Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Torgny Andersson
Robert J. Zomer
Scott A. Starks
Hikaru Fujisaki
Michael Terry
Zhihao Li
Camila Sanz
Ferrán Valdez
Radu Timofte
Guanju Xiao
Home
/
Author
/
SURIADI SURIADI
Author Info
Open Visualization
Name
Affiliation
Papers
SURIADI SURIADI
Queensland Univ Technol, Fac Sci & Engn, Brisbane, Qld 4001, Australia
34
Collaborators
Citations
PageRank
76
210
18.89
Referers
Referees
References
549
585
300
Search Limit
100
585
Publications (34 rows)
Collaborators (76 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Robotic Process Automation: Contemporary themes and challenges.
6
0.77
2020
Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs
0
0.34
2020
Flexible Integration of Blockchain with Business Process Automation - A Federated Architecture.
0
0.34
2020
Grounding Process Data Analytics in Domain Knowledge - A Mixed-Method Approach to Identifying Best Practice.
0
0.34
2019
Improving performance of intrusion detection system using ensemble methods and feature selection.
0
0.34
2018
Towards Event Log Querying for Data Quality - Let's Start with Detecting Log Imperfections.
0
0.34
2018
Anomaly detection for industrial control systems using process mining.
6
0.50
2018
Detection and Interactive Repair of Event Ordering Imperfection in Process Logs.
1
0.38
2018
Process Discovery For Industrial Control System Cyber Attack Detection
2
0.38
2017
Discovering work prioritisation patterns from event logs.
3
0.39
2017
Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information.
1
0.37
2017
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs.
3
0.37
2017
Opportunities and challenges of mobile learning for promoting mathematical literacy.
1
0.36
2016
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
0
0.34
2016
Characterizing Problem Gamblers in New Zealand: A Novel Expression of Process Cubes.
0
0.34
2016
Business Process Deviance Mining: Review and Evaluation.
1
0.35
2016
Event interval analysis: Why do processes take time?
2
0.38
2015
Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals
17
0.87
2015
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model
3
0.43
2014
Current Research In Risk-Aware Business Process Management. Overview, Comparison, And Gap Analysis
16
0.63
2014
Mining Business Process Deviance: A Quest for Accuracy.
19
0.83
2014
Measuring Patient Flow Variations: A Cross-Organisational Process Mining Approach.
8
0.53
2014
Security properties analysis in a TPM-based protocol
0
0.34
2014
Understanding process behaviours in a large insurance company in Australia: a case study
20
1.07
2013
Privacy Compliance Verification in Cryptographic Protocols.
2
0.45
2012
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets
1
0.35
2012
Root Cause Analysis with Enriched Process Logs.
27
1.01
2012
Defending Web Services against Denial of Service Attacks Using Client Puzzles
5
0.51
2011
Validating Denial of Service Vulnerabilities in Web Services
5
0.47
2010
Modeling and Verification of Privacy Enhancing Protocols
4
0.46
2009
Conditional Privacy Using Re-encryption
2
0.45
2008
Layered identity infrastructure model for identity meta systems
1
0.36
2008
A User-Centric Protocol for Conditional Anonymity Revocation
3
0.41
2008
Usability and privacy in identity management architectures
51
3.10
2007
1