Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance, Electronic Notes in Theoretical Computer Science, vol.121, pp.3-21, 2005. ,
DOI : 10.1016/j.entcs.2004.10.013
On the exploitation of process mining for security audits, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1709-1716, 2012. ,
DOI : 10.1145/2245276.2232051
On the exploitation of process mining for security audits, Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pp.1462-1468, 2013. ,
DOI : 10.1145/2480362.2480634
What is SCADA, International Conference on Accelerator and Large Experimental Physics Control Systems, pp.339-343, 1999. ,
Fuzzy Mining ??? Adaptive Process Simplification Based on Multi-perspective Metrics, In BPM LNCS, pp.328-343, 2007. ,
DOI : 10.1007/978-3-540-75183-0_24
A log mining approach for process monitoring in SCADA, International Journal of Information Security, vol.22, issue.3, pp.231-251, 2012. ,
DOI : 10.1007/s10207-012-0163-8
Security issues in SCADA networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006. ,
DOI : 10.1016/j.cose.2006.03.001
Control systems/scada forensics, what's the difference? Digital Investigation, pp.160-174, 2014. ,
Discovery of Frequent Episodes in Event Logs, Data-Driven Process Discovery and Analysis -SIMPDA 2014, LNBIP, pp.1-31, 2014. ,
DOI : 10.1007/978-3-319-27243-6_1
URL : https://hal.archives-ouvertes.fr/hal-01442338
Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour, BPM Workshops , LNBIP, pp.66-78, 2013. ,
DOI : 10.1007/978-3-319-06257-0_6
The Need for a Process Mining Evaluation Framework in Research and Practice, BPM Workshops, pp.84-89, 2007. ,
DOI : 10.1007/978-3-540-78238-4_10
Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, pp.1128-1142, 2004. ,
DOI : 10.1109/TKDE.2004.47
Process Mining Manifesto, BPM Workshops, LNBIP, pp.169-194, 2011. ,
DOI : 10.1007/978-3-642-19345-3
Business process mining: An industrial application, Information Systems, vol.32, issue.5, pp.713-732, 2007. ,
DOI : 10.1016/j.is.2006.05.003
Process Discovery Using Integer Linear Programming, Applications and Theory of Petri Nets, pp.368-387, 2008. ,
DOI : 10.1007/978-3-540-68746-7_24
A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs, Information Systems, vol.37, issue.7, pp.654-676, 2012. ,
DOI : 10.1016/j.is.2012.02.004
Flexible Heuristics Miner (FHM), 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp.310-317, 2011. ,
DOI : 10.1109/CIDM.2011.5949453