Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Triage of IoT Attacks Through Process Mining., , , , and . OTM Conferences, volume 11877 of Lecture Notes in Computer Science, page 326-344. Springer, (2019)A planning approach to the automated synthesis of template-based process models., and . Serv. Oriented Comput. Appl., 11 (4): 367-392 (2017)SmartPM: Automatic Adaptation of Dynamic Processes at Run-Time.. CoRR, (2018)Intelligent Process Adaptation in the SmartPM System., , and . ACM TIST, 8 (2): 25:1-25:43 (2017)DALEC: a framework for the systematic evaluation of data-centric approaches to process management software., , , , , and . Softw. Syst. Model., 18 (4): 2679-2716 (2019)Human Factors in Phishing Attacks: A Systematic Literature Review., , , , and . ACM Comput. Surv., 54 (8): 173:1-173:35 (2022)Continuous Planning for Solving Business Process Adaptivity., and . BMMDS/EMMSAD, volume 81 of Lecture Notes in Business Information Processing, page 118-132. Springer, (2011)Analysing Event Data through Process Mining.. SEBD, volume 2400 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Discovering Declarative Process Model Behavior from Event Logs via Model Learning., , , , , and . ICPM, page 48-55. IEEE, (2021)Towards a Planning-Based Approach to the Automated Design of Chemical Processes., , and . AIBP@AI*IA, volume 1101 of CEUR Workshop Proceedings, page 61-70. CEUR-WS.org, (2013)