Name
Affiliation
Papers
SURIADI SURIADI
Queensland Univ Technol, Fac Sci & Engn, Brisbane, Qld 4001, Australia
34
Collaborators
Citations 
PageRank 
76
210
18.89
Referers 
Referees 
References 
549
585
300
Search Limit
100585
Title
Citations
PageRank
Year
Robotic Process Automation: Contemporary themes and challenges.60.772020
Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs00.342020
Flexible Integration of Blockchain with Business Process Automation - A Federated Architecture.00.342020
Grounding Process Data Analytics in Domain Knowledge - A Mixed-Method Approach to Identifying Best Practice.00.342019
Improving performance of intrusion detection system using ensemble methods and feature selection.00.342018
Towards Event Log Querying for Data Quality - Let's Start with Detecting Log Imperfections.00.342018
Anomaly detection for industrial control systems using process mining.60.502018
Detection and Interactive Repair of Event Ordering Imperfection in Process Logs.10.382018
Process Discovery For Industrial Control System Cyber Attack Detection20.382017
Discovering work prioritisation patterns from event logs.30.392017
Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information.10.372017
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs.30.372017
Opportunities and challenges of mobile learning for promoting mathematical literacy.10.362016
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.00.342016
Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes.00.342016
Business Process Deviance Mining: Review and Evaluation.10.352016
Event interval analysis: Why do processes take time?20.382015
Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals170.872015
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model30.432014
Current Research In Risk-Aware Business Process Management. Overview, Comparison, And Gap Analysis160.632014
Mining Business Process Deviance: A Quest for Accuracy.190.832014
Measuring Patient Flow Variations: A Cross-Organisational Process Mining Approach.80.532014
Security properties analysis in a TPM-based protocol00.342014
Understanding process behaviours in a large insurance company in Australia: a case study201.072013
Privacy Compliance Verification in Cryptographic Protocols.20.452012
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets10.352012
Root Cause Analysis with Enriched Process Logs.271.012012
Defending Web Services against Denial of Service Attacks Using Client Puzzles50.512011
Validating Denial of Service Vulnerabilities in Web Services50.472010
Modeling and Verification of Privacy Enhancing Protocols40.462009
Conditional Privacy Using Re-encryption20.452008
Layered identity infrastructure model for identity meta systems10.362008
A User-Centric Protocol for Conditional Anonymity Revocation30.412008
Usability and privacy in identity management architectures513.102007