Author of the publication

Modeling and Verification of Privacy Enhancing Protocols.

, , , and . ICFEM, volume 5885 of Lecture Notes in Computer Science, page 127-146. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Suriadi, Suriadi
add a person with the name Suriadi, Suriadi
 

Other publications of authors with the same name

Anomaly detection for industrial control systems using process mining., , , and . Comput. Secur., (2018)Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets., , , and . AISC, volume 125 of CRPIT, page 47-58. Australian Computer Society, (2012)Data quality challenges in educational process mining: building process-oriented event logs from process-unaware online learning systems., , , and . Int. J. Bus. Inf. Syst., 39 (4): 569-592 (2022)Risk Modelling the Transition of SCADA System to IPv6., , , , and . HCC, volume 328 of IFIP Advances in Information and Communication Technology, page 384-395. Springer, (2010)Improving performance of intrusion detection system using ensemble methods and feature selection., , , , and . ACSW, page 2:1-2:6. ACM, (2018)Detection and Interactive Repair of Event Ordering Imperfection in Process Logs., , , , , , and . CAiSE, volume 10816 of Lecture Notes in Computer Science, page 274-290. Springer, (2018)Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model., , , and . ICC, page 827-833. IEEE, (2014)Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs., , , and . ICPM, page 41-48. IEEE, (2020)An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection., , and . FIT, page 150-155. IEEE, (2019)Security properties analysis in a TPM-based protocol., , , and . Int. J. Secur. Networks, 9 (2): 85-103 (2014)