Follow
Suriadi Suriadi
Title
Cited by
Cited by
Year
Robotic process automation: contemporary themes and challenges
R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ...
Computers in Industry 115, 103162, 2020
5782020
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information systems 64, 132-150, 2017
2882017
Usability and privacy in identity management architectures
A Josang, M AlZomai, S Suriadi
ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid …, 2007
2182007
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
2042015
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian computer science week multiconference, 1-6, 2018
1842018
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
1182014
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
1072018
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
Advanced Information Systems Engineering: 25th International Conference …, 2013
1052013
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
Business Process Management Workshops: BPM 2012 International Workshops …, 2013
952013
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
872009
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia Pacific Business Process Management: Second Asia Pacific Conference, AP …, 2014
842014
On predicting academic performance with process mining in learning analytics
R Umer, T Susnjak, A Mathrani, S Suriadi
Journal of Research in Innovative Teaching & Learning 10 (2), 160-176, 2017
822017
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
On the Move to Meaningful Internet Systems: OTM 2014 Conferences …, 2014
732014
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
48*2015
Detection and interactive repair of event ordering imperfection in process logs
PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ...
Advanced Information Systems Engineering: 30th International Conference …, 2018
472018
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
362010
Discovering work prioritisation patterns from event logs
S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 100, 77-92, 2017
352017
Towards event log querying for data quality: Let’s start with detecting log imperfections
R Andrews, S Suriadi, C Ouyang, E Poppe
On the Move to Meaningful Internet Systems. OTM 2018 Conferences …, 2018
342018
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
332011
Process discovery for industrial control system cyber attack detection
D Myers, K Radke, S Suriadi, E Foo
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
312017
The system can't perform the operation now. Try again later.
Articles 1–20