Search dblp for Publications

export results for "Suriadi Suriadi"

 download as .bib file

@article{DBLP:journals/ile/UmerSMS23,
  author       = {Rahila Umer and
                  Teo Susnjak and
                  Anuradha Mathrani and
                  Lim Suriadi},
  title        = {Current stance on predictive analytics in higher education: opportunities,
                  challenges and future directions},
  journal      = {Interact. Learn. Environ.},
  volume       = {31},
  number       = {6},
  pages        = {3503--3528},
  year         = {2023},
  url          = {https://doi.org/10.1080/10494820.2021.1933542},
  doi          = {10.1080/10494820.2021.1933542},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ile/UmerSMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbis/UmerSMS22,
  author       = {Rahila Umer and
                  Teo Susnjak and
                  Anuradha Mathrani and
                  Suriadi Suriadi},
  title        = {Data quality challenges in educational process mining: building process-oriented
                  event logs from process-unaware online learning systems},
  journal      = {Int. J. Bus. Inf. Syst.},
  volume       = {39},
  number       = {4},
  pages        = {569--592},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJBIS.2022.122877},
  doi          = {10.1504/IJBIS.2022.122877},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbis/UmerSMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/YedidsionSXDS21,
  author       = {Harel Yedidsion and
                  Jennifer Suriadinata and
                  Zifan Xu and
                  Stefan Debruyn and
                  Peter Stone},
  title        = {A Scavenger Hunt for Service Robots},
  booktitle    = {{IEEE} International Conference on Robotics and Automation, {ICRA}
                  2021, Xi'an, China, May 30 - June 5, 2021},
  pages        = {7774--7780},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICRA48506.2021.9561722},
  doi          = {10.1109/ICRA48506.2021.9561722},
  timestamp    = {Fri, 22 Oct 2021 19:54:31 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/YedidsionSXDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05225,
  author       = {Harel Yedidsion and
                  Jennifer Suriadinata and
                  Zifan Xu and
                  Stefan Debruyn and
                  Peter Stone},
  title        = {A Scavenger Hunt for Service Robots},
  journal      = {CoRR},
  volume       = {abs/2103.05225},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05225},
  eprinttype    = {arXiv},
  eprint       = {2103.05225},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/SyedSABLOHWWR20,
  author       = {Rehan Syed and
                  Suriadi Suriadi and
                  Michael Adams and
                  Wasana Bandara and
                  Sander J. J. Leemans and
                  Chun Ouyang and
                  Arthur H. M. ter Hofstede and
                  Inge van de Weerd and
                  Moe Thandar Wynn and
                  Hajo A. Reijers},
  title        = {Robotic Process Automation: Contemporary themes and challenges},
  journal      = {Comput. Ind.},
  volume       = {115},
  pages        = {103162},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compind.2019.103162},
  doi          = {10.1016/J.COMPIND.2019.103162},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/SyedSABLOHWWR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/AdamsS0H20,
  author       = {Michael Adams and
                  Suriadi Suriadi and
                  Akhil Kumar and
                  Arthur H. M. ter Hofstede},
  editor       = {Nicolas Herbaut and
                  Marcello La Rosa},
  title        = {Flexible Integration of Blockchain with Business Process Automation:
                  {A} Federated Architecture},
  booktitle    = {Advanced Information Systems Engineering - CAiSE Forum 2020, Grenoble,
                  France, June 8-12, 2020, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {386},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58135-0\_1},
  doi          = {10.1007/978-3-030-58135-0\_1},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/AdamsS0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpm/SadeghianaslHST20,
  author       = {Sareh Sadeghianasl and
                  Arthur H. M. ter Hofstede and
                  Suriadi Suriadi and
                  Selen Turkay},
  editor       = {Boudewijn F. van Dongen and
                  Marco Montali and
                  Moe Thandar Wynn},
  title        = {Collaborative and Interactive Detection and Repair of Activity Labels
                  in Process Event Logs},
  booktitle    = {2nd International Conference on Process Mining, {ICPM} 2020, Padua,
                  Italy, October 4-9, 2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICPM49681.2020.00017},
  doi          = {10.1109/ICPM49681.2020.00017},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpm/SadeghianaslHST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/WynnSEPPAH19,
  author       = {Moe Thandar Wynn and
                  Suriadi Suriadi and
                  Rebekah Eden and
                  Erik Poppe and
                  Anastasiia Pika and
                  Robert Andrews and
                  Arthur H. M. ter Hofstede},
  editor       = {Thomas T. Hildebrandt and
                  Boudewijn F. van Dongen and
                  Maximilian R{\"{o}}glinger and
                  Jan Mendling},
  title        = {Grounding Process Data Analytics in Domain Knowledge: {A} Mixed-Method
                  Approach to Identifying Best Practice},
  booktitle    = {Business Process Management Forum - {BPM} Forum 2019, Vienna, Austria,
                  September 1-6, 2019, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {360},
  pages        = {163--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26643-1\_10},
  doi          = {10.1007/978-3-030-26643-1\_10},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bpm/WynnSEPPAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fit/HussainFS19,
  author       = {Mukhtar Hussain and
                  Ernest Foo and
                  Suriadi Suriadi},
  title        = {An Improved Industrial Control System Device Logs Processing Method
                  for Process-Based Anomaly Detection},
  booktitle    = {International Conference on Frontiers of Information Technology, {FIT}
                  2019, Islamabad, Pakistan, December 16-18, 2019},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/FIT47737.2019.00037},
  doi          = {10.1109/FIT47737.2019.00037},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fit/HussainFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/SadeghianaslHWS19,
  author       = {Sareh Sadeghianasl and
                  Arthur H. M. ter Hofstede and
                  Moe Thandar Wynn and
                  Suriadi Suriadi},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Martin Hepp and
                  Dave Lewis and
                  Claudio Agostino Ardagna and
                  Robert Meersman},
  title        = {A Contextual Approach to Detecting Synonymous and Polluted Activity
                  Labels in Process Event Logs},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2019 Conferences
                  - Confederated International Conferences: CoopIS, ODBASE, C{\&}TC
                  2019, Rhodes, Greece, October 21-25, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11877},
  pages        = {76--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33246-4\_5},
  doi          = {10.1007/978-3-030-33246-4\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/SadeghianaslHWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MyersSRF18,
  author       = {David Myers and
                  Suriadi Suriadi and
                  Kenneth Radke and
                  Ernest Foo},
  title        = {Anomaly detection for industrial control systems using process mining},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {103--125},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.002},
  doi          = {10.1016/J.COSE.2018.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MyersSRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/PhamFSJL18,
  author       = {Ngoc Tu Pham and
                  Ernest Foo and
                  Suriadi Suriadi and
                  Helen Jeffrey and
                  Hassan Fareed M. Lahza},
  editor       = {David Abramson},
  title        = {Improving performance of intrusion detection system using ensemble
                  methods and feature selection},
  booktitle    = {Proceedings of the Australasian Computer Science Week Multiconference,
                  {ACSW} 2018, Brisbane, QLD, Australia, January 29 - February 02, 2018},
  pages        = {2:1--2:6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167918.3167951},
  doi          = {10.1145/3167918.3167951},
  timestamp    = {Tue, 20 Jun 2023 16:27:45 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/PhamFSJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/DixitSAWHBA18,
  author       = {Prabhakar M. Dixit and
                  Suriadi Suriadi and
                  Robert Andrews and
                  Moe Thandar Wynn and
                  Arthur H. M. ter Hofstede and
                  Joos C. A. M. Buijs and
                  Wil M. P. van der Aalst},
  editor       = {John Krogstie and
                  Hajo A. Reijers},
  title        = {Detection and Interactive Repair of Event Ordering Imperfection in
                  Process Logs},
  booktitle    = {Advanced Information Systems Engineering - 30th International Conference,
                  CAiSE 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10816},
  pages        = {274--290},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91563-0\_17},
  doi          = {10.1007/978-3-319-91563-0\_17},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/DixitSAWHBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/AndrewsSOP18,
  author       = {Robert Andrews and
                  Suriadi Suriadi and
                  Chun Ouyang and
                  Erik Poppe},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Henderik A. Proper and
                  Claudio Agostino Ardagna and
                  Dumitru Roman and
                  Robert Meersman},
  title        = {Towards Event Log Querying for Data Quality - Let's Start with Detecting
                  Log Imperfections},
  booktitle    = {On the Move to Meaningful Internet Systems. {OTM} 2018 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2018, Valletta, Malta, October 22-26, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11229},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02610-3\_7},
  doi          = {10.1007/978-3-030-02610-3\_7},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/AndrewsSOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/AndrewsSWHR18,
  author       = {Robert Andrews and
                  Suriadi Suriadi and
                  Moe Wynn and
                  Arthur H. M. ter Hofstede and
                  Sean Rothwell},
  editor       = {Jan vom Brocke and
                  Jan Mendling},
  title        = {Improving Patient Flows at St. Andrew's War Memorial Hospital's Emergency
                  Department Through Process Mining},
  booktitle    = {Business Process Management Cases, Digital Innovation and Business
                  Transformation in Practice},
  series       = {Management for Professionals},
  pages        = {311--333},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-58307-5\_17},
  doi          = {10.1007/978-3-319-58307-5\_17},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/AndrewsSWHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/SuriadiWXAH17,
  author       = {Suriadi Suriadi and
                  Moe Thandar Wynn and
                  Jingxin Xu and
                  Wil M. P. van der Aalst and
                  Arthur H. M. ter Hofstede},
  title        = {Discovering work prioritisation patterns from event logs},
  journal      = {Decis. Support Syst.},
  volume       = {100},
  pages        = {77--92},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.dss.2017.02.002},
  doi          = {10.1016/J.DSS.2017.02.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/SuriadiWXAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/SuriadiAHW17,
  author       = {Suriadi Suriadi and
                  Robert Andrews and
                  Arthur H. M. ter Hofstede and
                  Moe Thandar Wynn},
  title        = {Event log imperfection patterns for process mining: Towards a systematic
                  approach to cleaning event logs},
  journal      = {Inf. Syst.},
  volume       = {64},
  pages        = {132--150},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.is.2016.07.011},
  doi          = {10.1016/J.IS.2016.07.011},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/SuriadiAHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/LuFASWHA17,
  author       = {Xixi Lu and
                  Dirk Fahland and
                  Robert Andrews and
                  Suriadi Suriadi and
                  Moe Thandar Wynn and
                  Arthur H. M. ter Hofstede and
                  Wil M. P. van der Aalst},
  editor       = {Herv{\'{e}} Panetto and
                  Christophe Debruyne and
                  Walid Gaaloul and
                  Mike P. Papazoglou and
                  Adrian Paschke and
                  Claudio Agostino Ardagna and
                  Robert Meersman},
  title        = {Semi-supervised Log Pattern Detection and Exploration Using Event
                  Concurrence and Contextual Information},
  booktitle    = {On the Move to Meaningful Internet Systems. {OTM} 2017 Conferences
                  - Confederated International Conferences: CoopIS, C{\&}TC, and
                  {ODBASE} 2017, Rhodes, Greece, October 23-27, 2017, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10573},
  pages        = {154--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69462-7\_11},
  doi          = {10.1007/978-3-319-69462-7\_11},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/LuFASWHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MyersRSF17,
  author       = {David Myers and
                  Kenneth Radke and
                  Suriadi Suriadi and
                  Ernest Foo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {Process Discovery for Industrial Control System Cyber Attack Detection},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_5},
  doi          = {10.1007/978-3-319-58469-0\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MyersRSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-1,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0},
  doi          = {10.1007/978-3-319-60055-0},
  isbn         = {978-3-319-60054-3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-2,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3},
  doi          = {10.1007/978-3-319-59870-3},
  isbn         = {978-3-319-59869-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csimq/SuriadiSPWS16,
  author       = {Suriadi Suriadi and
                  Teo Susnjak and
                  Agate M. Ponder{-}Sutton and
                  Paul A. Watters and
                  Christoph Schumacher},
  title        = {Using Data-Driven and Process Mining Techniques for Identifying and
                  Characterizing Problem Gamblers in New Zealand},
  journal      = {Complex Syst. Informatics Model. Q.},
  volume       = {9},
  pages        = {44--66},
  year         = {2016},
  url          = {https://doi.org/10.7250/csimq.2016-9.03},
  doi          = {10.7250/CSIMQ.2016-9.03},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csimq/SuriadiSPWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/LeoniSHA16,
  author       = {Massimiliano de Leoni and
                  Suriadi Suriadi and
                  Arthur H. M. ter Hofstede and
                  Wil M. P. van der Aalst},
  title        = {Turning event logs into process movies: animating what has really
                  happened},
  journal      = {Softw. Syst. Model.},
  volume       = {15},
  number       = {3},
  pages        = {707--732},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10270-014-0432-2},
  doi          = {10.1007/S10270-014-0432-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/LeoniSHA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SuriadiSPWS16,
  author       = {Suriadi Suriadi and
                  Teo Susnjak and
                  Agate M. Ponder{-}Sutton and
                  Paul A. Watters and
                  Christoph Schumacher},
  editor       = {Sergio Espa{\~{n}}a and
                  Mirjana Ivanovic and
                  Milos Savic},
  title        = {Characterizing Problem Gamblers in New Zealand: {A} Novel Expression
                  of Process Cubes},
  booktitle    = {Proceedings of the CAiSE'16 Forum, at the 28th International Conference
                  on Advanced Information Systems Engineering (CAiSE 2016), Ljubljana,
                  Slovenia, June 13-17, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1612},
  pages        = {185--192},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1612/paper24.pdf},
  timestamp    = {Thu, 04 Jul 2024 21:53:07 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SuriadiSPWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AbidinMPS16,
  author       = {Zaenal Abidin and
                  Anuradha Mathrani and
                  David Parsons and
                  Suriadi Suriadi},
  title        = {Opportunities and challenges of mobile learning for promoting mathematical
                  literacy},
  journal      = {CoRR},
  volume       = {abs/1606.02497},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.02497},
  eprinttype    = {arXiv},
  eprint       = {1606.02497},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AbidinMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NguyenDRMS16,
  author       = {Hoang Nguyen and
                  Marlon Dumas and
                  Marcello La Rosa and
                  Fabrizio Maria Maggi and
                  Suriadi Suriadi},
  title        = {Business Process Deviance Mining: Review and Evaluation},
  journal      = {CoRR},
  volume       = {abs/1608.08252},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.08252},
  eprinttype    = {arXiv},
  eprint       = {1608.08252},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NguyenDRMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/SuriadiOAH15,
  author       = {Suriadi Suriadi and
                  Chun Ouyang and
                  Wil M. P. van der Aalst and
                  Arthur H. M. ter Hofstede},
  title        = {Event interval analysis: Why do processes take time?},
  journal      = {Decis. Support Syst.},
  volume       = {79},
  pages        = {77--98},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dss.2015.07.007},
  doi          = {10.1016/J.DSS.2015.07.007},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/SuriadiOAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeifiSFB15,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  title        = {Analysis of two authorization protocols using Colored Petri Nets},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {221--247},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0243-z},
  doi          = {10.1007/S10207-014-0243-Z},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SeifiSFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/PartingtonWSOK15,
  author       = {Andrew Partington and
                  Moe Thandar Wynn and
                  Suriadi Suriadi and
                  Chun Ouyang and
                  Jonathan Karnon},
  title        = {Process Mining for Clinical Processes: {A} Comparative Analysis of
                  Four Australian Hospitals},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {5},
  number       = {4},
  pages        = {19:1--19:18},
  year         = {2015},
  url          = {https://doi.org/10.1145/2629446},
  doi          = {10.1145/2629446},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/PartingtonWSOK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AbidinM0S15,
  author       = {Zaenal Abidin and
                  Anuradha Mathrani and
                  David Parsons and
                  Suriadi Suriadi},
  title        = {Opportunities and challenges of mobile learning for promoting mathematical
                  literacy},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide,
                  SA, Australia, November 30 - December 4, 2015},
  pages        = {169},
  year         = {2015},
  url          = {https://aisel.aisnet.org/acis2015/169},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AbidinM0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apbpm/2015,
  editor       = {Joonsoo Bae and
                  Suriadi Suriadi and
                  Lijie Wen},
  title        = {Asia Pacific Business Process Management - Third Asia Pacific Conference,
                  {AP-BPM} 2015, Busan, South Korea, June 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19509-4},
  doi          = {10.1007/978-3-319-19509-4},
  isbn         = {978-3-319-19508-7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apbpm/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/SuriadiWWHACFRO14,
  author       = {Suriadi Suriadi and
                  Burkhard Wei{\ss} and
                  Axel Winkelmann and
                  Arthur H. M. ter Hofstede and
                  Michael Adams and
                  Raffaele Conforti and
                  Colin J. Fidge and
                  Marcello La Rosa and
                  Chun Ouyang and
                  Anastasiia Pika and
                  Michael Rosemann and
                  Moe Thandar Wynn},
  title        = {Current Research in Risk-aware Business Process Management - Overview,
                  Comparison, and Gap Analysis},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {34},
  pages        = {52},
  year         = {2014},
  url          = {https://doi.org/10.17705/1cais.03452},
  doi          = {10.17705/1CAIS.03452},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cais/SuriadiWWHACFRO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SeifiSFB14,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  title        = {Security properties analysis in a TPM-based protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {2},
  pages        = {85--103},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.060742},
  doi          = {10.1504/IJSN.2014.060742},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SeifiSFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apbpm/SuriadiMWPK14,
  author       = {Suriadi Suriadi and
                  Ronny Mans and
                  Moe Thandar Wynn and
                  Andrew Partington and
                  Jonathan Karnon},
  editor       = {Chun Ouyang and
                  Jae{-}Yoon Jung},
  title        = {Measuring Patient Flow Variations: {A} Cross-Organisational Process
                  Mining Approach},
  booktitle    = {Asia Pacific Business Process Management - Second Asia Pacific Conference,
                  {AP-BPM} 2014, Brisbane, QLD, Australia, July 3-4, 2014. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {181},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08222-6\_4},
  doi          = {10.1007/978-3-319-08222-6\_4},
  timestamp    = {Wed, 17 Mar 2021 14:09:58 +0100},
  biburl       = {https://dblp.org/rec/conf/apbpm/SuriadiMWPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AmoahSCF14,
  author       = {Raphael Amoah and
                  Suriadi Suriadi and
                  Seyit Ahmet {\c{C}}amtepe and
                  Ernest Foo},
  title        = {Security analysis of the non-aggressive challenge response of the
                  {DNP3} protocol using a {CPN} model},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {827--833},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883422},
  doi          = {10.1109/ICC.2014.6883422},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AmoahSCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/NguyenDRMS14,
  author       = {Hoang Nguyen and
                  Marlon Dumas and
                  Marcello La Rosa and
                  Fabrizio Maria Maggi and
                  Suriadi Suriadi},
  editor       = {Robert Meersman and
                  Herv{\'{e}} Panetto and
                  Tharam S. Dillon and
                  Michele Missikoff and
                  Lin Liu and
                  Oscar Pastor and
                  Alfredo Cuzzocrea and
                  Timos K. Sellis},
  title        = {Mining Business Process Deviance: {A} Quest for Accuracy},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2014 Conferences
                  - Confederated International Conferences: CoopIS, and {ODBASE} 2014,
                  Amantea, Italy, October 27-31, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8841},
  pages        = {436--445},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45563-0\_25},
  doi          = {10.1007/978-3-662-45563-0\_25},
  timestamp    = {Mon, 18 Jan 2021 08:56:44 +0100},
  biburl       = {https://dblp.org/rec/conf/otm/NguyenDRMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SuriadiWOHD13,
  author       = {Suriadi Suriadi and
                  Moe Thandar Wynn and
                  Chun Ouyang and
                  Arthur H. M. ter Hofstede and
                  Nienke J. van Dijk},
  editor       = {Camille Salinesi and
                  Moira C. Norrie and
                  Oscar Pastor},
  title        = {Understanding Process Behaviours in a Large Insurance Company in Australia:
                  {A} Case Study},
  booktitle    = {Advanced Information Systems Engineering - 25th International Conference,
                  CAiSE 2013, Valencia, Spain, June 17-21, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7908},
  pages        = {449--464},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38709-8\_29},
  doi          = {10.1007/978-3-642-38709-8\_29},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/SuriadiWOHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mr/BudimanSKHSSCBTKJ12,
  author       = {Arief Suriadi Budiman and
                  H.{-}A.{-}S. Shin and
                  B.{-}J. Kim and
                  S.{-}H. Hwang and
                  Ho{-}Young Son and
                  Min{-}Suk Suh and
                  Q.{-}H. Chung and
                  K.{-}Y. Byun and
                  Nobumichi Tamura and
                  Martin Kunz and
                  Young{-}Chang Joo},
  title        = {Measurement of stresses in Cu and Si around through-silicon via by
                  synchrotron X-ray microdiffraction for 3-dimensional integrated circuits},
  journal      = {Microelectron. Reliab.},
  volume       = {52},
  number       = {3},
  pages        = {530--533},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.microrel.2011.10.016},
  doi          = {10.1016/J.MICROREL.2011.10.016},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mr/BudimanSKHSSCBTKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/topnoc/SuriadiOF12,
  author       = {Suriadi Suriadi and
                  Chun Ouyang and
                  Ernest Foo},
  title        = {Privacy Compliance Verification in Cryptographic Protocols},
  journal      = {Trans. Petri Nets Other Model. Concurr.},
  volume       = {6},
  pages        = {251--276},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35179-2\_11},
  doi          = {10.1007/978-3-642-35179-2\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/topnoc/SuriadiOF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SeifiSFB12,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Analysis of Object-Specific Authorization Protocol {(OSAP)} using
                  Coloured Petri Nets},
  booktitle    = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  pages        = {47--58},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SeifiSFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/SuriadiOAH12,
  author       = {Suriadi Suriadi and
                  Chun Ouyang and
                  Wil M. P. van der Aalst and
                  Arthur H. M. ter Hofstede},
  editor       = {Marcello La Rosa and
                  Pnina Soffer},
  title        = {Root Cause Analysis with Enriched Process Logs},
  booktitle    = {Business Process Management Workshops - {BPM} 2012 International Workshops,
                  Tallinn, Estonia, September 3, 2012. Revised Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {132},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36285-9\_18},
  doi          = {10.1007/978-3-642-36285-9\_18},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bpm/SuriadiOAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SuriadiSCL11,
  author       = {Suriadi Suriadi and
                  Douglas Stebila and
                  Andrew J. Clark and
                  Hua Liu},
  title        = {Defending Web Services against Denial of Service Attacks Using Client
                  Puzzles},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
                  DC, USA, July 4-9, 2011},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICWS.2011.22},
  doi          = {10.1109/ICWS.2011.22},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icws/SuriadiSCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SchmidtSTCMAM10,
  author       = {Desmond Allan Schmidt and
                  Suriadi Suriadi and
                  Alan Tickle and
                  Andrew J. Clark and
                  George M. Mohay and
                  Ejaz Ahmed and
                  James Mackie},
  editor       = {Jacques Berleur and
                  Magda David Hercheui and
                  Lorenz M. Hilty},
  title        = {A Distributed Denial of Service Testbed},
  booktitle    = {What Kind of Information Society? Governance, Virtuality, Surveillance,
                  Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
                  {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
                  2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {328},
  pages        = {338--349},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15479-9\_32},
  doi          = {10.1007/978-3-642-15479-9\_32},
  timestamp    = {Thu, 23 Jun 2022 19:58:46 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/SchmidtSTCMAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/SuriadiTASM10,
  author       = {Suriadi Suriadi and
                  Alan Tickle and
                  Ejaz Ahmed and
                  Jason Smith and
                  Hasmukh Morarji},
  editor       = {Jacques Berleur and
                  Magda David Hercheui and
                  Lorenz M. Hilty},
  title        = {Risk Modelling the Transition of {SCADA} System to IPv6},
  booktitle    = {What Kind of Information Society? Governance, Virtuality, Surveillance,
                  Sustainability, Resilience - 9th {IFIP} {TC} 9 International Conference,
                  {HCC9} 2010 and 1st {IFIP} {TC} 11 International Conference, {CIP}
                  2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23,
                  2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {328},
  pages        = {384--395},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15479-9\_36},
  doi          = {10.1007/978-3-642-15479-9\_36},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/SuriadiTASM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SuriadiCS10,
  author       = {Suriadi Suriadi and
                  Andrew J. Clark and
                  Desmond Allan Schmidt},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Validating Denial of Service Vulnerabilities in Web Services},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {175--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.41},
  doi          = {10.1109/NSS.2010.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SuriadiCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SuriadiFJ09,
  author       = {Suriadi Suriadi and
                  Ernest Foo and
                  Audun J{\o}sang},
  title        = {A user-centric federated single sign-on system},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {2},
  pages        = {388--401},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.02.016},
  doi          = {10.1016/J.JNCA.2008.02.016},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SuriadiFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/SuriadiOSF09,
  author       = {Suriadi Suriadi and
                  Chun Ouyang and
                  Jason Smith and
                  Ernest Foo},
  editor       = {Karin K. Breitman and
                  Ana Cavalcanti},
  title        = {Modeling and Verification of Privacy Enhancing Protocols},
  booktitle    = {Formal Methods and Software Engineering, 11th International Conference
                  on Formal Engineering Methods, {ICFEM} 2009, Rio de Janeiro, Brazil,
                  December 9-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5885},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10373-5\_7},
  doi          = {10.1007/978-3-642-10373-5\_7},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/SuriadiOSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/SuriadiFD08,
  author       = {Suriadi Suriadi and
                  Ernest Foo and
                  Rong Du},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Layered Identity Infrastructure Model for Identity Meta Systems},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {83--92},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Suriadi.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/SuriadiFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/SuriadiFS08,
  author       = {Suriadi Suriadi and
                  Ernest Foo and
                  Jason Smith},
  editor       = {Jian Cao and
                  Minglu Li and
                  Chuliang Weng and
                  Yang Xiang and
                  Xin Wang and
                  Hong Tang and
                  Feng Hong and
                  Hong Liu and
                  Yinglin Wang},
  title        = {Conditional Privacy Using Re-encryption},
  booktitle    = {{IFIP} International Conference on Network and Parallel Computing,
                  {NPC} 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings},
  pages        = {18--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/NPC.2008.37},
  doi          = {10.1109/NPC.2008.37},
  timestamp    = {Fri, 02 Aug 2024 08:05:14 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/SuriadiFS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SuriadiFS08,
  author       = {Suriadi Suriadi and
                  Ernest Foo and
                  Jason Smith},
  editor       = {Steven Furnell and
                  Sokratis K. Katsikas and
                  Antonio Lioy},
  title        = {A User-Centric Protocol for Conditional Anonymity Revocation},
  booktitle    = {Trust, Privacy and Security in Digital Business, 5th International
                  Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5185},
  pages        = {185--194},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85735-8\_18},
  doi          = {10.1007/978-3-540-85735-8\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/SuriadiFS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/JosangZS07,
  author       = {Audun J{\o}sang and
                  Mohammed Al Zomai and
                  Suriadi Suriadi},
  editor       = {Ljiljana Brankovic and
                  Paul D. Coddington and
                  John F. Roddick and
                  Chris Steketee and
                  James R. Warren and
                  Andrew L. Wendelborn},
  title        = {Usability and Privacy in Identity Management Architectures},
  booktitle    = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium
                  on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian
                  Information Security Workshop (Privacy Enhancing Technologies) {(AISW}
                  2007), and the Australasian Workshop on Health Knowledge Management
                  and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia,
                  January 30 - February 2, 2007},
  series       = {{CRPIT}},
  volume       = {68},
  pages        = {143--152},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Josang.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/JosangZS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics