Suriadi Suriadi
Orcid: 0000-0002-6311-5927
According to our database1,
Suriadi Suriadi
authored at least 43 papers
between 2007 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Data quality challenges in educational process mining: building process-oriented event logs from process-unaware online learning systems.
Int. J. Bus. Inf. Syst., 2022
2020
Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs.
Proceedings of the 2nd International Conference on Process Mining, 2020
Flexible Integration of Blockchain with Business Process Automation: A Federated Architecture.
Proceedings of the Advanced Information Systems Engineering, 2020
2019
A Contextual Approach to Detecting Synonymous and Polluted Activity Labels in Process Event Logs.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019
An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection.
Proceedings of the International Conference on Frontiers of Information Technology, 2019
Grounding Process Data Analytics in Domain Knowledge: A Mixed-Method Approach to Identifying Best Practice.
Proceedings of the Business Process Management Forum, 2019
2018
Comput. Secur., 2018
Towards Event Log Querying for Data Quality - Let's Start with Detecting Log Imperfections.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018
Proceedings of the Advanced Information Systems Engineering, 2018
Improving performance of intrusion detection system using ensemble methods and feature selection.
Proceedings of the Australasian Computer Science Week Multiconference, 2018
Improving Patient Flows at St. Andrew's War Memorial Hospital's Emergency Department Through Process Mining.
Proceedings of the Business Process Management Cases, 2018
2017
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs.
Inf. Syst., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2017 Conferences, 2017
2016
Softw. Syst. Model., 2016
Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand.
Complex Syst. Informatics Model. Q., 2016
Proceedings of the CAiSE'16 Forum, 2016
2015
Process Mining for Clinical Processes: A Comparative Analysis of Four Australian Hospitals.
ACM Trans. Manag. Inf. Syst., 2015
Int. J. Inf. Sec., 2015
Proceedings of the Australasian Conference on Information Systems, 2015
2014
Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis.
Commun. Assoc. Inf. Syst., 2014
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Asia Pacific Business Process Management, 2014
2013
Understanding Process Behaviours in a Large Insurance Company in Australia: A Case Study.
Proceedings of the Advanced Information Systems Engineering, 2013
2012
Trans. Petri Nets Other Model. Concurr., 2012
Proceedings of the Business Process Management Workshops, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
2011
Proceedings of the IEEE International Conference on Web Services, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
2009
Proceedings of the Formal Methods and Software Engineering, 2009
2008
Proceedings of the Trust, 2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007