Process Discovery for Industrial Control System Cyber Attack Detection
暂无分享,去创建一个
Ernest Foo | David Myers | Suriadi Suriadi | Kenneth Radke | S. Suriadi | Kenneth Radke | Ernest Foo | D. Myers
[1] Wil M. P. van der Aalst,et al. The Need for a Process Mining Evaluation Framework in Research and Practice , 2007, Business Process Management Workshops.
[2] Ricardo Seguel,et al. Process Mining Manifesto , 2011, Business Process Management Workshops.
[3] Rafael Accorsi,et al. On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.
[4] Boudewijn F. van Dongen,et al. Process Discovery using Integer Linear Programming , 2009, Fundam. Informaticae.
[5] Sander J. J. Leemans,et al. Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour , 2013, Business Process Management Workshops.
[6] Boudewijn F. van Dongen,et al. Business process mining: An industrial application , 2007, Inf. Syst..
[7] Bart Baesens,et al. A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs , 2012, Inf. Syst..
[8] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[9] Wil M. P. van der Aalst,et al. Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance , 2005, WISP@ICATPN.
[10] Wil M. P. van der Aalst,et al. Discovery of Frequent Episodes in Event Logs , 2014, SIMPDA.
[11] Pieter H. Hartel,et al. A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.
[12] A. J. M. M. Weijters,et al. Flexible Heuristics Miner (FHM) , 2011, 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[13] Günter Müller,et al. On the exploitation of process mining for security audits: the process discovery case , 2013, SAC '13.
[14] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[15] Wil M. P. van der Aalst,et al. Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics , 2007, BPM.
[16] Ronald M. van der Knijff,et al. Control systems/SCADA forensics, what's the difference? , 2014, Digit. Investig..
[17] A. Daneels,et al. Современные SCADA-системы , 2017 .