[HTML][HTML] Recognizing task-level events from user interaction data

A Rebmann, H van der Aa - Information Systems, 2024 - Elsevier
User interaction data comprises events that capture individual actions that a user performs
on their computer. Such events provide detailed records about how users carry out their …

Process-aware intrusion detection in mqtt networks

P Empl, F Böhm, G Pernul - … of the Fourteenth ACM Conference on Data …, 2024 - dl.acm.org
Intrusion Detection Systems (IDS) allow for detecting malicious activities in organizational
networks and hosts. As the Industrial Internet of Things (Industrial IoT) has gained …

Unsupervised task recognition from user interaction streams

A Rebmann, H van der Aa - International Conference on Advanced …, 2023 - Springer
User interaction events can give an accurate picture of tasks executed in a process, since
they capture work performed across applications in a detailed manner. However, such data …

Recent Advances in Data-Driven Business Process Management

L Ackermann, M Käppel, L Marcus, L Moder… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid development of cutting-edge technologies, the increasing volume of data and also
the availability and processability of new types of data sources has led to a paradigm shift in …

From network traffic data to a business-level event log

M Hadad, G Engelberg, P Soffer - International Conference on Business …, 2023 - Springer
Event logs are the main source for business process mining techniques. However, not all
information systems produce a standard event log. Furthermore, logs may reflect only parts …

[HTML][HTML] Reading between the Lines: Process Mining on OPC UA Network Data

M Hornsteiner, P Empl, T Bunghardt, S Schönig - Sensors, 2024 - mdpi.com
The introduction of the Industrial Internet of Things (IIoT) has led to major changes in the
industry. Thanks to machine data, business process management methods and techniques …

From network traffic data to business activities: a conceptualization and a recognition approach

M Hadad, G Engelberg, P Soffer - Software and Systems Modeling, 2023 - Springer
Event logs are the main source for business process mining techniques. However, readily
available logs are produced only by part of the existing systems, which may not always be …

Semantics-aware event data transformation for process mining

AG Rebmann - 2024 - madoc.bib.uni-mannheim.de
Process mining comprises methods to analyze organizational processes based on event
data recorded by information systems during process execution. These methods generate …

[PDF][PDF] An Uncertainty-Aware Event Log of Network Traffic.

G Engelberg, M Hadad, M Pegoraro, P Soffer… - BPM (Demos …, 2023 - ceur-ws.org
Abstract Business Process Management (BPM) heavily relies on event logs for process
mining. However, traditional event logs may not always be available or may be harder to …

From Network Traffic Data to Event Log

M Hadad - 2023 - search.proquest.com
Event logs are the main source for business process mining techniques. However, not all
information systems produce a standard event log. Furthermore, logs may reflect only parts …