Suriadi Suriadi
Title
Cited by
Cited by
Year
Usability and privacy in identity management architectures
A Josang, M AlZomai, S Suriadi
ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid …, 2007
1882007
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
1162015
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information Systems 64, 132-150, 2017
992017
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
822014
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
692013
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
672012
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
672009
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
572014
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific Conference on Business Process Management, 43-58, 2014
482014
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
322010
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
30*2015
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2018
292018
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
242011
Robotic Process Automation: Contemporary themes and challenges
R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ...
Computers in Industry 115, 103162, 2020
222020
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
212010
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
182018
Detection and interactive repair of event ordering imperfection in process logs
PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ...
International Conference on Advanced Information Systems Engineering, 274-290, 2018
142018
On predicting academic performance with process mining in learning analytics
R Umer, T Susnjak, A Mathrani, S Suriadi
Journal of Research in Innovative Teaching & Learning, 2017
142017
Semi-supervised log pattern detection and exploration using event concurrence and contextual information
X Lu, D Fahland, R Andrews, S Suriadi, MT Wynn, AHM ter Hofstede, ...
OTM Confederated International Conferences" On the Move to Meaningful …, 2017
132017
Discovering work prioritisation patterns from event logs
S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 100, 77-92, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20