based on event data recorded by information systems during process execution. These methods generate …
Abstract Business Process Management (BPM) heavily relies on event logs for process mining. However, traditional event logs may not always be available or may be harder to …
Event logs are the main source for business process mining techniques. However, not all information systems produce a standard event log. Furthermore, logs may reflect only parts …