Suriadi Suriadi
Cited by
Cited by
Usability and privacy in identity management architectures
A Josang, M AlZomai, S Suriadi
ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid …, 2007
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information systems 64, 132-150, 2017
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
Robotic process automation: contemporary themes and challenges
R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ...
Computers in Industry 115, 103162, 2020
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2018
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific Conference on Business Process Management, 43-58, 2014
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
On predicting academic performance with process mining in learning analytics
R Umer, T Susnjak, A Mathrani, S Suriadi
Journal of Research in Innovative Teaching & Learning, 2017
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
A learning analytics approach: Using online weekly student engagement data to make predictions on student performance
R Umer, T Susnjak, A Mathrani, S Suriadi
2018 International Conference on Computing, Electronic and Electrical …, 2018
Detection and interactive repair of event ordering imperfection in process logs
PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ...
International Conference on Advanced Information Systems Engineering, 274-290, 2018
Semi-supervised log pattern detection and exploration using event concurrence and contextual information
X Lu, D Fahland, R Andrews, S Suriadi, MT Wynn, AHM ter Hofstede, ...
OTM Confederated International Conferences" On the Move to Meaningful …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20