Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Suriadi Suriadi"
@article{DBLP:journals/ile/UmerSMS23, author = {Rahila Umer and Teo Susnjak and Anuradha Mathrani and Lim Suriadi}, title = {Current stance on predictive analytics in higher education: opportunities, challenges and future directions}, journal = {Interact. Learn. Environ.}, volume = {31}, number = {6}, pages = {3503--3528}, year = {2023}, url = {https://doi.org/10.1080/10494820.2021.1933542}, doi = {10.1080/10494820.2021.1933542}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ile/UmerSMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbis/UmerSMS22, author = {Rahila Umer and Teo Susnjak and Anuradha Mathrani and Suriadi Suriadi}, title = {Data quality challenges in educational process mining: building process-oriented event logs from process-unaware online learning systems}, journal = {Int. J. Bus. Inf. Syst.}, volume = {39}, number = {4}, pages = {569--592}, year = {2022}, url = {https://doi.org/10.1504/IJBIS.2022.122877}, doi = {10.1504/IJBIS.2022.122877}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbis/UmerSMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/YedidsionSXDS21, author = {Harel Yedidsion and Jennifer Suriadinata and Zifan Xu and Stefan Debruyn and Peter Stone}, title = {A Scavenger Hunt for Service Robots}, booktitle = {{IEEE} International Conference on Robotics and Automation, {ICRA} 2021, Xi'an, China, May 30 - June 5, 2021}, pages = {7774--7780}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICRA48506.2021.9561722}, doi = {10.1109/ICRA48506.2021.9561722}, timestamp = {Fri, 22 Oct 2021 19:54:31 +0200}, biburl = {https://dblp.org/rec/conf/icra/YedidsionSXDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05225, author = {Harel Yedidsion and Jennifer Suriadinata and Zifan Xu and Stefan Debruyn and Peter Stone}, title = {A Scavenger Hunt for Service Robots}, journal = {CoRR}, volume = {abs/2103.05225}, year = {2021}, url = {https://arxiv.org/abs/2103.05225}, eprinttype = {arXiv}, eprint = {2103.05225}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/SyedSABLOHWWR20, author = {Rehan Syed and Suriadi Suriadi and Michael Adams and Wasana Bandara and Sander J. J. Leemans and Chun Ouyang and Arthur H. M. ter Hofstede and Inge van de Weerd and Moe Thandar Wynn and Hajo A. Reijers}, title = {Robotic Process Automation: Contemporary themes and challenges}, journal = {Comput. Ind.}, volume = {115}, pages = {103162}, year = {2020}, url = {https://doi.org/10.1016/j.compind.2019.103162}, doi = {10.1016/J.COMPIND.2019.103162}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/SyedSABLOHWWR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/AdamsS0H20, author = {Michael Adams and Suriadi Suriadi and Akhil Kumar and Arthur H. M. ter Hofstede}, editor = {Nicolas Herbaut and Marcello La Rosa}, title = {Flexible Integration of Blockchain with Business Process Automation: {A} Federated Architecture}, booktitle = {Advanced Information Systems Engineering - CAiSE Forum 2020, Grenoble, France, June 8-12, 2020, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {386}, pages = {1--13}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58135-0\_1}, doi = {10.1007/978-3-030-58135-0\_1}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/AdamsS0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpm/SadeghianaslHST20, author = {Sareh Sadeghianasl and Arthur H. M. ter Hofstede and Suriadi Suriadi and Selen Turkay}, editor = {Boudewijn F. van Dongen and Marco Montali and Moe Thandar Wynn}, title = {Collaborative and Interactive Detection and Repair of Activity Labels in Process Event Logs}, booktitle = {2nd International Conference on Process Mining, {ICPM} 2020, Padua, Italy, October 4-9, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICPM49681.2020.00017}, doi = {10.1109/ICPM49681.2020.00017}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpm/SadeghianaslHST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/WynnSEPPAH19, author = {Moe Thandar Wynn and Suriadi Suriadi and Rebekah Eden and Erik Poppe and Anastasiia Pika and Robert Andrews and Arthur H. M. ter Hofstede}, editor = {Thomas T. Hildebrandt and Boudewijn F. van Dongen and Maximilian R{\"{o}}glinger and Jan Mendling}, title = {Grounding Process Data Analytics in Domain Knowledge: {A} Mixed-Method Approach to Identifying Best Practice}, booktitle = {Business Process Management Forum - {BPM} Forum 2019, Vienna, Austria, September 1-6, 2019, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {360}, pages = {163--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26643-1\_10}, doi = {10.1007/978-3-030-26643-1\_10}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bpm/WynnSEPPAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fit/HussainFS19, author = {Mukhtar Hussain and Ernest Foo and Suriadi Suriadi}, title = {An Improved Industrial Control System Device Logs Processing Method for Process-Based Anomaly Detection}, booktitle = {International Conference on Frontiers of Information Technology, {FIT} 2019, Islamabad, Pakistan, December 16-18, 2019}, pages = {150--155}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/FIT47737.2019.00037}, doi = {10.1109/FIT47737.2019.00037}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fit/HussainFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/SadeghianaslHWS19, author = {Sareh Sadeghianasl and Arthur H. M. ter Hofstede and Moe Thandar Wynn and Suriadi Suriadi}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Martin Hepp and Dave Lewis and Claudio Agostino Ardagna and Robert Meersman}, title = {A Contextual Approach to Detecting Synonymous and Polluted Activity Labels in Process Event Logs}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2019 Conferences - Confederated International Conferences: CoopIS, ODBASE, C{\&}TC 2019, Rhodes, Greece, October 21-25, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11877}, pages = {76--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33246-4\_5}, doi = {10.1007/978-3-030-33246-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/SadeghianaslHWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MyersSRF18, author = {David Myers and Suriadi Suriadi and Kenneth Radke and Ernest Foo}, title = {Anomaly detection for industrial control systems using process mining}, journal = {Comput. Secur.}, volume = {78}, pages = {103--125}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.002}, doi = {10.1016/J.COSE.2018.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MyersSRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/PhamFSJL18, author = {Ngoc Tu Pham and Ernest Foo and Suriadi Suriadi and Helen Jeffrey and Hassan Fareed M. Lahza}, editor = {David Abramson}, title = {Improving performance of intrusion detection system using ensemble methods and feature selection}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2018, Brisbane, QLD, Australia, January 29 - February 02, 2018}, pages = {2:1--2:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167918.3167951}, doi = {10.1145/3167918.3167951}, timestamp = {Tue, 20 Jun 2023 16:27:45 +0200}, biburl = {https://dblp.org/rec/conf/acsw/PhamFSJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/DixitSAWHBA18, author = {Prabhakar M. Dixit and Suriadi Suriadi and Robert Andrews and Moe Thandar Wynn and Arthur H. M. ter Hofstede and Joos C. A. M. Buijs and Wil M. P. van der Aalst}, editor = {John Krogstie and Hajo A. Reijers}, title = {Detection and Interactive Repair of Event Ordering Imperfection in Process Logs}, booktitle = {Advanced Information Systems Engineering - 30th International Conference, CAiSE 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10816}, pages = {274--290}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91563-0\_17}, doi = {10.1007/978-3-319-91563-0\_17}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/DixitSAWHBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/AndrewsSOP18, author = {Robert Andrews and Suriadi Suriadi and Chun Ouyang and Erik Poppe}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Henderik A. Proper and Claudio Agostino Ardagna and Dumitru Roman and Robert Meersman}, title = {Towards Event Log Querying for Data Quality - Let's Start with Detecting Log Imperfections}, booktitle = {On the Move to Meaningful Internet Systems. {OTM} 2018 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11229}, pages = {116--134}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02610-3\_7}, doi = {10.1007/978-3-030-02610-3\_7}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/AndrewsSOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/AndrewsSWHR18, author = {Robert Andrews and Suriadi Suriadi and Moe Wynn and Arthur H. M. ter Hofstede and Sean Rothwell}, editor = {Jan vom Brocke and Jan Mendling}, title = {Improving Patient Flows at St. Andrew's War Memorial Hospital's Emergency Department Through Process Mining}, booktitle = {Business Process Management Cases, Digital Innovation and Business Transformation in Practice}, series = {Management for Professionals}, pages = {311--333}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-58307-5\_17}, doi = {10.1007/978-3-319-58307-5\_17}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/AndrewsSWHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/SuriadiWXAH17, author = {Suriadi Suriadi and Moe Thandar Wynn and Jingxin Xu and Wil M. P. van der Aalst and Arthur H. M. ter Hofstede}, title = {Discovering work prioritisation patterns from event logs}, journal = {Decis. Support Syst.}, volume = {100}, pages = {77--92}, year = {2017}, url = {https://doi.org/10.1016/j.dss.2017.02.002}, doi = {10.1016/J.DSS.2017.02.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/SuriadiWXAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/SuriadiAHW17, author = {Suriadi Suriadi and Robert Andrews and Arthur H. M. ter Hofstede and Moe Thandar Wynn}, title = {Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs}, journal = {Inf. Syst.}, volume = {64}, pages = {132--150}, year = {2017}, url = {https://doi.org/10.1016/j.is.2016.07.011}, doi = {10.1016/J.IS.2016.07.011}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/SuriadiAHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/LuFASWHA17, author = {Xixi Lu and Dirk Fahland and Robert Andrews and Suriadi Suriadi and Moe Thandar Wynn and Arthur H. M. ter Hofstede and Wil M. P. van der Aalst}, editor = {Herv{\'{e}} Panetto and Christophe Debruyne and Walid Gaaloul and Mike P. Papazoglou and Adrian Paschke and Claudio Agostino Ardagna and Robert Meersman}, title = {Semi-supervised Log Pattern Detection and Exploration Using Event Concurrence and Contextual Information}, booktitle = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences - Confederated International Conferences: CoopIS, C{\&}TC, and {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10573}, pages = {154--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69462-7\_11}, doi = {10.1007/978-3-319-69462-7\_11}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/LuFASWHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MyersRSF17, author = {David Myers and Kenneth Radke and Suriadi Suriadi and Ernest Foo}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Process Discovery for Industrial Control System Cyber Attack Detection}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {61--75}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_5}, doi = {10.1007/978-3-319-58469-0\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/MyersRSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-1, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0}, doi = {10.1007/978-3-319-60055-0}, isbn = {978-3-319-60054-3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acisp/2017-2, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3}, doi = {10.1007/978-3-319-59870-3}, isbn = {978-3-319-59869-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/SuriadiSPWS16, author = {Suriadi Suriadi and Teo Susnjak and Agate M. Ponder{-}Sutton and Paul A. Watters and Christoph Schumacher}, title = {Using Data-Driven and Process Mining Techniques for Identifying and Characterizing Problem Gamblers in New Zealand}, journal = {Complex Syst. Informatics Model. Q.}, volume = {9}, pages = {44--66}, year = {2016}, url = {https://doi.org/10.7250/csimq.2016-9.03}, doi = {10.7250/CSIMQ.2016-9.03}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/SuriadiSPWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/LeoniSHA16, author = {Massimiliano de Leoni and Suriadi Suriadi and Arthur H. M. ter Hofstede and Wil M. P. van der Aalst}, title = {Turning event logs into process movies: animating what has really happened}, journal = {Softw. Syst. Model.}, volume = {15}, number = {3}, pages = {707--732}, year = {2016}, url = {https://doi.org/10.1007/s10270-014-0432-2}, doi = {10.1007/S10270-014-0432-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/LeoniSHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SuriadiSPWS16, author = {Suriadi Suriadi and Teo Susnjak and Agate M. Ponder{-}Sutton and Paul A. Watters and Christoph Schumacher}, editor = {Sergio Espa{\~{n}}a and Mirjana Ivanovic and Milos Savic}, title = {Characterizing Problem Gamblers in New Zealand: {A} Novel Expression of Process Cubes}, booktitle = {Proceedings of the CAiSE'16 Forum, at the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016), Ljubljana, Slovenia, June 13-17, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1612}, pages = {185--192}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1612/paper24.pdf}, timestamp = {Thu, 04 Jul 2024 21:53:07 +0200}, biburl = {https://dblp.org/rec/conf/caise/SuriadiSPWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AbidinMPS16, author = {Zaenal Abidin and Anuradha Mathrani and David Parsons and Suriadi Suriadi}, title = {Opportunities and challenges of mobile learning for promoting mathematical literacy}, journal = {CoRR}, volume = {abs/1606.02497}, year = {2016}, url = {http://arxiv.org/abs/1606.02497}, eprinttype = {arXiv}, eprint = {1606.02497}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AbidinMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NguyenDRMS16, author = {Hoang Nguyen and Marlon Dumas and Marcello La Rosa and Fabrizio Maria Maggi and Suriadi Suriadi}, title = {Business Process Deviance Mining: Review and Evaluation}, journal = {CoRR}, volume = {abs/1608.08252}, year = {2016}, url = {http://arxiv.org/abs/1608.08252}, eprinttype = {arXiv}, eprint = {1608.08252}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NguyenDRMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/SuriadiOAH15, author = {Suriadi Suriadi and Chun Ouyang and Wil M. P. van der Aalst and Arthur H. M. ter Hofstede}, title = {Event interval analysis: Why do processes take time?}, journal = {Decis. Support Syst.}, volume = {79}, pages = {77--98}, year = {2015}, url = {https://doi.org/10.1016/j.dss.2015.07.007}, doi = {10.1016/J.DSS.2015.07.007}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/SuriadiOAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SeifiSFB15, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, title = {Analysis of two authorization protocols using Colored Petri Nets}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {221--247}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0243-z}, doi = {10.1007/S10207-014-0243-Z}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SeifiSFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/PartingtonWSOK15, author = {Andrew Partington and Moe Thandar Wynn and Suriadi Suriadi and Chun Ouyang and Jonathan Karnon}, title = {Process Mining for Clinical Processes: {A} Comparative Analysis of Four Australian Hospitals}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {5}, number = {4}, pages = {19:1--19:18}, year = {2015}, url = {https://doi.org/10.1145/2629446}, doi = {10.1145/2629446}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/PartingtonWSOK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AbidinM0S15, author = {Zaenal Abidin and Anuradha Mathrani and David Parsons and Suriadi Suriadi}, title = {Opportunities and challenges of mobile learning for promoting mathematical literacy}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide, SA, Australia, November 30 - December 4, 2015}, pages = {169}, year = {2015}, url = {https://aisel.aisnet.org/acis2015/169}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/AbidinM0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apbpm/2015, editor = {Joonsoo Bae and Suriadi Suriadi and Lijie Wen}, title = {Asia Pacific Business Process Management - Third Asia Pacific Conference, {AP-BPM} 2015, Busan, South Korea, June 24-26, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19509-4}, doi = {10.1007/978-3-319-19509-4}, isbn = {978-3-319-19508-7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apbpm/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/SuriadiWWHACFRO14, author = {Suriadi Suriadi and Burkhard Wei{\ss} and Axel Winkelmann and Arthur H. M. ter Hofstede and Michael Adams and Raffaele Conforti and Colin J. Fidge and Marcello La Rosa and Chun Ouyang and Anastasiia Pika and Michael Rosemann and Moe Thandar Wynn}, title = {Current Research in Risk-aware Business Process Management - Overview, Comparison, and Gap Analysis}, journal = {Commun. Assoc. Inf. Syst.}, volume = {34}, pages = {52}, year = {2014}, url = {https://doi.org/10.17705/1cais.03452}, doi = {10.17705/1CAIS.03452}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/SuriadiWWHACFRO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SeifiSFB14, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, title = {Security properties analysis in a TPM-based protocol}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {2}, pages = {85--103}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.060742}, doi = {10.1504/IJSN.2014.060742}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apbpm/SuriadiMWPK14, author = {Suriadi Suriadi and Ronny Mans and Moe Thandar Wynn and Andrew Partington and Jonathan Karnon}, editor = {Chun Ouyang and Jae{-}Yoon Jung}, title = {Measuring Patient Flow Variations: {A} Cross-Organisational Process Mining Approach}, booktitle = {Asia Pacific Business Process Management - Second Asia Pacific Conference, {AP-BPM} 2014, Brisbane, QLD, Australia, July 3-4, 2014. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {181}, pages = {43--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08222-6\_4}, doi = {10.1007/978-3-319-08222-6\_4}, timestamp = {Wed, 17 Mar 2021 14:09:58 +0100}, biburl = {https://dblp.org/rec/conf/apbpm/SuriadiMWPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AmoahSCF14, author = {Raphael Amoah and Suriadi Suriadi and Seyit Ahmet {\c{C}}amtepe and Ernest Foo}, title = {Security analysis of the non-aggressive challenge response of the {DNP3} protocol using a {CPN} model}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {827--833}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883422}, doi = {10.1109/ICC.2014.6883422}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AmoahSCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/NguyenDRMS14, author = {Hoang Nguyen and Marlon Dumas and Marcello La Rosa and Fabrizio Maria Maggi and Suriadi Suriadi}, editor = {Robert Meersman and Herv{\'{e}} Panetto and Tharam S. Dillon and Michele Missikoff and Lin Liu and Oscar Pastor and Alfredo Cuzzocrea and Timos K. Sellis}, title = {Mining Business Process Deviance: {A} Quest for Accuracy}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2014 Conferences - Confederated International Conferences: CoopIS, and {ODBASE} 2014, Amantea, Italy, October 27-31, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8841}, pages = {436--445}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45563-0\_25}, doi = {10.1007/978-3-662-45563-0\_25}, timestamp = {Mon, 18 Jan 2021 08:56:44 +0100}, biburl = {https://dblp.org/rec/conf/otm/NguyenDRMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SuriadiWOHD13, author = {Suriadi Suriadi and Moe Thandar Wynn and Chun Ouyang and Arthur H. M. ter Hofstede and Nienke J. van Dijk}, editor = {Camille Salinesi and Moira C. Norrie and Oscar Pastor}, title = {Understanding Process Behaviours in a Large Insurance Company in Australia: {A} Case Study}, booktitle = {Advanced Information Systems Engineering - 25th International Conference, CAiSE 2013, Valencia, Spain, June 17-21, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7908}, pages = {449--464}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38709-8\_29}, doi = {10.1007/978-3-642-38709-8\_29}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/SuriadiWOHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mr/BudimanSKHSSCBTKJ12, author = {Arief Suriadi Budiman and H.{-}A.{-}S. Shin and B.{-}J. Kim and S.{-}H. Hwang and Ho{-}Young Son and Min{-}Suk Suh and Q.{-}H. Chung and K.{-}Y. Byun and Nobumichi Tamura and Martin Kunz and Young{-}Chang Joo}, title = {Measurement of stresses in Cu and Si around through-silicon via by synchrotron X-ray microdiffraction for 3-dimensional integrated circuits}, journal = {Microelectron. Reliab.}, volume = {52}, number = {3}, pages = {530--533}, year = {2012}, url = {https://doi.org/10.1016/j.microrel.2011.10.016}, doi = {10.1016/J.MICROREL.2011.10.016}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mr/BudimanSKHSSCBTKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/topnoc/SuriadiOF12, author = {Suriadi Suriadi and Chun Ouyang and Ernest Foo}, title = {Privacy Compliance Verification in Cryptographic Protocols}, journal = {Trans. Petri Nets Other Model. Concurr.}, volume = {6}, pages = {251--276}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35179-2\_11}, doi = {10.1007/978-3-642-35179-2\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/topnoc/SuriadiOF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SeifiSFB12, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Analysis of Object-Specific Authorization Protocol {(OSAP)} using Coloured Petri Nets}, booktitle = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, pages = {47--58}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SeifiSFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/SuriadiOAH12, author = {Suriadi Suriadi and Chun Ouyang and Wil M. P. van der Aalst and Arthur H. M. ter Hofstede}, editor = {Marcello La Rosa and Pnina Soffer}, title = {Root Cause Analysis with Enriched Process Logs}, booktitle = {Business Process Management Workshops - {BPM} 2012 International Workshops, Tallinn, Estonia, September 3, 2012. Revised Papers}, series = {Lecture Notes in Business Information Processing}, volume = {132}, pages = {174--186}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36285-9\_18}, doi = {10.1007/978-3-642-36285-9\_18}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bpm/SuriadiOAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SuriadiSCL11, author = {Suriadi Suriadi and Douglas Stebila and Andrew J. Clark and Hua Liu}, title = {Defending Web Services against Denial of Service Attacks Using Client Puzzles}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington, DC, USA, July 4-9, 2011}, pages = {25--32}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICWS.2011.22}, doi = {10.1109/ICWS.2011.22}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icws/SuriadiSCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/SchmidtSTCMAM10, author = {Desmond Allan Schmidt and Suriadi Suriadi and Alan Tickle and Andrew J. Clark and George M. Mohay and Ejaz Ahmed and James Mackie}, editor = {Jacques Berleur and Magda David Hercheui and Lorenz M. Hilty}, title = {A Distributed Denial of Service Testbed}, booktitle = {What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference, {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {328}, pages = {338--349}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15479-9\_32}, doi = {10.1007/978-3-642-15479-9\_32}, timestamp = {Thu, 23 Jun 2022 19:58:46 +0200}, biburl = {https://dblp.org/rec/conf/hcc/SchmidtSTCMAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/SuriadiTASM10, author = {Suriadi Suriadi and Alan Tickle and Ejaz Ahmed and Jason Smith and Hasmukh Morarji}, editor = {Jacques Berleur and Magda David Hercheui and Lorenz M. Hilty}, title = {Risk Modelling the Transition of {SCADA} System to IPv6}, booktitle = {What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference, {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {328}, pages = {384--395}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15479-9\_36}, doi = {10.1007/978-3-642-15479-9\_36}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/SuriadiTASM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SuriadiCS10, author = {Suriadi Suriadi and Andrew J. Clark and Desmond Allan Schmidt}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Validating Denial of Service Vulnerabilities in Web Services}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {175--182}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.41}, doi = {10.1109/NSS.2010.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SuriadiCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SuriadiFJ09, author = {Suriadi Suriadi and Ernest Foo and Audun J{\o}sang}, title = {A user-centric federated single sign-on system}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {2}, pages = {388--401}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.02.016}, doi = {10.1016/J.JNCA.2008.02.016}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SuriadiFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/SuriadiOSF09, author = {Suriadi Suriadi and Chun Ouyang and Jason Smith and Ernest Foo}, editor = {Karin K. Breitman and Ana Cavalcanti}, title = {Modeling and Verification of Privacy Enhancing Protocols}, booktitle = {Formal Methods and Software Engineering, 11th International Conference on Formal Engineering Methods, {ICFEM} 2009, Rio de Janeiro, Brazil, December 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5885}, pages = {127--146}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10373-5\_7}, doi = {10.1007/978-3-642-10373-5\_7}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/SuriadiOSF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/SuriadiFD08, author = {Suriadi Suriadi and Ernest Foo and Rong Du}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Layered Identity Infrastructure Model for Identity Meta Systems}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {83--92}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Suriadi.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/SuriadiFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/SuriadiFS08, author = {Suriadi Suriadi and Ernest Foo and Jason Smith}, editor = {Jian Cao and Minglu Li and Chuliang Weng and Yang Xiang and Xin Wang and Hong Tang and Feng Hong and Hong Liu and Yinglin Wang}, title = {Conditional Privacy Using Re-encryption}, booktitle = {{IFIP} International Conference on Network and Parallel Computing, {NPC} 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings}, pages = {18--25}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NPC.2008.37}, doi = {10.1109/NPC.2008.37}, timestamp = {Fri, 02 Aug 2024 08:05:14 +0200}, biburl = {https://dblp.org/rec/conf/npc/SuriadiFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SuriadiFS08, author = {Suriadi Suriadi and Ernest Foo and Jason Smith}, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {A User-Centric Protocol for Conditional Anonymity Revocation}, booktitle = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, pages = {185--194}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8\_18}, doi = {10.1007/978-3-540-85735-8\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/SuriadiFS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/JosangZS07, author = {Audun J{\o}sang and Mohammed Al Zomai and Suriadi Suriadi}, editor = {Ljiljana Brankovic and Paul D. Coddington and John F. Roddick and Chris Steketee and James R. Warren and Andrew L. Wendelborn}, title = {Usability and Privacy in Identity Management Architectures}, booktitle = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) {(AISW} 2007), and the Australasian Workshop on Health Knowledge Management and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007}, series = {{CRPIT}}, volume = {68}, pages = {143--152}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Josang.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/JosangZS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.