[HTML][HTML] Machine learning in business process management: A systematic literature review
Abstract Machine learning (ML) provides algorithms to create computer programs based on
data without explicitly programming them. In business process management (BPM), ML …
data without explicitly programming them. In business process management (BPM), ML …
[HTML][HTML] A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …
vulnerability databases have challenges in promptly sharing new security events with …
[HTML][HTML] CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems
In the last years, cyber-physical systems (CPS) are receiving substantial mainstream
attention especially in industrial environments, but this popularity has been accompanied by …
attention especially in industrial environments, but this popularity has been accompanied by …
Two-stage approach to feature set optimization for unsupervised dataset with heterogeneous attributes
Unsupervised feature selection (UFS) is utilized in various application domains, such as
data mining, pattern recognition, machine learning, etc. UFS follows three basic approaches …
data mining, pattern recognition, machine learning, etc. UFS follows three basic approaches …
Measuring data-centre workflows complexity through process mining: The Google cluster case
D Fernández-Cerero, ÁJ Varela-Vaca… - The Journal of …, 2020 - Springer
Data centres have become the backbone of large Cloud services and applications,
providing virtually unlimited elastic and scalable computational and storage resources. The …
providing virtually unlimited elastic and scalable computational and storage resources. The …
Discovering configuration workflows from existing logs using process mining
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …
configuration process to reach the desired setting that fulfils user requirements. The same …
[HTML][HTML] CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
Explanations for over-constrained problems using QuickXPlain with speculative executions
Conflict detection is used in various scenarios ranging from interactive decision making (eg,
knowledge-based configuration) to the diagnosis of potentially faulty models (eg, using …
knowledge-based configuration) to the diagnosis of potentially faulty models (eg, using …
[HTML][HTML] VaryMinions: leveraging RNNs to identify variants in variability-intensive systems' logs
From business processes to course management, variability-intensive software systems
(VIS) are now ubiquitous. One can configure these systems' behaviour by activating options …
(VIS) are now ubiquitous. One can configure these systems' behaviour by activating options …
Process mining with applications to automotive industry
M Siek, RMG Mukti - IOP Conference Series: Materials Science …, 2020 - iopscience.iop.org
Process mining as a modeling and analysis tool can be used to improve the business
performance by looking at the actual business processes. This paper presents the …
performance by looking at the actual business processes. This paper presents the …