Suriadi Suriadi
Cited by
Cited by
Robotic process automation: contemporary themes and challenges
R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ...
Computers in Industry 115, 103162, 2020
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs
S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn
Information systems 64, 132-150, 2017
Usability and privacy in identity management architectures
A Josang, M AlZomai, S Suriadi
ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid …, 2007
Process mining for clinical processes: a comparative analysis of four Australian hospitals
A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon
ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015
Improving performance of intrusion detection system using ensemble methods and feature selection
NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza
Proceedings of the Australasian computer science week multiconference, 1-6, 2018
Current research in risk-aware business process management―overview, comparison, and gap analysis
S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ...
Communications of the Association for Information Systems 34 (1), 52, 2014
Understanding process behaviours in a large insurance company in Australia: A case study
S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ Dijk
International Conference on Advanced Information Systems Engineering, 449-464, 2013
Root cause analysis with enriched process logs
S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede
International Conference on Business Process Management, 174-186, 2012
A user-centric federated single sign-on system
S Suriadi, E Foo, A Jøsang
Journal of Network and Computer Applications 32 (2), 388-401, 2009
Measuring patient flow variations: A cross-organisational process mining approach
S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon
Asia-Pacific conference on business process management, 43-58, 2014
Mining business process deviance: a quest for accuracy
H Nguyen, M Dumas, ML Rosa, FM Maggi, S Suriadi
OTM Confederated International Conferences" On the Move to Meaningful …, 2014
Anomaly detection for industrial control systems using process mining
D Myers, S Suriadi, K Radke, E Foo
Computers & Security 78, 103-125, 2018
On predicting academic performance with process mining in learning analytics
R Umer, T Susnjak, A Mathrani, S Suriadi
Journal of Research in Innovative Teaching & Learning 10 (2), 160-176, 2017
Event interval analysis: Why do processes take time?
S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede
Decision Support Systems 79, 77-98, 2015
Validating denial of service vulnerabilities in web services
S Suriadi, A Clark, D Schmidt
2010 Fourth International Conference on Network and System Security, 175-182, 2010
Detection and interactive repair of event ordering imperfection in process logs
PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ...
International Conference on Advanced Information Systems Engineering, 274-290, 2018
Defending web services against denial of service attacks using client puzzles
S Suriadi, D Stebila, A Clark, H Liu
2011 IEEE International Conference on Web Services, 25-32, 2011
Discovering work prioritisation patterns from event logs
S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede
Decision Support Systems 100, 77-92, 2017
A distributed denial of service testbed
D Schmidt, S Suriadi, A Tickle, A Clark, G Mohay, E Ahmed, J Mackie
What Kind of Information Society? Governance, Virtuality, Surveillance …, 2010
Towards event log querying for data quality
R Andrews, S Suriadi, C Ouyang, E Poppe
OTM Confederated International Conferences" On the Move to Meaningful …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20