Suriadi Suriadi
TitleCited byYear
Usability and privacy in identity management architectures
A Jøsang, MA Zomai, S Suriadi
Proceedings of the fifth Australasian symposium on ACSW frontiers-Volume 68 …, 2007
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 19, 2015
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information Systems 64, 132-150, 2017
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific Conference on Business Process Management, 43-58, 2014
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 79, 77-98, 2015
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
Turning event logs into process movies: animating what has really happened
M De Leoni, S Suriadi, AHM Ter Hofstede, WMP van der Aalst
Software & Systems Modeling 15 (3), 707-732, 2016
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model
R Amoah, S Suriadi, S Camtepe, E Foo
2014 IEEE International Conference on Communications (ICC), 827-833, 2014
Modeling and verification of privacy enhancing protocols
S Suriadi, C Ouyang, J Smith, E Foo
International Conference on Formal Engineering Methods, 127-146, 2009
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 2, 2018
Discovering work prioritisation patterns from event logs
S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 100, 77-92, 2017
Business process deviance mining: review and evaluation
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
arXiv preprint arXiv:1608.08252, 2016
Analysis of two authorization protocols using Colored Petri Nets
Y Seifi, S Suriadi, E Foo, C Boyd
International Journal of Information Security 14 (3), 221-247, 2015
The system can't perform the operation now. Try again later.
Articles 1–20