The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
The paper introduces a method to model embedded dependability-critical systems as AND-composition of Guarded Statecharts which are special UMLstatecharts. With Guarded Statecharts...
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
In order to support the conceptualization and specification of simulation models of complex systems, several formalisms or world views exist. Petri nets, differential equations, d...