Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic literature review of implementations of precision agriculture., , , and . Comput. Electron. Agric., (2020)Obtaining secure business process models from an enterprise architecture considering security requirements., , , and . Bus. Process. Manag. J., 28 (1): 150-177 (2022)Kontun: A Framework for recommendation of authentication schemes and methods., , and . Inf. Softw. Technol., (2018)Analyzing the Devil's Quadrangle of Process Instances Through Process Mining., and . Business Process Management Workshops, volume 492 of Lecture Notes in Business Information Processing, page 272-284. Springer, (2023)Framework for the Comparison and Selection of Schemes for Multi-Factor Authentication.. CLEI Electron. J., (2021)Authentication schemes and methods: A systematic literature review., , and . Inf. Softw. Technol., (2018)Computer and Network Security., , , , , , , , , and 7 other author(s). CoRR, (2020)A Systematic Literature Review of the Analysis of Costs and Other Dimensions in Process Mining and Related Disciplines., , and . IEEE Access, (2024)Enhancing the Cost Dimension in Process Mining through its Application to the Mining Industry.. BPM (Demos / Resources Forum), volume 3469 of CEUR Workshop Proceedings, page 28-35. CEUR-WS.org, (2023)A Tool for Visualizing Costs of Process Variants through Directed Rooted Trees., and . BPM (Demos / Resources Forum), volume 3469 of CEUR Workshop Proceedings, page 72-76. CEUR-WS.org, (2023)