Process Discovery for Industrial Control System Cyber Attack Detection
Open Access
- 4 May 2017
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- A log mining approach for process monitoring in SCADAInternational Journal of Information Security, 2012
- A multi-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logsInformation Systems, 2012
- Process Mining ManifestoLecture Notes in Business Information Processing, 2012
- Process Discovery Using Integer Linear ProgrammingLecture Notes in Computer Science, 2008
- The Need for a Process Mining Evaluation Framework in Research and PracticeLecture Notes in Computer Science, 2008
- Business process mining: An industrial applicationInformation Systems, 2007
- Fuzzy Mining – Adaptive Process Simplification Based on Multi-perspective MetricsLecture Notes in Computer Science, 2007
- Security issues in SCADA networksComputers & Security, 2006
- Process Mining and Security: Detecting Anomalous Process Executions and Checking Process ConformanceElectronic Notes in Theoretical Computer Science, 2005
- Workflow mining: discovering process models from event logsIEEE Transactions on Knowledge and Data Engineering, 2004