W. M. Aalst and A. K. De-medeiros, Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance, Electronic Notes in Theoretical Computer Science, vol.121, pp.3-21, 2005.
DOI : 10.1016/j.entcs.2004.10.013

R. Accorsi and T. Stocker, On the exploitation of process mining for security audits, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1709-1716, 2012.
DOI : 10.1145/2245276.2232051

R. Accorsi, T. Stocker, and G. Müller, On the exploitation of process mining for security audits, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pp.1462-1468, 2013.
DOI : 10.1145/2480362.2480634

A. Daneels and W. Salter, What is SCADA, International Conference on Accelerator and Large Experimental Physics Control Systems, pp.339-343, 1999.

C. W. Günther, W. M. Van-der, and . Aalst, Fuzzy Mining ??? Adaptive Process Simplification Based on Multi-perspective Metrics, In BPM LNCS, pp.328-343, 2007.
DOI : 10.1007/978-3-540-75183-0_24

D. Had?iosmanovi´had?iosmanovi´c, D. Bolzoni, and P. H. Hartel, A log mining approach for process monitoring in SCADA, International Journal of Information Security, vol.22, issue.3, pp.231-251, 2012.
DOI : 10.1007/s10207-012-0163-8

V. M. Igure, S. A. Laughter, and R. D. Williams, Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006.
DOI : 10.1016/j.cose.2006.03.001

R. V. Knijff, Control systems/scada forensics, what's the difference? Digital Investigation, pp.160-174, 2014.

M. Leemans and W. M. Van-der-aalst, Discovery of Frequent Episodes in Event Logs, Data-Driven Process Discovery and Analysis -SIMPDA 2014, LNBIP, pp.1-31, 2014.
DOI : 10.1007/978-3-319-27243-6_1

URL : https://hal.archives-ouvertes.fr/hal-01442338

S. J. Leemans, D. Fahland, and W. M. Van-der-aalst, Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour, BPM Workshops , LNBIP, pp.66-78, 2013.
DOI : 10.1007/978-3-319-06257-0_6

A. Rozinat, A. K. De-medeiros, C. W. Günther, A. Weijters, and W. M. Van-der-aalst, The Need for a Process Mining Evaluation Framework in Research and Practice, BPM Workshops, pp.84-89, 2007.
DOI : 10.1007/978-3-540-78238-4_10

W. Van-der-aalst, T. Weijters, and L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, pp.1128-1142, 2004.
DOI : 10.1109/TKDE.2004.47

W. E. Van-der and . Aalst, Process Mining Manifesto, BPM Workshops, LNBIP, pp.169-194, 2011.
DOI : 10.1007/978-3-642-19345-3

W. M. Van-der-aalst, H. A. Reijers, A. J. Weijters, B. F. Van-dongen, A. K. De-medeiros et al., Business process mining: An industrial application, Information Systems, vol.32, issue.5, pp.713-732, 2007.
DOI : 10.1016/j.is.2006.05.003

J. M. Van-der-werf, B. F. Van-dongen, C. A. Hurkens, and A. Serebrenik, Process Discovery Using Integer Linear Programming, Applications and Theory of Petri Nets, pp.368-387, 2008.
DOI : 10.1007/978-3-540-68746-7_24

J. D. Weerdt, M. D. Backer, J. Vanthienen, and B. Baesens, A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs, Information Systems, vol.37, issue.7, pp.654-676, 2012.
DOI : 10.1016/j.is.2012.02.004

A. J. Weijters and J. T. Ribeiro, Flexible Heuristics Miner (FHM), 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp.310-317, 2011.
DOI : 10.1109/CIDM.2011.5949453