Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel method for expert finding in online communities based on concept map and PageRank., and . HCIS, (2015)An Abstraction-Based Approach for Privacy-Aware Federated Process Mining., and . IEEE Access, (2023)Group-based privacy preservation techniques for process mining., and . Data Knowl. Eng., (2021)A generic approach to extract object-centric event data from databases supporting SAP ERP., , , and . J. Intell. Inf. Syst., 61 (3): 835-857 (December 2023)Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing., , and . CoopIS, volume 13591 of Lecture Notes in Computer Science, page 75-94. Springer, (2022)Privacy and confidentiality in process mining.. RWTH Aachen University, Germany, (2023)From Identities to Quantities: Introducing Items and Decoupling Points to Object-Centric Process Mining., , , and . ICPM Workshops, volume 503 of Lecture Notes in Business Information Processing, page 462-474. Springer, (2023)Ensuring Confidentiality in Process Mining., , and . SIMPDA, volume 2270 of CEUR Workshop Proceedings, page 3-17. CEUR-WS.org, (2018)PC4PM: A Tool for Privacy/Confidentiality Preservation in Process Mining., , and . BPM (PhD/Demos), volume 2973 of CEUR Workshop Proceedings, page 106-110. CEUR-WS.org, (2021)Privacy and Confidentiality in Process Mining: Threats and Research Challenges., , , , , , , and . ACM Trans. Manag. Inf. Syst., 13 (1): 11:1-11:17 (2022)