Cybersecurity Threat Detection Through Business Process Log Analysis

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Barbara Pernici, Fotios Gioulekas, Athanasios Tzikas, Konstantinos Gounaris, Evangelos Stamatiadis, Thomas Schaberreiter, Cinzia Cappiello

Journal title: Lecture Notes in Computer Science, Model-Based Safety and Assessment

Journal publisher: Springer Nature Switzerland

Published year: 2025

DOI identifier: 10.1007/978-3-032-05073-1_7