2022
DOI: 10.1007/978-3-030-95405-5_28
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Analysis via Process Mining: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 59 publications
0
0
0
Order By: Relevance
“…Process mining is a relatively young discipline that has exponentially advanced in recent years. Since its inception, it has been applied in a wide range of industries, including healthcare [11], security [12], telecommunications [13], education [14], software [15], and aviation [16], among others [17]. This has permitted the development of specialized software, both commercial-e.g., Celonis, Disco, Minit-and open-source-e.g., ProM, BupaR, pm4py- [18].…”
Section: Process Mining In the Mining Industrymentioning
confidence: 99%
“…Process mining is a relatively young discipline that has exponentially advanced in recent years. Since its inception, it has been applied in a wide range of industries, including healthcare [11], security [12], telecommunications [13], education [14], software [15], and aviation [16], among others [17]. This has permitted the development of specialized software, both commercial-e.g., Celonis, Disco, Minit-and open-source-e.g., ProM, BupaR, pm4py- [18].…”
Section: Process Mining In the Mining Industrymentioning
confidence: 99%
“…Based on the extracted knowledge from event data (i.e., event logs) produced by information systems, PM is mainly used to analyze, discover, and enhance processes [48][49][50]. PM has been successfully applied in various areas, including software engineering [51,52]. Therefore, process mining techniques are applied to find development processes using publicly available, open-source, software development repositories [53]; in another study, a process mining framework was used to discover software development processes from the event logs generated by software configuration management (SCM) systems [54].…”
Section: Conformance Checkingmentioning
confidence: 99%
“…Although not yet fully explored in the context of cyber-security training analysis, process mining (PM) has great potential to generate comprehensible behavioral models. It has been successful in aiding with similar types of tasks in domains like education [6], cybersecurity [18], healthcare [39], software reliability [17], and several others [11].…”
Section: Process Miningmentioning
confidence: 99%