Dec. 16, 2022, 2:10 a.m. | Gamal Elkoumy, Alisa Pankova, Marlon Dumas

cs.CR updates on arXiv.org arxiv.org

The applicability of process mining techniques hinges on the availability of
event logs capturing the execution of a business process. In some use cases,
particularly those involving customer-facing processes, these event logs may
contain private information. Data protection regulations restrict the use of
such event logs for analysis purposes. One way of circumventing these
restrictions is to anonymize the event log to the extent that no individual can
be singled out using the anonymized log. This article addresses the problem …

event event logs logs mining process release

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Threat Analyst

@ Peraton | Morrisville, NC, United States

Kyndryl Offensive Security Professional - Threat-Led Penetration Testing (TLPT) and Red Teaming

@ Kyndryl | Sao Paulo (KBR51645) WeWork Office

Consultant en Cyber Sécurité - Spécialiste PKI H/F

@ Devoteam | Levallois-Perret, France

Cloud Security Architect - Advisor (Remote)

@ Fannie Mae | Reston, VA, United States

OT Cybersecurity Engineer

@ SBM Offshore | Bengaluru, IN, 560071