Robotic process automation: contemporary themes and challenges R Syed, S Suriadi, M Adams, W Bandara, SJJ Leemans, C Ouyang, ... Computers in industry 115, 103162, 2020 | 750 | 2020 |
Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs S Suriadi, R Andrews, AHM ter Hofstede, MT Wynn Information systems 64, 132-150, 2017 | 328 | 2017 |
Process mining for clinical processes: a comparative analysis of four Australian hospitals A Partington, M Wynn, S Suriadi, C Ouyang, J Karnon ACM Transactions on Management Information Systems (TMIS) 5 (4), 1-18, 2015 | 232 | 2015 |
Usability and privacy in identity management architectures A Josang, M AlZomai, S Suriadi ACSW Frontiers 2007: Proceedings of 5th Australasian symposium on grid …, 2007 | 224 | 2007 |
Improving performance of intrusion detection system using ensemble methods and feature selection NT Pham, E Foo, S Suriadi, H Jeffrey, HFM Lahza Proceedings of the Australasian computer science week multiconference, 1-6, 2018 | 205 | 2018 |
Current research in risk-aware business process management―overview, comparison, and gap analysis S Suriadi, B Weiß, A Winkelmann, AHM ter Hofstede, M Adams, R Conforti, ... Communications of the Association for Information Systems 34 (1), 52, 2014 | 131 | 2014 |
Anomaly detection for industrial control systems using process mining D Myers, S Suriadi, K Radke, E Foo Computers & Security 78, 103-125, 2018 | 126 | 2018 |
Understanding process behaviours in a large insurance company in Australia: A case study S Suriadi, MT Wynn, C Ouyang, AHM ter Hofstede, NJ van Dijk Advanced Information Systems Engineering: 25th International Conference …, 2013 | 111 | 2013 |
Root cause analysis with enriched process logs S Suriadi, C Ouyang, WMP van der Aalst, AHM ter Hofstede Business Process Management Workshops: BPM 2012 International Workshops …, 2013 | 108 | 2013 |
On predicting academic performance with process mining in learning analytics R Umer, T Susnjak, A Mathrani, S Suriadi Journal of Research in Innovative Teaching & Learning 10 (2), 160-176, 2017 | 98 | 2017 |
Measuring patient flow variations: A cross-organisational process mining approach S Suriadi, RS Mans, MT Wynn, A Partington, J Karnon Asia Pacific Business Process Management: Second Asia Pacific Conference, AP …, 2014 | 97 | 2014 |
A user-centric federated single sign-on system S Suriadi, E Foo, A Jøsang Journal of Network and Computer Applications 32 (2), 388-401, 2009 | 85 | 2009 |
Mining business process deviance: a quest for accuracy H Nguyen, M Dumas, M La Rosa, FM Maggi, S Suriadi On the Move to Meaningful Internet Systems: OTM 2014 Conferences …, 2014 | 80 | 2014 |
Detection and interactive repair of event ordering imperfection in process logs PM Dixit, S Suriadi, R Andrews, MT Wynn, AHM ter Hofstede, JCAM Buijs, ... Advanced Information Systems Engineering: 30th International Conference …, 2018 | 58 | 2018 |
Discovering work prioritisation patterns from event logs S Suriadi, MT Wynn, J Xu, WMP van der Aalst, AHM ter Hofstede Decision Support Systems 100, 77-92, 2017 | 48 | 2017 |
Event interval analysis: Why do processes take time? S Suriadi, C Ouyang, WMP Van Der Aalst, AHM Ter Hofstede Decision Support Systems 79, 77-98, 2015 | 46 | 2015 |
Towards event log querying for data quality: Let’s start with detecting log imperfections R Andrews, S Suriadi, C Ouyang, E Poppe On the Move to Meaningful Internet Systems. OTM 2018 Conferences …, 2018 | 40 | 2018 |
Validating denial of service vulnerabilities in web services S Suriadi, A Clark, D Schmidt 2010 Fourth International Conference on Network and System Security, 175-182, 2010 | 37 | 2010 |
Process discovery for industrial control system cyber attack detection D Myers, K Radke, S Suriadi, E Foo ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 36 | 2017 |
Turning event logs into process movies: animating what has really happened M de Leoni, S Suriadi, AHM ter Hofstede, WMP van der Aalst Software & Systems Modeling 15, 707-732, 2016 | 34 | 2016 |