Author of the publication

Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture.

, , , and . CAiSE Forum, volume 386 of Lecture Notes in Business Information Processing, page 1-13. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Suriadi, Suriadi
add a person with the name Suriadi, Suriadi
 

Other publications of authors with the same name

Anomaly detection for industrial control systems using process mining., , , and . Comput. Secur., (2018)Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets., , , and . AISC, volume 125 of CRPIT, page 47-58. Australian Computer Society, (2012)Risk Modelling the Transition of SCADA System to IPv6., , , , and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 384-395. Springer, (2010)Detection and Interactive Repair of Event Ordering Imperfection in Process Logs., , , , , , and . CAiSE, volume 10816 of Lecture Notes in Computer Science, page 274-290. Springer, (2018)Data quality challenges in educational process mining: building process-oriented event logs from process-unaware online learning systems., , , and . Int. J. Bus. Inf. Syst., 39 (4): 569-592 (2022)Improving performance of intrusion detection system using ensemble methods and feature selection., , , , and . ACSW, page 2:1-2:6. ACM, (2018)Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model., , , and . ICC, page 827-833. IEEE, (2014)Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs., , , and . ICPM, page 41-48. IEEE, (2020)Usability and Privacy in Identity Management Architectures., , and . ACSW, volume 68 of CRPIT, стр. 143-152. Australian Computer Society, (2007)Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs., , , и . Inf. Syst., (2017)