Browse By Person: Suriadi, Suriadi

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 46.

Book

Bae, Joonsoo, Suriadi, Suriadi, & Wen, Lijie (Eds.) (2015) Asia Pacific Business Process Management: Third Asia Pacific Conference, AP-BPM 2015, Busan, South Korea, June 24-26, 2015, Proceedings. Lecture Notes in Business Information Processing, 219. Springer.

Book Chapter

Andrews, Robert, Suriadi, Suriadi, Wynn, Moe, & ter Hofstede, Arthur H.M. (2017) Healthcare process analysis. In Combi, Carlo & Pozzi, Giuseppe (Eds.) Process Modelling and Management for HealthCare. CRC Press. (In Press)

Andrews, Robert, Suriadi, Suriadi, Wynn, Moe T., ter Hofstede, Arthur H.M., & Rothwell, Sean (2017) Improving patient flows at St. Andrew’s War Memorial Hospital’s emergency department through process mining. In vom Brocke, Jan & Mendling, Jan (Eds.) Business Process Management Cases. Springer. (In Press)

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2016) Enhancing privacy to defeat open source intelligence. In Layton, Robert & Watters, Paul A. (Eds.) Automating Open Source Intelligence. Elsevier, pp. 61-78.

Tickle, Alan, Ahmed, Ejaz, Bhaskar, Surinder, Mohay, George, Panichprecha, Sorot, Raghavan, S., et al. (2011) Background. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 9-40.

Suriadi, Suriadi, Clark, Andrew, Liu, Hua, Schmidt, Desmond, Smith, Jason, & Stebila, Douglas (2011) Denial of service defence appliance for web services. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 239-298.

Smith, Jason, Ahmed, Ejaz, Chellappan, C., Meenakshi, S., Raghavan, S., Suriadi, Suriadi, et al. (2011) DoS vulnerabilities in IPv6. In Raghavan, S & Dawson, E (Eds.) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, India, pp. 299-321.

Journal Article

Suriadi, Suriadi, Andrews, Robert, ter Hofstede, Arthur H.M., & Wynn, Moe T. (2017) Event log imperfection patterns for process mining: Towards a systematic approach to cleaning event logs. Information Systems, 64, pp. 132-150.

Suriadi, Suriadi, Wynn, Moe T., Xu, Jingxin, van der Aalst, Wil M.P., & ter Hofstede, Arthur H.M. (2017) Discovering Work Prioritisation Patterns from Event Logs. Decision Support Systems. (In Press)

Suriadi, Suriadi, Susnjak, Teo, Ponder-Sutton, Agate M., Watters, Paul A., & Schumacher, Christoph (2016) Using data-driven and process mining techniques for identifying and characterizing problem gamblers in New Zealand. Complex Systems Informatics and Modeling Quarterly, 9, pp. 44-66.
Number of full-text downloads 9

de Leoni, Massimiliano, Suriadi, Suriadi, Hofstedeter, Arthur H.M., & van der Aalst, Wil M.P. (2016) Turning event logs into process movies: animating what has really happened. Software and Systems Modeling, 15(3), pp. 707-732.

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2015) Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security, 14(3), pp. 221-247.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Suriadi, Suriadi, Ouyang, Chun, van der Aalst, Wil M.P., & ter Hofstede, Arthur H.M. (2015) Event interval analysis: Why do processes take time? Decision Support Systems, 79, pp. 77-98.
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Partington, Andrew, Wynn, Moe T., Suriadi, Suriadi, Ouyang, Chun, & Karnon, Jonathan (2015) Process mining for clinical processes: A comparative analysis of four Australian hospitals. ACM Transactions on Management Information Systems, 5(4), 19:1-19:18.
Number of full-text downloads 116
Number of citations in Scopus 13

Suriadi, Suriadi, Weiss, Burkhard, Winkelmann, Axel, ter Hofstede, Arthur H.M., Adams, Michael, Conforti, Raffaele, et al. (2014) Current research in risk-aware business process management : overview, comparison, and gap analysis. Communications of the Association for Information Systems, 34(1), pp. 933-984.
Number of full-text downloads 373
Number of citations in Scopus 11

Suriadi, Suriadi, Mans, Ronny S., Wynn, Moe T., Partington, Andrew, & Karnon, Jonathan (2014) Measuring patient flow variations : a cross-organisational process mining approach. Asia Pacific Business Process Management, 181, pp. 43-58.
Number of citations in Scopus 3

Seifi, Y, Suriadi, S, Foo, E, & Boyd, C (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks, 9(2), pp. 85-103.

Suriadi, Suriadi, Ouyang, Chun, van der Aalst, Wil M.P., & ter Hofstede, Arthur (2013) Root cause analysis with enriched process logs. Lecture Notes in Business Information Processing [Business Process Management Workshops: BPM 2012 International Workshops Revised Papers], 132, pp. 174-186.
Number of full-text downloads 723
Number of citations in Scopus 14
Number of citations in Web of Science® 13

Suriadi, Suriadi, Ouyang, Chun, & Foo, Ernest (2012) Privacy compliance verification in cryptographic protocols. Transactions on Petri Nets and Other Models of Concurrency VI : Lecture Notes in Computer Science, 7400, pp. 251-276.
Number of full-text downloads 150
Number of citations in Scopus 3
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2009) A User-centric Federated Single Sign-on System. Journal of Network and Computer Applications, 32(2), pp. 388-401.
Number of full-text downloads 543
Number of citations in Scopus 31
Number of citations in Web of Science® 19

Conference Paper

Myers, David, Radke, Kenneth, Suriadi, Suriadi, & Foo, Ernest (2017) Process discovery for industrial control system cyber attack detection. In IFIP Information Security & Privacy Conference 2017, 29-31 May 2017, Rome.
Number of full-text downloads 26

Suriadi, Suriadi, Susnjak, Teo, Ponder-Sutton, Agate M., Watters, Paul A., & Schumacher, Christoph (2016) Characterizing problem gamblers in New Zealand: A novel expression of process cubes. In CAiSE Forum, 13-17 June 2016, Ljubljana, Slovenia.
Number of full-text downloads 2

Abidin, Zaenal, Mathrani, Anuradha, Parsons, David, & Suriadi, Suriadi (2015) Opportunities and challenges of mobile learning for promoting mathematical literacy. In Australasian Conference on Information Systems, 30 November - 4 December 2015, Adelaide, S.A.
Number of full-text downloads 1

Nguyen, Hoang, Dumas, Marlon, La Rosa, Marcello, Maggi, Fabrizio Maria, & Suriadi, Suriadi (2014) Mining business process deviance : a quest for accuracy. In On the Move to Meaningful Internet Systems: OTM 2014 Conferences: Confederated International Conferences: CoopIS and ODBASE 2014, Proceedings [Lecture Notes in Computer Science, Volume 8841], Springer, Amantea, Italy, pp. 436-445.
Number of full-text downloads 76
Number of citations in Scopus 6
Number of citations in Web of Science® 8

Amoah, Raphael, Suriadi, Suriadi, Camtepe, Seyit A., & Foo, Ernest (2014) Security analysis of the non-aggressive challenge response of the DNP3 Protocol using a CPN Model. In IEEE International Conference on Communications (ICC 2014), 10-14 June 2014, Sydney, NSW.
Number of full-text downloads 153
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Suriadi, Suriadi, Wynn, Moe T., Ouyang, Chun, ter Hofstede, Arthur H.M., & van Dijk, Nienke (2013) Understanding process behaviours in a large insurance company in Australia : a case study. In Advanced Information Systems Engineering - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, Valencia, Spain, pp. 449-464.
Number of full-text downloads 576
Number of citations in Scopus 17

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest , & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.
Number of full-text downloads 168

Suriadi, Suriadi, Stebila, Douglas, Clark, Andrew, & Liu, Hua (2011) Defending web services against denial of service attacks using client puzzles. In Foster, Ian, Moser, Louise, & Zhang, Jia (Eds.) 2011 IEEE 9th International Conference on Web Services, IEEE Computer Society, Washington, D.C, pp. 25-32.
Number of full-text downloads 273
Number of citations in Scopus 12

Schmidt, Desmond, Suriadi, Suriadi, Tickle, Alan, Clark, Andrew, Mohay, George M., Ahmed, Ejaz, et al. (2010) A distributed denial of service testbed. In Berleur, Jaques, Hercheui, Magda David, & Hilty, Lorenz M. (Eds.) What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience : 9th IFIP TC 9 International Conference, HCC9 2010 and 1st IFIP TC 11 International Conference, CIP 2010, Held as Part of WCC 2010, Springer Berlin / Heidelberg, Brisbane, Queensland.
Number of full-text downloads 524
Number of citations in Web of Science® 4

Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond (2010) Validating denial of service vulnerabilities in web services. In Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.) IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Number of full-text downloads 650
Number of citations in Scopus 10

Suriadi, Suriadi, Tickle, Alan, Ahmed, Ejaz, Smith, Jason, & Morarji, Hasmukh (2010) Risk Modelling the Transition of SCADA System to IPv6. In What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, Brisbane, Australia, pp. 384-395.
Number of citations in Web of Science® 2

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and Verification of Privacy Enhancing Protocols. In Breitman, Karin & Cavalcanti, Ana (Eds.) Modeling and Verification of Privacy Enhancing Protocols, Springer Berlin / Heidelberg, Rio de Janeiro, Brazil, pp. 127-146.
Number of citations in Scopus 4
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy Using Re-encryption. In 2008 IFIP International Conference on Network and Parallel Computing, IEEE, Shanghai, China, pp. 18-25.
Number of full-text downloads 161
Number of citations in Scopus 5
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) A User-Centric Protocol for Conditional Anonymity Revocation. In Furnell, Steven M., Katsikas, Sokratis K., & Lioy, Antonio (Eds.) Trust Privacy and Security in Digital Business, Springer, Turin, Italy, pp. 185-194.
Number of citations in Web of Science® 2

Suriadi, Suriadi, Foo, Ernest, & Du, Rong (2008) Layered identity infrastructure model for identity meta systems. In Sixth Australasian Information Security Conference (AISC 2008), 22 - 25 January 2008, Wollongong, Australia.
Number of full-text downloads 270

Suriadi, Suriadi, Ashley, Paul, & Josang, Audun (2007) Future standardization areas in identity management systems. In 2nd PRIME Standardization Workshop, 14-15 June 2007, Zurich, Switzerland.
Number of full-text downloads 231

Josang, Audun, Alzomai, Mohammed, & Suriadi, Suriadi (2007) Usability and privacy in identity management architectures. In Brankovic, Ljiljana, Coddington, Paul, Roddick, John F., Steketee, Chris, Warren, Jim, & Wendelborn, Andrew (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Australia.
Number of full-text downloads 725
Number of citations in Scopus 12

Suriadi, Suriadi, Foo, Ernest, & Josang, Audun (2007) A User-centric Federated Single Sign-on System. In Li, Keqiu, Xiang, Yang, Jin, Hai, Qu, Wenyu, & Cao, Zhiying (Eds.) IFIP International Conference on Network and Parallel Computing Workshops NPC 2007, 18-21 September 2007, Dalian, China.
Number of full-text downloads 242

Report

Andrews, Robert D., Suriadi, Suriadi, Wynn, Moe T., ter Hofstede, Arthur H.M., Pika, Anastasiia, Nguyen, Huang Huy, et al. (2016) Comparing static and dynamic aspects of patient flows via process model visualisations. (Unpublished)

Nguyen, Hoang, Dumas, Marlon, La Rosa, Marcello, Maggi, Fabrizio Maria, Suriadi, Suriadi, & Naiker, Ugen (2016) Business Process Deviance Mining: Review and Evaluation. (Unpublished)
Number of full-text downloads 19

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 268

Suriadi, Suriadi, Ouyang, Chun, Smith, Jason, & Foo, Ernest (2009) Modeling and verification of privacy enhancing security protocols. (Submitted (not yet accepted for publication))
Number of full-text downloads 282
Number of citations in Web of Science® 1

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2009) Using re-encryption to escrow private information escrow bound to multiple conditions. (Submitted (not yet accepted for publication))
Number of full-text downloads 76

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Private information escrow bound to multiple conditions. (Unpublished)
Number of full-text downloads 147

Suriadi, Suriadi, Foo, Ernest, & Smith, Jason (2008) Conditional Privacy using Re-encryption. (In Press)
Number of full-text downloads 185
Number of citations in Web of Science® 1

QUT Thesis

Suriadi, Suriadi (2010) Strengthening and formally verifying privacy in identity management systems. PhD thesis, Queensland University of Technology.
Number of full-text downloads 206

This list was generated on Sun Mar 26 08:06:05 2017 AEST.