Sciweavers

44 search results - page 4 / 9
» Logging key assurance indicators in business processes
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
BPM
2009
Springer
175views Business» more  BPM 2009»
14 years 3 months ago
Understanding Spaghetti Models with Sequence Clustering for ProM
The goal of process mining is to discover process models from event logs. However, for processes that are not well structured and have a lot of diverse behavior, existing process m...
Gabriel M. Veiga, Diogo R. Ferreira
ACSAC
2009
IEEE
14 years 3 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
WWW
2010
ACM
14 years 3 months ago
The paths more taken: matching DOM trees to search logs for accurate webpage clustering
An unsupervised clustering of the webpages on a website is a primary requirement for most wrapper induction and automated data extraction methods. Since page content can vary dras...
Deepayan Chakrabarti, Rupesh R. Mehta
WECWIS
2007
IEEE
172views ECommerce» more  WECWIS 2007»
14 years 2 months ago
An Analysis Tool for Execution of BPEL Services
Business Process Execution Language (BPEL) is an XML-based language for specifying services. There have been numerous recent research and development efforts in both statically an...
Ariane Gravel, Xiang Fu, Jianwen Su