Suriadi Suriadi
Title
Cited by
Cited by
Year
Usability and privacy in identity management architectures
A Jøsang, MA Zomai, S Suriadi
Proceedings of the fifth Australasian symposium on ACSW frontiers-Volume 68 …, 2007
1802007
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
1042015
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
772014
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information Systems 64, 132-150, 2017
762017
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
662009
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
622013
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
562012
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
512014
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific Conference on Business Process Management, 43-58, 2014
432014
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
322010
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
25*2015
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
232011
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2018
212018
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
192010
Turning event logs into process movies: animating what has really happened
M De Leoni, S Suriadi, AHM Ter Hofstede, WMP van der Aalst
Software & Systems Modeling 15 (3), 707-732, 2016
122016
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model
R Amoah, S Suriadi, S Camtepe, E Foo
2014 IEEE International Conference on Communications (ICC), 827-833, 2014
122014
Discovering work prioritisation patterns from event logs
S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 100, 77-92, 2017
112017
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
102018
Semi-supervised log pattern detection and exploration using event concurrence and contextual information
X Lu, D Fahland, R Andrews, S Suriadi, MT Wynn, AHM ter Hofstede, ...
OTM Confederated International Conferences" On the Move to Meaningful …, 2017
102017
Analysis of two authorization protocols using Colored Petri Nets
Y Seifi, S Suriadi, E Foo, C Boyd
International Journal of Information Security 14 (3), 221-247, 2015
92015
The system can't perform the operation now. Try again later.
Articles 1–20