all InfoSec news
Differentially Private Release of Event Logs for Process Mining. (arXiv:2201.03010v2 [cs.CR] UPDATED)
Dec. 16, 2022, 2:10 a.m. | Gamal Elkoumy, Alisa Pankova, Marlon Dumas
cs.CR updates on arXiv.org arxiv.org
The applicability of process mining techniques hinges on the availability of
event logs capturing the execution of a business process. In some use cases,
particularly those involving customer-facing processes, these event logs may
contain private information. Data protection regulations restrict the use of
such event logs for analysis purposes. One way of circumventing these
restrictions is to anonymize the event log to the extent that no individual can
be singled out using the anonymized log. This article addresses the problem …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cyber Threat Analyst
@ Peraton | Morrisville, NC, United States
Kyndryl Offensive Security Professional - Threat-Led Penetration Testing (TLPT) and Red Teaming
@ Kyndryl | Sao Paulo (KBR51645) WeWork Office
Consultant en Cyber Sécurité - Spécialiste PKI H/F
@ Devoteam | Levallois-Perret, France
Cloud Security Architect - Advisor (Remote)
@ Fannie Mae | Reston, VA, United States
OT Cybersecurity Engineer
@ SBM Offshore | Bengaluru, IN, 560071